Researchers find 50 ‘dangerous’ Android apps that are secretly hijacking phones: Who is at risk

Recent findings from McAfee, a prominent cybersecurity firm, have unveiled a troubling malware campaign targeting Android devices. This sophisticated operation, dubbed Operation NoVoice, has reportedly infiltrated over 50 applications available on the Google Play Store, raising concerns for users who may have unknowingly downloaded these apps in recent months.

These applications, which included phone cleaners, puzzle games, and photo utilities, were deceptively benign in appearance and functionality. Collectively, they amassed over 2.3 million downloads before being removed from the platform. The malware embedded within these apps was designed to operate stealthily, making it one of the most insidious threats identified in recent times.

How the attack worked

Operation NoVoice employs a rootkit attack strategy, a particularly dangerous form of malware that burrows deep into a device’s operating system. This method allows attackers to gain administrator-level control while remaining undetected by both users and standard security measures.

Upon downloading one of the compromised apps, users experienced no immediate red flags; the apps performed as advertised, whether cleaning junk files, facilitating gameplay, or managing photos. However, unbeknownst to the user, these applications were covertly communicating with a remote server controlled by the attackers. This communication involved sending critical device information, including hardware specifications, operating system versions, and security patch levels.

Armed with this data, the attackers could deploy custom exploit code tailored to each specific device. If successful, the malware would achieve root-level access, allowing it to modify essential Android system libraries relied upon by all applications on the device. Consequently, attacker-controlled code could execute silently within any app the user opened, posing a significant security risk.

Unlike typical malware that can often be eradicated through a factory reset, Operation NoVoice was engineered to persist even through such measures. McAfee warns that complete removal may necessitate a firmware reinstallation, underscoring the severity of this threat.

Who is at risk

The risk associated with this malware is particularly pronounced for users operating older or unpatched versions of Android. While newer devices equipped with current security patches are somewhat shielded from the specific exploit utilized in this campaign, McAfee cautions that they are not entirely immune to potential threats.

Moreover, anyone who downloaded one of the affected applications during their availability on Google Play may be at risk, highlighting the widespread implications of this malware campaign.

How to protect yourself

  • Check what is on your phone. If there are apps you do not remember installing, review them carefully and remove anything unfamiliar.
  • Keep your phone updated.
  • Be skeptical of new apps, even on official stores.
AppWizard
Researchers find 50 ‘dangerous’ Android apps that are secretly hijacking phones: Who is at risk