Close Menu
Crypto Breaking News
    Crypto Breaking News
    • News
      • Press Release
      • Featured
      • Events
      • Exchanges
      • Bitcoin
      • Ethereum
      • Solana
      • Cardano
      • Ripple
      • Press Releases by PR Newswire
      • News by CoinPedia
      • News by Coincu
      • News by Blockchain Wire
      • Binance News
    • Crypto
      • Companies
      • Events
      • Partners
      • Buy Crypto
      • Timers
    • Advertise
      • Submit a Press Release
      • Logos
      • About
      • Services
    • Offers
      • Marketing Services
      • Wallets & Tools
    • Account
    • Video
    • Contact
    Submit PR
    Crypto Breaking News
    Crypto News Press Release

    Kaspersky finds Keenadu Android malware preinstalled on devices

    18 February 2026
    FacebookTwitterLinkedInCopy Link
    News Feed
    Google NewsRSS
    Kaspersky Finds Keenadu Android Malware Preinstalled On Devices
    Kaspersky Finds Keenadu Android Malware Preinstalled On Devices

    Editor’s note: In an era of increasingly covert software supply chain threats, Kaspersky’s Keenadu discovery highlights how malware can slip into devices at multiple points—from preinstalled firmware to apps from official stores. This briefing breaks down what Keenadu is, how it operates, and what consumers and vendors should watch for as mobile devices become more integrated with smart ecosystems. While the study is technical, the takeaway is clear: routine device updates and robust security layers remain essential for staying ahead of evolving threats.

    Key points

    • Keenadu is Android malware that can be preinstalled in firmware, embedded in system apps, or downloaded from official stores.
    • Used for ad fraud and can give attackers full control over the device in some variants.
    • As of February 2026, over 13,000 infected devices reported; Russia, Japan, Germany, Brazil and others affected.
    • Variants include firmware-integrated backdoors, system-app implants, and malicious apps on Google Play.
    • Some infected apps on Google Play have been removed; risk persists with other app stores and APKs.

    Why this matters

    Preinstalled malware threatens users at the earliest moment of device setup, bypassing typical defenses and elevating the risk profile for mobile ecosystems. The Keenadu case underscores the need for rigorous supply-chain verification and proactive security solutions that monitor firmware and app-level integrity.

    What to watch next

    • Ongoing updates from Kaspersky on Keenadu variants and distribution vectors.
    • Monitoring for new devices affected via firmware supply chains or app stores.
    • User guidance to apply firmware updates and use reputable security software to detect such threats.

    Disclosure: The content below is a press release provided by the company/PR representative. It is published for informational purposes.

    Kaspersky finds Keenadu Android malware preinstalled on devices

    Kaspersky has detected a new malware for Android devices that it dubbed Keenadu. This malware is distributed in multiple forms – it can be preinstalled directly into devices’ firmware, embedded within system apps, or even downloaded from official app stores such as Google Play. Currently Keenadu is used for ad fraud, with attackers using infected devices as bots to deliver link clicks on ads, but it can also be used for malicious purposes, with some variants even allowing full control of the victim’s device.

    As of February 2026, Kaspersky mobile security solutions detected over 13,000 devices infected with Keenadu. The highest numbers of the attacked users have been observed in Russia, Japan, Germany, Brazil, the Netherlands, Turkiye, and other countries have been affected.

    Integrated into device firmware

    Similar to the Triada backdoor that Kaspersky detected in 2025, some versions of Keenadu are integrated into the firmware of several models of Android tablets at one of the supply chain stages. In this variant, Keenadu is a fully functional backdoor that provides the attackers with unlimited control over the victim’s device. It can infect every app installed on the device, install any apps from APK files and give them any available permissions. As a result, all information on the device, including media, messages, banking credentials, location, etc., can be compromised. The malware even monitors search queries that the user inputs into the Chrome browser in incognito mode.

    When integrated into the firmware, the malware behaves differently depending on several factors. It will not activate if the language set on the device is one of Chinese dialects, and the time is set to one of Chinese time zones. It will also not launch if the device doesn’t have Google Play Store and Google Play Services installed.

    Embedded within system apps

    In this variant, the functionality of Keenadu is limited – it cannot infect every app on the device, but since it exists within a system app (which has elevated privileges compared to usual apps), it can still install any side apps that the attackers choose without the user knowing. What’s more, Kaspersky discovered Keenadu embedded within a system application responsible for unlocking the device with the user’s face. The attackers could potentially acquire victim’s face data. In some cases, Keenadu was embedded within the home screen app which is responsible for the home screen interface.

    Embedded within apps distributed through Android app stores

    Kaspersky experts also discovered that several apps distributed on Google Play are infected with Keenadu. These are apps for smart home cameras, and they’ve been downloaded over 300,000 times. As of the time of publication, these apps have been removed from Google Play. When the apps are launched, attackers may launch invisible web browser tabs within the apps, that can be used to browse through different websites without the user knowing. Previous research from other cybersecurity researchers also showed similar infected apps being distributed via standalone APK files or through other app stores.

