Android devices ship with firmware-level malware

In late February 2026, SophosLabs analysts identified multiple detections on Android devices for malicious activity associated with the Keenadu backdoor. According to Kaspersky, Keenadu is a firmware infection embedded in the libandroid_runtime.

In late February 2026, SophosLabs analysts identified multiple detections on Android devices for malicious activity associated with the Keenadu backdoor. According to Kaspersky, Keenadu is a firmware infection embedded in the libandroid_runtime.so (shared object library) that injects itself into the Zygote process. As Zygote is the parent process for all Android apps, an attacker effectively gains total control over an infected device. Keenadu acts as a downloader for second-stage malware modules that can be used to target the data in multiple applications. All Android apps rely on libandroid_runtime.so to run, so a copy of Keenadu is copied into the address space of every app installed on an infected device.

The code for Keenadu is located in a static library (libVndxUtils.a) on an infected device and relies on a malicious dependency that masquerades as legitimate MediaTek code. Based on artifacts associated with Keenadu’s deployment, Kaspersky concluded that it was “integrated into the firmware during the build phase” in a supply chain compromise rather than subsequently installed through a compromised OTA (over-the-air) server.

The apps the malware targets depends on the modules the attacker chooses to download. Examples include storefronts like Shein, Temu, and Amazon. YouTube, Facebook, and the Digital Wellbeing app are all targeted with “clicker” modules, which perform ad fraud by silently connecting to websites in the background to generate pay-per-click revenue. Another clicker module is embedded in the system launcher (com.android.launcher3) and appears designed to monetize each installation. One module targets the Google Chrome browser.

The infected devices detected by Sophos consistently involved two system-level APK files: PriLauncher.apk and PriLauncher3QuickStep.apk. These files were in system-level directories (e.g., /system/system_ext/priv-app/PriLauncher3QuickStep/PriLauncher3QuickStep.apk). QuickStep is the default Android system launcher and a core component of the Android Open Source Project (AOSP). The detections of these APK files as malicious suggest that these components were trojanized to run Keenadu on certain devices. The Sophos Intercept-X endpoint agent for Android does not block legitimate QuickStep versions.   

As of March 4, Sophos X-Intercept telemetry listed over 500 unique compromised Android devices across nearly 50 models. The devices were mostly low-cost models produced by the following manufacturers: Allview, BLU, Dcode, DOOGEE, Gigaset, Gionee, Lava, and Ulefone. The list did not include Alldocube devices, despite Kaspersky reportedly observing Keenadu affect that manufacturer as well. The identified infections were spread globally, with devices located in 40 countries. 

Organizations that allow users to access corporate resources from personal devices are at elevated risk. Although data exfiltration is from the device itself, threat actors could access a corporate network via exposed credentials stored in apps on the infected device.

SophosLabs analysts recommend following the steps outlined in knowledgeable article KBA-000047016. Android users should install updated firmware if released by the vendor. Until the firmware has been updated, organizations should consider restricting affected models from accessing the corporate network.

The following Sophos protection relates to this threat:

  • Andr/Bckdr-SBS

The threat indicators in Table 1 can be used to detect activity related to this threat. Note that IP addresses can be reallocated. The domains and IP addresses may contain malicious content, so consider the risks before opening them in a browser.

