Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsNew Keenadu Backdoor Found in Android Firmware, Google Play Apps
New Keenadu Backdoor Found in Android Firmware, Google Play Apps
CybersecurityDefenseHardwareConsumer Tech

New Keenadu Backdoor Found in Android Firmware, Google Play Apps

•February 17, 2026
0
BleepingComputer
BleepingComputer•Feb 17, 2026

Why It Matters

Keenadu demonstrates how deep firmware compromises can bypass conventional mobile security, threatening user privacy and enterprise mobile deployments worldwide. Its presence on legitimate app stores underscores the need for stronger supply‑chain vetting and continuous device integrity monitoring.

Key Takeaways

  • •13,000 devices infected across Russia, Japan, Germany, Brazil
  • •Malware resides in firmware, evading standard removal tools
  • •Targets Google Play apps, including smart‑home camera software
  • •Disables itself when language or timezone indicates China
  • •Google Play Protect blocks known Keenadu variants automatically

Pulse Analysis

The emergence of Keenadu marks a new tier of Android threats, moving beyond app‑level exploits to firmware‑level persistence. By compromising the core libandroid_runtime.so library, the malware integrates into the operating system’s runtime, allowing it to act within the context of every application. This deep integration renders traditional anti‑malware tools ineffective, forcing users and enterprises to consider firmware re‑flashing or device replacement—an expensive and operationally disruptive response.

Supply‑chain security is now a top priority for device manufacturers and mobile‑first organizations. Keenadu’s distribution via OTA updates, counterfeit hardware, and even popular Google Play apps illustrates how attackers exploit multiple vectors to seed malicious code. The fact that the malware deactivates in Chinese locales hints at geopolitical motives, while its primary focus on ad‑fraud and data exfiltration raises concerns for advertisers and financial institutions that rely on mobile channels for transactions and analytics.

Google’s response, leveraging Play Protect to automatically detect and disable the backdoor, showcases the importance of built‑in, cloud‑based defenses. However, the persistence of firmware‑based variants means that device certification and provenance verification become essential safeguards. Enterprises should enforce policies that restrict devices to trusted vendors, implement regular integrity checks, and maintain an incident response plan that includes firmware remediation. As mobile ecosystems grow more complex, proactive threat hunting and robust supply‑chain governance will be critical to mitigate risks posed by advanced threats like Keenadu.

New Keenadu backdoor found in Android firmware, Google Play apps

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...