NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users
Cybersecurity NewsArchived Apr 02, 2026✓ Full text saved
A dangerous Android rootkit named NoVoice has been hiding inside over 50 apps on Google Play, compromising more than 2.3 million devices worldwide. Tracked as Operation NoVoice, the malware uses 22 exploits to take full control of a device without raising any alerts, making it one of the most destructive Android threats uncovered in recent […] The post NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users appeared first on Cyber Security News .
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Security News NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users
A dangerous Android rootkit named NoVoice has been hiding inside over 50 apps on Google Play, compromising more than 2.3 million devices worldwide.
Tracked as Operation NoVoice, the malware uses 22 exploits to take full control of a device without raising any alerts, making it one of the most destructive Android threats uncovered in recent years.
The apps carrying NoVoice looked completely harmless — simple tools like phone cleaners, gallery apps, and casual games. Once opened, each app appeared to work exactly as expected, with no pop-ups, no unusual permission requests, and no visible signs of trouble.
Behind that normal-looking screen, however, the app was already reaching out to a remote server, mapping the device’s hardware and software, and preparing targeted exploits.
McAfee’s mobile research team identified the campaign and noted that the malware’s name comes from a silent audio file — R.raw.novioce — embedded in one of its later-stage payloads.
This file plays at zero volume to keep a background service alive, giving attackers a quiet, persistent foothold. The deliberate misspelling of “no voice” reflects the malware’s design: it works entirely without making a sound.
The reach of this campaign is especially alarming. Over 50 malicious apps were confirmed on Google Play before removal, accumulating at least 2.3 million downloads combined.
Users across multiple continents were affected, with the highest infection rates in Nigeria, Ethiopia, Algeria, India, and Kenya — regions where older, unpatched Android devices are most common.
Following McAfee’s responsible disclosure, Google removed all identified apps and banned the associated developer accounts.
Devices carrying a security patch level of May 1, 2021, or later are not vulnerable to the exploits recovered from the command-and-control server.
However, older devices running Android 7 or lower remain at serious risk, and a standard factory reset will not remove this rootkit.
How the Infection Takes Root and Stays Hidden
Once a user opens a carrier app, the infection begins without further interaction. Malicious code injected into the app’s Facebook SDK initialization path runs silently in the background.
Hidden inside what appears to be a normal image file is an encrypted payload sitting quietly after the image’s end marker — a technique built specifically to pass standard security scans undetected.
Normal looking image with malicious payload (Source – McAfee)
Before proceeding further, the malware runs 15 verification checks covering emulator detection, GPS geofencing, VPN use, and debugger activity.
15 validation checks before proceeding to the next stage (Source – McAfee)
Devices physically located inside Beijing and Shenzhen are excluded from the attack. If all checks pass, the malware contacts the C2 server and downloads root exploits matched to that specific device’s chipset and kernel version.
A total of 22 exploits were recovered, with one executing a three-stage kernel attack using an IPv6 use-after-free flaw, a Mali GPU driver vulnerability, and credential patching to fully disable Android’s SELinux protections.
SELinux enforcement disabled as part of the exploit chain (Source – McAfee)
Once root access is achieved, the rootkit replaces a core system library — libandroid_runtime.so — so that every app on the device runs attacker-controlled code at launch.
A watchdog process then checks the installation every 60 seconds and automatically reinstalls any removed components.
The only confirmed theft payload recovered was designed to clone WhatsApp sessions by extracting encryption keys and session data, though the framework is built to accept and execute any task at any time.
Users who suspect infection should perform a full firmware reflash, as a factory reset will not remove this rootkit from the system partition.
Keeping devices updated to at least the May 1, 2021, Android security patch level reduces exposure to the known exploits used in this campaign. Blocking known C2 domains at the network level can disrupt the infection chain at multiple stages.
Users should download apps only from trusted, well-reviewed developers and stay cautious with utility and gaming applications.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
Microsoft Details Steps to Mitigate the Axios npm Supply Chain Compromise
Apple
Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit
Cyber Security News
New ZAP PTK Add-On Maps Browser Security Findings as Native Alert Into ZAP
Top 10
10 Best VPN For Privacy In 2026
April 2, 2026
Top 20 Best Digital Forensic Tools in 2026
April 2, 2026
12 Best AWS Monitoring Tools in 2026
March 30, 2026
10 Best Spam Filter Tools 2026
March 30, 2026
10 Best Log Monitoring Tools in 2026
March 30, 2026