‘This rootkit is highly persistent; a standard factory reset will not remove it’: “NoVoice” Android malware on Google Play infects 50 apps across 2.3 million devices, here’s what we know

In a significant revelation, researchers at McAfee have identified a sophisticated malware strain named NoVoice, which has infiltrated over 50 applications available on the Google Play Store. This alarming discovery has led to more than 2.3 million downloads of the compromised apps, raising concerns about the security of millions of Android devices.

Technical Insights into NoVoice Malware

NoVoice exploits vulnerabilities within older Android kernels and GPU architectures, showcasing a level of persistence that is particularly troubling. Notably, the malware can remain active even after users perform a factory reset on their devices, a common method for eradicating unwanted software.

One of the most concerning features of NoVoice is its ability to inject malicious code into widely used applications, including WhatsApp. This capability allows the malware to hijack user sessions, effectively spying on private conversations without the users’ knowledge.

In response to these findings, Google has taken action by removing the affected applications from its platform. However, the challenge remains for users whose devices have already been compromised, as the malware continues to pose a threat even after the apps have been deleted.

The implications of this discovery are profound, highlighting the need for heightened vigilance among Android users regarding app downloads and device security. As the digital landscape evolves, so too do the tactics employed by cybercriminals, making it essential for users to stay informed and proactive in safeguarding their personal information.

AppWizard
'This rootkit is highly persistent; a standard factory reset will not remove it': "NoVoice" Android malware on Google Play infects 50 apps across 2.3 million devices, here's what we know