    Infected apps on Google Play image 1Infected apps on Google Play image 2

    Keenadu infographic image

    Infected apps on Google Play

    As our recent research showed, preinstalled malware is a pressing issue on multiple Android devices. Without any actions on the user side, a device can be infected right out of the box. It is important for users to understand this risk and use security solutions that can detect this type of malware. Vendors likely didn’t know about the supply chain compromise that resulted in Keenadu infiltrating devices, as the malware was imitating legitimate system components. It is important to check every stage of the production process to ensure that device firmware is not infected,” comments Dmitry Kalinin, security researcher at Kaspersky.

    See the post on Securelist for more information.

    Recommendations:

    • Use a reliable security solution to be promptly notified of similar threats on your device.
    • If you are using a device with infected firmware, check for firmware updates. After the update, run a scan of the device with a security solution.
    • If a system app is infected, we recommend that users stop using it and then disable it. If a launcher app is infected, we recommend disabling the default launcher and using third-party launchers.

    About Kaspersky

    Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure and governments around the globe. The company’s comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and nearly 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

    Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

    Crypto Breaking News
    • Website
    • Facebook
    • X (Twitter)
    • Pinterest
    • Instagram
    • Tumblr
    • LinkedIn

    The Crypto Breaking News editorial team curates the latest news, updates, and insights from the global cryptocurrency and blockchain industry.

    Related Posts

    Bitcoin Eyes $90k As Binance Buyers Ramp Up

    Bitcoin Eyes $90K as Binance Buyers Ramp Up

    1 hour ago
    Iran Weighs Crypto Tolls For Strait Of Hormuz Shipping

    Iran Weighs Crypto Tolls for Strait of Hormuz Shipping

    3 hours ago
    Mexc Pursues Eu Mica Compliance Amid New Ceo Leadership

    MEXC Pursues EU MiCA Compliance Amid New CEO Leadership

    5 hours ago
    South Korea Tightens Crypto Withdrawal-Delay Exemptions After Scam Losses

    South Korea Tightens Crypto Withdrawal-Delay Exemptions After Scam Losses

    7 hours ago
    Sec Enforcement Drops Sharply In 2025 As New Leadership Shifts Agency Focus

    SEC Enforcement Drops Sharply in 2025 as New Leadership Shifts Agency Focus

    8 hours ago
    Global Markets Rally On Ceasefire News As Oil Slumps 16% Below $100

    Global Markets Rally on Ceasefire News as Oil Slumps 16% Below $100

    9 hours ago

    Search Crypto News

    Featured Crypto News

    Latest News

    • Bitcoin Eyes $90K as Binance Buyers Ramp Up
    • Iran Weighs Crypto Tolls for Strait of Hormuz Shipping
    • MEXC Pursues EU MiCA Compliance Amid New CEO Leadership
    • South Korea Tightens Crypto Withdrawal-Delay Exemptions After Scam Losses
    • SEC Enforcement Drops Sharply in 2025 as New Leadership Shifts Agency Focus
    • Global Markets Rally on Ceasefire News as Oil Slumps 16% Below $100
    • Bybit Detects and Stops Fake Deposits Saving Over 1B in DOT Funds
    • Bitcoin Reaches $72K as Oil Slips; Is This Breakout Sustainable?
    • Evernorth Amended S-4 Keeps XRPN Merger on Track for Nasdaq Debut Soon
    • Global Markets Shift as Oil Jumps and Bitcoin Holds Ground

    Join 17,000+ Crypto Followers

    • Facebook2.3K
    • Twitter4.3K
    • Instagram5.6K
    • LinkedIn4K
    • Telegram52
    • Threads800
    Tangem 300x300
    Global Games Show - Riyadh

    About Crypto Breaking News

    About Crypto Breaking News

    Crypto Breaking News is a fast-growing digital media platform focused on the latest developments in cryptocurrency, blockchain, and Web3 technologies. Our goal is to provide fast, reliable, and insightful content that helps our readers stay ahead in the ever-evolving digital asset space.

    Web3 Digital L.L.C-FZ
    License Number: 2527596
    📞 +971 50 449 2025
    ✉️ info@cryptobreaking.com
    📍Meydan Grandstand, 6th floor, Meydan Road, Nad Al Sheba, Dubai, United Arab Emirates

    FacebookX (Twitter)InstagramPinterestYouTubeTumblrBlueskyLinkedInRedditTikTokTelegramThreadsRSS

    Links

    • Crypto News
    • Submit a Press Release
    • Advertise
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions

    advertising

    Tangem 300x300
    © 2026 CryptoBreaking.com | All rights reserved | Powered by Web3 Digital & Osom One

    Type above and press Enter to search. Press Esc to cancel.

    Change Location
    Find awesome listings near you!