Indicator Type Context
11eaf02f41b9c93e9b3189aa39059419 MD5 hash Keenadu-infected BLU Bold K50 firmware (PriLauncher3QuickStep.apk)
7db58b72a3493a86e847c3685eca74c690d50b55 SHA1 hash Keenadu-infected BLU Bold K50 firmware (PriLauncher3QuickStep.apk)
52db1f284a0dccbb750314cf765131a17a8284a2aeea04701a2b71f35fb9d9ee SHA256 hash Keenadu-infected BLU Bold K50 firmware (PriLauncher3QuickStep.apk)
3c03168c98ad6111c3aa0a960f8b7eea MD5 hash Keenadu-infected BLU G84 firmware (PriLauncher3QuickStep.apk)
dcf2b51bfc43494bb27f5da26f3f706ca878d17e SHA1 hash Keenadu-infected BLU G84 firmware (PriLauncher3QuickStep.apk)
cdf1d41d732ba882184060933bec2c1f4b8eefc081c06471132a690f2205da31 SHA256 hash Keenadu-infected BLU G84 firmware (PriLauncher3QuickStep.apk)
cb0d514d86ddfaf4345d25cef064863b MD5 hash Keenadu-infected Ulefone Armor 22 firmware (PriLauncher.apk)
b73c94e56932f607108ec1efb74004c763a9e42b SHA1 hash Keenadu-infected Ulefone Armor 22 firmware (PriLauncher.apk)
ab6d744dccf4c6266474df4b8aa3be6ae5663dbee39c579a552a4cfa1c1d12fd SHA256 hash Keenadu-infected Ulefone Armor 22 firmware (PriLauncher.apk)
cd619b4e1e793f96eca877616a741bc1 MD5 hash Keenadu-infected Ulefone Armor X13 firmware (PriLauncher.apk)
c33b025bac789d3742278f784377fc36f83fd1ff SHA1 hash Keenadu-infected Ulefone Armor X13 firmware (PriLauncher.apk)
da1c7f53add0abaa8a49b773e5cea9c9171799f644ec24e366aaf7ce29962a11 SHA256 hash Keenadu-infected Ulefone Armor X13 firmware (PriLauncher.apk)
b80b39ed95d54c8c1bf12e35f92e23cc MD5 hash Keenadu-infected Ulefone Armor 24 firmware (PriLauncher3QuickStep.apk)
7eb32a90d556bb9954707014843a67f7039ea7f1 SHA1 hash Keenadu-infected Ulefone Armor 24 firmware (PriLauncher3QuickStep.apk)
34a0236b5c7b47577be4501e2c18908916ef9ec22032a6ea41b0ecceaf4e8d8a SHA256 hash Keenadu-infected Ulefone Armor 24 firmware (PriLauncher3QuickStep.apk)
playstations[.]click Domain name C2 server for Keenadu backdoor
uscelluliar[.]com Domain name C2 server for Keenadu backdoor
gstatic2[.]com Domain name C2 server for Keenadu backdoor
glogstatic[.]com Domain name C2 server for Keenadu backdoor
ytimg2[.]com Domain name C2 server for Keenadu backdoor
gmsstatic[.]com Domain name C2 server for Keenadu backdoor
gsonx[.]com Domain name C2 server for Keenadu backdoor
keepgo123[.]com Domain name C2 server for Keenadu backdoor
sliidee[.]com Domain name C2 server for Keenadu backdoor
newsroomlabss[.]com Domain name C2 server for Keenadu backdoor
fbgraph[.]com Domain name C2 server for Keenadu backdoor
dllpgd[.]click Domain name C2 server for Keenadu backdoor
gvvt1[.]com Domain name C2 server for Keenadu backdoor
proczone[.]com Domain name C2 server for Keenadu backdoor
goaimb[.]com Domain name C2 server for Keenadu backdoor
aifacecloud[.]com Domain name C2 server for Keenadu backdoor
gbugreport[.]com Domain name C2 server for Keenadu backdoor
tmgstatic [.]com Domain name C2 server for Keenadu backdoor
fbsimg[.]com Domain name C2 server for Keenadu backdoor
launcher[.]szprize[.]cn Domain name C2 server for Keenadu backdoor
iboot[.]site Domain name C2 server for Keenadu backdoor
67[.]198[.]232[.]187 IP address C2 server for Keenadu backdoor
67[.]198[.]232[.]4 IP address C2 server for Keenadu backdoor
110[.]34[.]191[.]82 IP address C2 server for Keenadu backdoor
110[.]34[.]191[.]81 IP address C2 server for Keenadu backdoor

Table 1: Indicators for this threat

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.