MalwareHigh

Android NoVoice Rootkit Exploits Legacy Vulnerabilities via 50+ Malicious Apps

Monday, April 6, 2026
Africa, South Asia (Global risk)
The Hacker News

Summary

A sophisticated Android rootkit named NoVoice was discovered exploiting 22 Android vulnerabilities (patched between 2016-2021) through over 50 malicious applications downloaded millions of times from app stores. The malware gains root access and injects malicious code into legitimate user applications to exfiltrate data. High infection rates were observed in Nigeria, Ethiopia, Algeria, India, and Kenya, with Google removing the apps from its stores.

Threat Analysis

NoVoice is a sophisticated Android rootkit that exploits a chain of 22 Android vulnerabilities, all of which were patched between 2016 and 2021, targeting devices that have not received security updates. The malware was distributed through over 50 applications that were available on app stores and had been downloaded millions of times before discovery.

Technical Capabilities: NoVoice gains root access to infected devices and injects malicious code into legitimate user applications. This allows the malware to operate with elevated privileges while hiding within trusted app processes, making detection significantly more difficult.

Affected Platforms: Android devices, particularly those running older Android versions that have not received security patches from 2016-2021. The malware specifically targets devices where these legacy vulnerabilities remain unpatched.

Geographic Distribution: High infection rates observed in Nigeria, Ethiopia, Algeria, India, and Kenya, suggesting targeting of regions with higher rates of older, unpatched Android devices.

Response: Google has removed the identified malicious applications from the Google Play Store. However, devices that already installed the apps may remain infected.

Recommended Mitigations: Update Android devices to the latest available security patch level. Remove any recently installed apps from unknown developers. Run a mobile security scan on potentially affected devices. Organizations should implement mobile device management (MDM) policies requiring minimum security patch levels. Consider replacing devices that cannot receive security updates.

Last updated: Apr 6, 2026, 08:20 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM