'NoVoice' Android malware on Google Play infected 2.3 million devices
好的,我现在需要帮用户总结一篇关于Android恶意软件NoVoice的文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章提到NoVoice是在Google Play上发现的新型恶意软件,隐藏在超过50个应用中,下载量达230万次。这些应用包括清理工具、图片库和游戏,不需要可疑权限,功能正常。恶意软件通过利用2016至2021年间修补的旧漏洞获取root权限。 McAfee的研究人员发现了这个恶意软件,但无法确定具体攻击者。它与Triada安卓木马相似。NoVoice使用了分阶段的感染链,隐藏在Facebook SDK包中,使用加密ayload和信息隐藏技术。它还会避免感染特定地区,并进行多次验证检查。 一旦感染成功,恶意软件会联系C2服务器收集设备信息,并下载特定组件进行root攻击。成功后替换系统库,建立多层持久化机制,包括恢复脚本、崩溃处理程序和系统分区存储的备用payload。即使工厂重置也无法清除。 此外,NoVoice会在设备上注入代码到每个应用中,主要窃取WhatsApp数据,包括加密数据库、Signal协议密钥和账户信息,并发送到C2服务器克隆会话。 最后,文章指出这些应用已被移除Google Play,建议用户升级设备安全补丁,并从可信来源安装应用。 现在需要将这些要点浓缩到100字以内。重点包括:恶意软件名称、来源、传播方式、感染机制、目标应用类型、root权限获取方式、数据窃取功能以及防范建议。 可能的结构是:NoVoice是隐藏在Google Play中的恶意软件,通过伪装成正常应用传播,在设备上获取root权限并窃取WhatsApp数据。建议用户升级安全补丁并谨慎安装应用。 这样大约75字左右。 </think> NoVoice是一种隐藏在Google Play商店中的新型Android恶意软件,伪装成正常应用程序传播,通过利用旧系统漏洞获取设备root权限,并窃取WhatsApp等应用程序的敏感数据,具有高度隐蔽性和持久性,建议用户及时更新安全补丁并谨慎安装来源不明的应用程序。 2026-4-1 18:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

'NoVoice' Android malware on Google Play infected 2.3 million devices

A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times.

The apps carrying the malicious payload included cleaners, image galleries, and games. They required no suspicious permissions and provided the promised functionality.

After launching an infected app, the malware tried to obtain root access on the device by exploiting old Android vulnerabilities that received patches between 2016 and 2021.

Researchers at cybersecurity company McAfee discovered the NoVoice operation but could not link it to a specific threat actor. However, they highlighted that the malware shared similarities with the Triada Android trojan.

App on Google Play carrying the NoVoice payload
App on Google Play carrying the NoVoice payload
Source: McAfee

NoVoice infection chain

According to McAfee researchers, the threat actor concealed malicious components in the com.facebook.utils package, mixing them with the legitimate Facebook SDK classes.

An encrypted payload (enc.apk) hidden inside a PNG image file using steganography is extracted (h.apk) and loaded in system memory while wiping all intermediate files to eliminate traces.

McAfee notes that the threat actor avoids infecting devices in certain regions, like Beijing and Shenzhen in China, and implemented 15 checks for emulators, debuggers, and VPNs. If location permissions are not available, the malware continues the infection chain.

Validation checks performed on the infected device
Validation checks performed on the infected device
Source: McAfee

The malware then contacts the command-and-control (C2) server and collects device information such as hardware details, kernel version, Android version (and patch level), installed apps, and root status, to determine the exploit strategy.

Next, the malware polls the C2 every 60 seconds and downloads various components for device-specific exploits designed to root the victim system.

The researchers created a map of the infection chain from the delivery stage to the injection phase.

Compromise chain for the NoVoice Android malware
Compromise chain for the NoVoice Android malware
source: McAfee

McAfee says it observed 22 exploits, including use-after-free kernel bugs and Mali GPU driver flaws. These exploits give the operators a root shell and allow them to disable SELinux enforcement on the device, effectively dropping its fundamental security protections.

After rooting the device, key system libraries such as libandroid_runtime.so and libmedia_jni.so are replaced with hooked wrappers that intercept system calls and redirect execution to attack code.

The rootkit establishes multiple layers of persistence, including installing recovery scripts, replacing the system crash handler with a rootkit loader, and storing fallback payloads on the system partition.

Because that part of the device’s storage isn’t wiped during a factory reset, the malware will persist even after an aggressive cleanup.

A watchdog daemon runs every 60 seconds to check the rootkit’s integrity and automatically reinstalls missing components. If checks fail, it forces the device to reboot, causing the rootkit to reload.

WhatsApp data theft

During the post-exploitation phase, attacker-controlled code is injected into every app launched on the device. Two main components are deployed: one that enables silent installation or removal of apps, and another that operates within any app with internet access.

The latter serves as a primary data theft mechanism, and McAfee observed that it primarily targeted the WhatsApp messaging app.

When WhatsApp is launched on an infected device, the malware extracts sensitive data required to replicate the victim’s session, including encryption databases, the Signal protocol keys, and account identifiers such as phone number and Google Drive backup details.

This information is then exfiltrated to the C2, allowing the attackers to clone the victim’s WhatsApp session on their own device.

Code for stealing WhatsApp databases
Code for stealing WhatsApp databases
Source: McAfee

The researchers noted that although they recovered only a WhatsApp-focused payload, NoVoice’s modular design makes it technically possible to have used other payloads targeting any application on the device.

The malicious Android applications carrying NoVoice payloads have been removed from Google Play after McAfee, a member of the App Defense Alliance, reported them to Google.

However, users who have installed them previously should consider their devices and data compromised.

As NoVoice targets flaws fixed up to May 2021, upgrading to a device running a later security patch effectively mitigates this threat in its current form.

It is recommended that Android users upgrade to actively supported models and only install apps from trusted, well-known publishers, even on Google Play.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/novoice-android-malware-on-google-play-infected-23-million-devices/
如有侵权请联系:admin#unsafe.sh