Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/Threats/NoVoice Attacks Millions on Google Play with 22 Explo
Threats

NoVoice Attacks Millions on Google Play with 22 Explo

A dangerous Android rootkit, dubbed NoVoice, has compromised over 2.3 million devices worldwide after being discovered hidden within more than 50 applications on Google Play. For a comprehensive...

Jennifer sherman
Jennifer sherman
April 2, 2026 3 Min Read
3 0

A dangerous Android rootkit, dubbed NoVoice, has compromised over 2.3 million devices worldwide after being discovered hidden within more than 50 applications on Google Play. For a comprehensive overview of this threat, including its 22 exploits, a full report is available [link to: `https://ppl-ai-file-upload.s3.amazonaws.

Tracked as Operation NoVoice, the malware uses 22 exploits to take full control of a device without raising any alerts, making it one of the most destructive Android threats uncovered in recent years.

The apps carrying NoVoice looked completely harmless — simple tools like phone cleaners, gallery apps, and casual games. Once opened, each app appeared to work exactly as expected, with no pop-ups, no unusual permission requests, and no visible signs of trouble.

Behind that normal-looking screen, however, the app was already reaching out to a remote server, mapping the device’s hardware and software, and preparing targeted exploits.

McAfee’s mobile research team identified the campaign and noted that the malware’s name comes from a silent audio file — R.raw.novioce — embedded in one of its later-stage payloads.

This file plays at zero volume to keep a background service alive, giving attackers a quiet, persistent foothold. The deliberate misspelling of “no voice” reflects the malware’s design: it works entirely without making a sound.

The reach of this campaign is especially alarming. Over 50 malicious apps were confirmed on Google Play before removal, accumulating at least 2.3 million downloads combined.

Users across multiple continents were affected, with the highest infection rates in Nigeria, Ethiopia, Algeria, India, and Kenya — regions where older, unpatched Android devices are most common.

Following McAfee’s responsible disclosure, Google removed all identified apps and banned the associated developer accounts.

Devices carrying a security patch level of May 1, 2021, or later are not vulnerable to the exploits recovered from the command-and-control server.

However, older devices running Android 7 or lower remain at serious risk, and a standard factory reset will not remove this rootkit.

How the Infection Takes Root and Stays Hidden

Once a user opens a carrier app, the infection begins without further interaction. Malicious code injected into the app’s Facebook SDK initialization path runs silently in the background.

Hidden inside what appears to be a normal image file is an encrypted payload sitting quietly after the image’s end marker — a technique built specifically to pass standard security scans undetected.

Normal looking image with malicious payload (Source - McAfee)
Normal looking image with malicious payload (Source – McAfee)

Before proceeding further, the malware runs 15 verification checks covering emulator detection, GPS geofencing, VPN use, and debugger activity.

15 validation checks before proceeding to the next stage (Source – McAfee)

Devices physically located inside Beijing and Shenzhen are excluded from the attack. If all checks pass, the malware contacts the C2 server and downloads root exploits matched to that specific device’s chipset and kernel version.

A total of 22 exploits were recovered, with one executing a three-stage kernel attack using an IPv6 use-after-free flaw, a Mali GPU driver vulnerability, and credential patching to fully disable Android’s SELinux protections.

SELinux enforcement disabled as part of the exploit chain (Source - McAfee)
SELinux enforcement disabled as part of the exploit chain (Source – McAfee)

Once root access is achieved, the rootkit replaces a core system library — libandroid_runtime.so — so that every app on the device runs attacker-controlled code at launch.

A watchdog process then checks the installation every 60 seconds and automatically reinstalls any removed components.

The only confirmed theft payload recovered was designed to clone WhatsApp sessions by extracting encryption keys and session data, though the framework is built to accept and execute any task at any time.

Users who suspect infection should perform a full firmware reflash, as a factory reset will not remove this rootkit from the system partition.

Keeping devices updated to at least the May 1, 2021, Android security patch level reduces exposure to the known exploits used in this campaign. Blocking known C2 domains at the network level can disrupt the infection chain at multiple stages.

Users should download apps only from trusted, well-reviewed developers and stay cautious with utility and gaming applications.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarePatchSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Microsoft’s Axios npm Supply Chain Attack Mitigation Steps

Next Post

Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us