New backdoor found in Android tablets targeting users in Russia, Germany and Japan
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。首先,我需要仔细阅读并理解文章内容。 文章讲的是卡巴斯基发现了一个新的安卓后门程序Keenadu,它被嵌入到设备的固件中,在设备到达消费者之前就已经感染了平板电脑。这个后门允许攻击者几乎不受限制地控制设备。它主要用于广告欺诈,比如劫持浏览器搜索、监控应用安装以及与广告组件互动来生成虚假收入。此外,感染的设备还会在不知情的情况下将商品添加到购物车中。 Keenadu被集成到多个制造商的平板电脑固件中,包括中国的Alldocube公司。尽管该公司承认过一个型号的恶意软件问题,但后续的固件更新仍然受到感染。研究人员指出,Keenadu是在固件构建阶段插入的,可能是通过被破坏的供应链实现的。这意味着设备在到达客户之前就已经被感染了。 还有几个变种的后门被发现,其中最强大的版本直接嵌入到设备固件中。其他变种隐藏在应用程序中,甚至包括官方应用商店中的应用。研究人员没有将此次活动归因于特定的威胁行为者,但指出开发者对安卓架构和安全原则有深入理解。 此外,Keenadu设计成避开某些地区,在检测到设备的语言设置和时区为中国时会终止运行,并且在没有Google Play Store或服务的情况下保持不活跃。 最后,由于Keenadu嵌入在固件级别,无法通过标准安卓安全工具移除。卡巴斯基建议安装来自可信来源的干净固件版本,在某些情况下可能需要更换设备。 现在我要把这些信息浓缩到100字以内。重点包括:Keenadu是新的安卓后门,在固件中发现;感染发生在出厂前;用于广告欺诈;影响多个制造商;难以移除;建议更换设备。 总结的时候要简洁明了,确保涵盖主要点:发现、位置、影响、用途、制造商、移除难度和建议措施。 </think> 研究人员发现了一种名为Keenadu的新Android后门程序,该程序嵌入设备固件,可在出厂前感染平板电脑,用于广告欺诈等恶意活动,影响多个制造商,难以通过常规工具移除,建议更换受感染设备。 2026-2-18 17:47:24 Author: therecord.media(查看原文) 阅读量:2 收藏

Researchers have discovered a new Android backdoor embedded deep inside device firmware that infects tablets before they even reach consumers.

In a report released this week, Russian cybersecurity firm Kaspersky said it uncovered a previously undocumented backdoor dubbed Keenadu. Unlike typical malware that users inadvertently download, Keenadu is built directly into a device’s core software, allowing it to load into every application launched on the tablet.

“Keenadu represents a full-fledged backdoor that allows attackers to gain virtually unrestricted control over the victim’s device,” the researchers said.

Kaspersky reported that over 13,700 users worldwide encountered Keenadu or its modules. The highest number of detections occurred in Russia, Japan, Germany, Brazil and the Netherlands.

The malware was primarily used for advertising fraud. Modules linked to Keenadu were capable of hijacking browser search engines, monitoring the installation of new applications and interacting with advertising components to generate fraudulent revenue. In some cases, users have reported that infected tablets were adding items to marketplace shopping carts without their knowledge.

According to the report, the malware was found integrated into the firmware of tablets from multiple manufacturers, including Chinese device maker Alldocube. The company previously acknowledged malware issues in one of its models, but Kaspersky said subsequent firmware updates for that device — including those released after the public disclosure — remained infected.

The researchers said Keenadu was also found in hardware from other manufacturers, though they did not name them. The company said it had notified the affected vendors.

Researchers believe the malware was inserted into targeted systems during the firmware build stage — likely through a compromised supply chain — meaning devices could have been infected before reaching customers.

“The vendors may have been unaware that their devices were infected prior to reaching the market,” Kaspersky said.

Several variants of the backdoor were identified. The most powerful version was embedded directly into device firmware. Other variants were hidden in applications, including a facial recognition app used for device unlocking, and even in apps distributed through official stores such as Google Play and third-party repositories.

Researchers did not attribute the campaign to a specific threat actor but said the developers demonstrated “a deep understanding of the Android architecture, the app startup process, and the core security principles of the operating system.”

The malware also appeared designed to avoid certain regions. It checks a device’s language settings and time zone and terminates if the interface language is set to a Chinese dialect and the device is located in a Chinese time zone. It also remains inactive on devices that lack Google Play Store or Google Play Services.

The Keenadu operation bears similarities to a 2025 infection involving the Triada backdoor, which embedded itself in the firmware of counterfeit Android devices sold through major online marketplaces, allowing attackers to steal credentials from messaging and social media apps.

Because Keenadu is embedded at the firmware level, it cannot be removed using standard Android security tools, researchers said. They recommend installing a clean firmware version from a trusted source. In some cases, they warn, replacing the device entirely may be the safest option.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/new-backdoor-found-in-android-russia-japan-brazil
如有侵权请联系:admin#unsafe.sh