Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

0
Medium
Vulnerabilityandroidremote
Published: Tue Feb 17 2026 (02/17/2026, 16:41:00 UTC)
Source: The Hacker News

Description

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase.

AI-Powered Analysis

AILast updated: 02/18/2026, 10:14:13 UTC

Technical Analysis

Keenadu is a complex Android backdoor embedded at the firmware level, discovered by Kaspersky in devices including Alldocube iPlay 50 mini Pro tablets, with infections traced back to August 2023. The malware is inserted during the firmware build phase and delivered via signed OTA updates, making detection and removal difficult. Keenadu operates by injecting malicious code into libandroid_runtime.so, a critical shared library loaded during device boot, which allows it to run within the context of every app and bypass Android's app sandboxing and permission model. It uses a client-server architecture: AKServer runs within the privileged system_server process, handling core logic and command-and-control (C2) communications, while AKClient is injected into every launched app to facilitate interaction with AKServer. The malware performs environment checks to avoid execution in Chinese locales or on devices lacking Google Play services, and it delays payload delivery by 2.5 months to evade detection. Payloads include modules for hijacking browser search engines, manipulating ad elements, monetizing app installs fraudulently, and stealing device telemetry. Keenadu also leverages trojanized apps distributed via Google Play and third-party stores, and it can propagate through other pre-installed backdoors like BADBOX. Its use of Amazon AWS for C2 infrastructure and sophisticated evasion techniques highlight the attackers' deep understanding of Android internals and supply chain attack vectors. While currently focused on ad fraud, Keenadu's capabilities could be repurposed for credential theft or espionage, posing a significant threat to device confidentiality, integrity, and availability.

Potential Impact

For European organizations, Keenadu poses a significant risk, especially those relying on Android tablets for business operations, remote work, or field services. The backdoor's firmware-level persistence and ability to bypass Android security controls can lead to extensive data exfiltration, unauthorized device control, and potential lateral movement within corporate networks. The malware's ad fraud activities could also result in financial losses and reputational damage. Given its stealth and delayed payload activation, detection is challenging, increasing the risk of prolonged undetected compromise. The presence of Keenadu in devices used within Germany and the Netherlands, countries with high Android device penetration and significant technology sectors, raises concerns about targeted espionage or sabotage. Additionally, supply chain compromise during firmware build phases threatens the integrity of device procurement processes. The malware's ability to manipulate system apps and OTA updates complicates remediation efforts, potentially requiring device replacement or firmware re-flashing. Organizations handling sensitive data or operating in regulated industries (e.g., finance, healthcare) face heightened compliance risks due to potential data breaches stemming from Keenadu infections.

Mitigation Recommendations

1. Enforce strict firmware integrity verification by validating digital signatures and hashes of firmware images before deployment or OTA updates, ideally using hardware root of trust mechanisms. 2. Restrict OTA updates to trusted sources only, and monitor update channels for anomalies or unauthorized firmware versions. 3. Implement supply chain security audits for device manufacturers and firmware providers to detect and prevent build-phase compromises. 4. Deploy endpoint detection solutions capable of monitoring unusual behaviors at the system and app levels, focusing on processes like libandroid_runtime.so and system_server. 5. Regularly update devices with the latest security patches and firmware versions provided by trusted vendors. 6. Educate users and IT staff to avoid installing apps from untrusted third-party repositories and verify app legitimacy, especially for apps related to smart devices and cameras. 7. Utilize Mobile Device Management (MDM) solutions to enforce security policies, restrict app installations, and monitor device health. 8. For critical environments, consider isolating Android tablets from sensitive networks or limiting their access to essential services only. 9. Collaborate with device vendors to obtain clean firmware images and request transparency on firmware build processes. 10. Monitor network traffic for communications to suspicious C2 servers, including those hosted on cloud providers like Amazon AWS, and block or investigate accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html","fetched":true,"fetchedAt":"2026-02-18T10:12:39.512Z","wordCount":2046}

Threat ID: 6995909980d747be205dea2e

Added to database: 2/18/2026, 10:12:41 AM

Last enriched: 2/18/2026, 10:14:13 AM

Last updated: 2/19/2026, 7:58:20 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats