Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
2.3 Million Android Users Hit by No Voice Malware Targeting WhatsApp - News Directory 3

2.3 Million Android Users Hit by No Voice Malware Targeting WhatsApp

April 6, 2026 Lisa Park Tech
News Context
At a glance
  • Security researchers at McAfee have uncovered a sophisticated Android rootkit campaign, tracked as Operation NoVoice, which has infected at least 2.3 million devices.
  • Unlike many malicious applications that trigger security warnings by requesting excessive permissions—such as Accessibility services—these apps functioned as intended and did not request suspicious permissions, allowing them to...
  • The malware exploits known vulnerabilities in old Android kernels and GPU flaws to gain root access to the infected device.
Original source: liputan6.com

Security researchers at McAfee have uncovered a sophisticated Android rootkit campaign, tracked as Operation NoVoice, which has infected at least 2.3 million devices. The malware was distributed through more than 50 applications hosted on the Google Play Store, spanning various categories including games, image galleries, and utility apps.

Unlike many malicious applications that trigger security warnings by requesting excessive permissions—such as Accessibility services—these apps functioned as intended and did not request suspicious permissions, allowing them to bypass standard detection methods and smuggle malicious components onto user devices.

Technical Exploitation and Persistence

NoVoice is characterized by its high level of persistence. The malware exploits known vulnerabilities in old Android kernels and GPU flaws to gain root access to the infected device. Once root access is achieved, the malware can embed itself deeply within the system.

A critical aspect of this threat is that a standard factory reset is insufficient to remove the infection. Because the rootkit operates at a level below the operating system’s standard recovery processes, it remains on the device even after the user attempts to wipe the data and reset the phone to factory settings.

Targeting WhatsApp and Data Theft

The primary objective of the NoVoice malware is the theft of sensitive data, specifically targeting WhatsApp. The malware is designed to inject code into WhatsApp to hijack user sessions and spy on private chats.

Targeting WhatsApp and Data Theft

To avoid detection by security software and system monitors, the operation concealed its malicious components within the com.facebook.utils package. By blending in with legitimate Facebook-related utility files, the malware was able to operate undetected while stealing data from the messaging platform.

Distribution and Mitigation

The scale of the infection highlights a significant gap in the Google Play Store’s vetting process. The malware reached 2.3 million downloads across more than 50 different apps. These apps were designed to appear benign and perform their stated functions, which helped them remain on the platform long enough to achieve a massive reach.

Google has since removed the identified malicious applications from the Play Store. However, security experts warn that removing the apps from the store does not resolve the issue for users who have already downloaded them. Because the malware gains root access and persists after factory resets, infected devices remain compromised even after the source app is gone.

This campaign underscores the ongoing risk posed by kernel-level vulnerabilities in older Android versions. By targeting these flaws, attackers can bypass the Android security sandbox and gain total control over the device hardware and software, making the removal process exceptionally difficult for the average user.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

app Store, Google Play, Kaspersky, keamanan siber, malware, Malware Android, Malware iPhone, malware pencuri kripto, Malware SparkCat, Penjahat Siber, SparkCat

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service