ADVERTISEMENT
Thursday, February 19, 2026
  • Login
Tech | Business | Economy
No Result
View All Result
NEWSLETTER
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • BUSINESS SENSE FOR SMEs
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
    • Chidiverse
  • TECHECONOMY TV
  • Apply
  • TBS
  • Advertise
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • BUSINESS SENSE FOR SMEs
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
    • Chidiverse
  • TECHECONOMY TV
  • Apply
  • TBS
  • Advertise
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Tech
  • Business
  • Partners
  • Economy
  • Features
  • TECHECONOMY TV
  • Apply
  • TBS
  • Advertise

Home » Kaspersky Issues Red Alert to Android Users over Multifaceted ‘Keenadu’ Malware

Kaspersky Issues Red Alert to Android Users over Multifaceted ‘Keenadu’ Malware

As of February 2026, Kaspersky mobile security solutions detected over 13,000 devices infected with Keenadu.

Destiny Eseaga by Destiny Eseaga
February 19, 2026
in Security
Reading Time: 3 mins read
0
Kaspersky warns about Keenadu in Android

Kaspersky warns about Keenadu in Android

Kaspersky has detected a new malware for Android devices that it dubbed Keenadu. This malware is distributed in multiple forms, it can be preinstalled directly into devices’ firmware, embedded within system apps, or even downloaded from official app stores such as Google Play.

Currently Keenadu is used for ad fraud, with attackers using infected devices as bots to deliver link clicks on ads, but it can also be used for malicious purposes, with some variants even allowing full control of the victim’s device.

As of February 2026, Kaspersky mobile security solutions detected over 13,000 devices infected with Keenadu.

The highest numbers of the attacked users have been observed in Russia, Japan, Germany, Brazil, the Netherlands, Turkiye, and other countries have been affected as well.

Integrated into device firmware

Subscribe to our Telegram channel for the latest updates.

Follow the latest developments with instant alerts on breaking news, top stories, and trending headlines.

Join Channel

Similar to the Triada backdoor that Kaspersky detected in 2025, some versions of Keenadu are integrated into the firmware of several models of Android tablets at one of the supply chain stages.

In this variant, Keenadu is a fully functional backdoor that provides the attackers with unlimited control over the victim’s device. It can infect every app installed on the device, install any apps from APK files and give them any available permissions.

As a result, all information on the device, including media, messages, banking credentials, location, etc. can be compromised. The malware even monitors search queries that the user inputs into the Chrome browser in incognito mode.

When integrated into the firmware, the malware behaves differently depending on several factors. It will not activate if the language set on the device is one of Chinese dialects, and the time is set to one of Chinese time zones.

It will also not launch if the device doesn’t have Google Play Store and Google Play Services installed.

MTN New

Embedded within system apps

In this variant, the functionality of Keenadu is limited – it cannot infect every app on the device, but since it exists within a system app (which has elevated privileges compared to usual apps), it can still install any side apps that the attackers choose without the user knowing.

What’s more, Kaspersky discovered Keenadu embedded within a system application responsible for unlocking the device with the user’s face. The attackers could potentially acquire victim’s face data. In some cases, Keenadu was embedded within the home screen app which is responsible for the home screen interface.

Embedded within apps distributed through Android app stores

Kaspersky experts also discovered that several apps distributed on Google Play are infected with Keenadu. These are apps for smart home cameras, and they’ve been downloaded over 300,000 times. As of the time of publication, these apps have been removed from Google Play.

When the apps are launched, attackers may launch invisible web browser tabs within the apps, that can be used to browse through different websites without the user knowing.

Previous research from other cybersecurity researchers also showed similar infected apps being distributed via standalone APK files or through other app stores.

“As our recent research showed, preinstalled malware is a pressing issue on multiple Android devices. Without any actions on the user side, a device can be infected right out of the box.

It is important for users to understand this risk and use security solutions that can detect this type of malware.

Vendors likely didn’t know about the supply chain compromise that resulted in Keenadu infiltrating devices, as the malware was imitating legitimate system components.

It is important to check every stage of the production process to ensure that device firmware is not infected,” comments Dmitry Kalinin, security researcher at Kaspersky.

0Shares

businessday
Previous Post

Audiomack is Creatively Turning 30 million Audiomod Users into Creators

Next Post

AI is Silently Turning into Your Organisation’s Biggest Cyber Threat… See How

Destiny Eseaga

Destiny Eseaga

My name is Destiny Eseaga, a communication strategist, journalist, and researcher, deeply intrigued by the political economy of Nigeria and the broader world context. My passion lies in the world of finance, particularly, capital markets, investment banking, market intelligence, etc

Next Post
Developers fight against cyber mafia | AI

AI is Silently Turning into Your Organisation’s Biggest Cyber Threat... See How

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
Techeconomy Podcast
Techeconomy Podcast

The Techeconomy Podcast is a thought-leadership show exploring the powerful intersection of technology, business, and the economy, with a strong focus on Africa’s fast-evolving digital landscape.

Navigating a Career in Tech Sales
byTecheconomy

Tech sales is more than selling – it’s strategy, relationships, and growthIf you’re curious about: Breaking into tech sales Growing your career Understanding what employers really want

Navigating a Career in Tech Sales
Navigating a Career in Tech Sales
January 29, 2026
Techeconomy
How Technology is Transforming Education, Health, and Business
November 27, 2025
Techeconomy
INNOVATION IN MOBILE BANKING
October 30, 2025
Techeconomy
The Rise of AI: Impact on Jobs & Businesses
September 25, 2025
Techeconomy
Beyond the Product: How to Build a Powerful Marketing Engine for Your Tech Business
August 28, 2025
Techeconomy
Search Results placeholder
UBA
Advertisements
businessday
  • About Us
  • Careers
  • Contact Us

© 2026 TECHECONOMY.

No Result
View All Result
  • Techeconomy
  • News
  • Technology
  • Business
  • Economy
  • Jobseeker
  • Advertise

© 2026 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.