New backdoor found in Android tablets targeting users in Russia, Germany and Japan

Researchers have discovered a new Android backdoor embedded deep inside device firmware that infects tablets before they even reach consumers.

In a report released this week, Russian cybersecurity firm Kaspersky said it uncovered a previously undocumented backdoor dubbed Keenadu. Unlike typical malware that users inadvertently download, Keenadu is built directly into a device’s core software, allowing it to load into every application launched on the tablet.

“Keenadu represents a full-fledged backdoor that allows attackers to gain virtually unrestricted control over the victim’s device,” the researchers said.

Kaspersky reported that over 13,700 users worldwide encountered Keenadu or its modules. The highest number of detections occurred in Russia, Japan, Germany, Brazil and the Netherlands.

The malware was primarily used for advertising fraud. Modules linked to Keenadu were capable of hijacking browser search engines, monitoring the installation of new applications and interacting with advertising components to generate fraudulent revenue. In some cases, users have reported that infected tablets were adding items to marketplace shopping carts without their knowledge.

According to the report, the malware was found integrated into the firmware of tablets from multiple manufacturers, including Chinese device maker Alldocube. The company previously acknowledged malware issues in one of its models, but Kaspersky said subsequent firmware updates for that device — including those released after the public disclosure — remained infected.

The researchers said Keenadu was also found in hardware from other manufacturers, though they did not name them. The company said it had notified the affected vendors.

Researchers believe the malware was inserted into targeted systems during the firmware build stage — likely through a compromised supply chain — meaning devices could have been infected before reaching customers.

“The vendors may have been unaware that their devices were infected prior to reaching the market,” Kaspersky said.

Several variants of the backdoor were identified. The most powerful version was embedded directly into device firmware. Other variants were hidden in applications, including a facial recognition app used for device unlocking, and even in apps distributed through official stores such as Google Play and third-party repositories.

Researchers did not attribute the campaign to a specific threat actor but said the developers demonstrated “a deep understanding of the Android architecture, the app startup process, and the core security principles of the operating system.”

The malware also appeared designed to avoid certain regions. It checks a device’s language settings and time zone and terminates if the interface language is set to a Chinese dialect and the device is located in a Chinese time zone. It also remains inactive on devices that lack Google Play Store or Google Play Services.

The Keenadu operation bears similarities to a 2025 infection involving the Triada backdoor, which embedded itself in the firmware of counterfeit Android devices sold through major online marketplaces, allowing attackers to steal credentials from messaging and social media apps.

Because Keenadu is embedded at the firmware level, it cannot be removed using standard Android security tools, researchers said. They recommend installing a clean firmware version from a trusted source. In some cases, they warn, replacing the device entirely may be the safest option.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Predator spyware used to infect phone belonging to Angolan journalist, report says

Next Post

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Related Posts

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive action that wipes a user's entire Google Drive contents, findings from Straiker STAR Labs show. The zero-click Google Drive Wiper technique hinges on connecting the browser to services like Gmail and Google Drive to automate routine tasks by granting them
Read More

TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order

TikTok on Friday officially announced that it formed a joint venture that will allow the hugely popular video-sharing application to continue operating in the U.S. The new venture, named TikTok USDS Joint Venture LLC, has been established in compliance with the Executive Order signed by U.S. President Donald Trump in September 2025, the platform said. The new deal will see TikTok's Chinese
Read More

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. In addition, the group's alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been added to the European Union's Most Wanted and INTERPOL's Red Notice lists, authorities
Read More