Automatically translated.View original post

"NoVoice" malware detected on Google Play

The "NoVoice" malware has been detected on Google Play. There are over 2 million Android machines already attached.

Google has always confirmed the security of using the Google Play Store. Google has been monitoring applications that may be malware-latent dangerous apps, but until then they survive, there are still often dangerous apps. Each outbreak has an extraordinary level of risk, such as this news.

According to a report by the website Bleeping Computer, it has detected a new malware epidemic, "NoVoice," a Rootkit-based malware (deep embedded malware) that focuses on attacks on groups of Android users through more than 50 fake applications covering a wide range of applications - Cleaner, video games, photo management apps, etc. - all of which are released for download through the official Android app store, the Google Play Store, and with the reliability of the platform itself, there are victims or fall under. The risk is as much as 2.3 million cases.

The "NoVoice" malware is a strange malware, because when it is attached to the machine, it runs quietly. It does not have a special request for access or permissions like any other malware, but a review from the McAfee research team, an old anti-virus developer, has found that the malware is trying to access the highest level of Root through many old Android security vulnerabilities, many of which are often fixed with updated patches that come out during the year. 2016 - 2021, and when trying to find out exactly what hackers are behind this malware, it does not find that the malware is related to a specific group of hackers, but the malware has similar capabilities to old malware like Triada, making it assumed that it may be a breakthrough.

In the area of malware, the research team found that the malware has components in a package called com.facebook.utils, which makes the malware smooth with the Facebook SDK package. The encrypted Payload file is named enc.apk. The payload is encrypted and the code is hidden in the PNG file with the Steganography technique. After decoding, it will get a payload file called h.apk that will be loaded directly into memory (In-Memory Execution) and delete the intermediary file immediately. To cover up traces of malware from being investigated.

Researchers have also found that malware has been determined not to be grunned on machines running within defined zones, such as those within Beijing and Shenzhen, China, as well as to determine whether the operation on the machine is in use. Emulators, VPNs, Debugger tools, and 15 other joint tools. If all checked through, the malware will run itself immediately. After that, the malware will contact the C2 or Command and Control servers and then collect data. On the system, such as the hardware version, the kernel version, the Android version, the list of all apps installed, and the level of Root permissions to find the best exploit method. The malware contacts the C2 server every 60 seconds to gradually download Component and Exploit elements suitable for the victim's system. The latter has up to 22, covering both the use-after-Free memory vulnerability and the Mali driver vulnerability. GPU etc.

After the malware is able to successfully root the machine, the malware will replace key libraries of the system like libandroid_runtime.so and libmedia_jni.so with Hooked Wrappers that will intervene with the Call command of the system to change the Redirect target to run the attack command. Not only that, this malware has the ability to stabilize multiple systems. Whether it is installing a Recovery Script, changing the Crash Handler to a malware loader, and packing the Payload into a Partition Partition ) of the storage part of the system.

After the malware is fully embedded within the system, the malware launches itself into various applications and releases two Component Deployments.

Component that serves to quietly install and uninstall the application.

Component embedded to perform actions on the application itself

The latter will focus heavily on stealing data on Whatsapp, a popular chat application, to steal usage data (Session) sent to C2 servers. These data will lead to hackers being able to use Whatsapp on their machines with the victim's active Session in order to impersonate the victim in a campaign to deceive those on the victim's contact list.

At present, Google has updated that it has successfully removed all malware contamination applications after being reported by McAfee.

# Trending # Lemon 8 Howtoo # lemon 8 diary # novoice # freedomhack

17 hours agoEdited to

... Read moreจากประสบการณ์ส่วนตัว ข้อมูลภัยคุกคามมัลแวร์ NoVoice กำลังสร้างความกังวลในกลุ่มผู้ใช้ Android เป็นอย่างมาก เพราะมัลแวร์นี้ใช้กลวิธีขั้นสูง เช่น การเข้ารหัส Payload แบบซ่อนในไฟล์ PNG ผ่านเทคนิค Steganography ซึ่งทำให้ยากต่อการตรวจจับ รวมถึงสามารถฝังตัวในระดับ Rootkit เพื่อควบคุมเครื่องได้อย่างลึกซึ้ง มันสามารถหลบหลีกการตรวจสอบ โดยไม่ร้องขอสิทธิ์การใช้งานที่มากเหมือนมัลแวร์ทั่วไป ทำให้หลายคนอาจติดเชื้อโดยไม่รู้ตัว ในฐานะผู้ใช้งาน Android ผมแนะนำให้ทุกคนเฝ้าระวัง โดยการดาวน์โหลดแอปฯ จากผู้พัฒนาที่เชื่อถือได้ และเลือกติดตั้งจาก Google Play Store เท่านั้น ซึ่งถึงแม้ล่าสุด Google ได้ลบแอปที่ติดมัลแวร์ NoVoice ออกไปแล้ว แต่ก็ยังมีความเสี่ยงหากอุปกรณ์ไม่ได้รับการอัปเดตแพทช์ความปลอดภัยอย่างสม่ำเสมอ การอัปเดตระบบปฏิบัติการ Android อย่างต่อเนื่องจึงเป็นสิ่งสำคัญ เพราะมัลแวร์ NoVoice อาศัยช่องโหว่บน Android รุ่นเก่าที่ถูกแก้ไขในแพทช์ระหว่างปี 2016-2021 ในระหว่างนี้ผู้ใช้ควรติดตั้งแอปป้องกันไวรัสที่มีชื่อเสียงอย่าง McAfee หรือ Norton เพื่อสแกนหาไฟล์หรือพฤติกรรมแปลกปลอมในเครื่อง นอกจากนี้ มัลแวร์ตัวนี้ยังเน้นขโมยข้อมูลจากแอปแชทยอดนิยมอย่าง Whatsapp ทำให้ข้อมูล Session สูญหาย เสี่ยงต่อการถูกแฮกเกอร์นำข้อมูลไปปลอมแปลงหรือหลอกลวงผู้ติดต่อของผู้ใช้ การตั้งรหัสผ่านแบบสองชั้น (Two-factor authentication) และการตรวจสอบกิจกรรมการเข้าสู่ระบบในแอปจึงเป็นมาตรการเสริมที่แนะนำอย่างยิ่ง สรุปแล้ว มัลแวร์ NoVoice แสดงให้เห็นว่าการรักษาความปลอดภัยบนอุปกรณ์ Android ต้องอาศัยทั้งการระมัดระวังผู้ใช้ รวมถึงการอัปเดตความปลอดภัยและใช้ซอฟต์แวร์ป้องกันไวรัสที่มีประสิทธิภาพ ร่วมกันสร้างเกราะป้องกันให้กับข้อมูลส่วนตัวและอุปกรณ์ของเรา

Related posts

Free SVG files for Cricut Design Space. If you’re dealing with crafter’s block, this website has tons of free SVG downloads to spark new project ideas for shirts, stickers, bookmarks, and more. Save this for your next Cricut project and start creating again 💕 #designinspo #creativeart
VlunaWorks

VlunaWorks

3 likes

How I Grew My FB Page To Over 8K Followers
Are Posting Facebook Reels? I grew my Facebook page to over 8K followers posting Facebook Reels just repurposing my TikTok videos 🤫 If you already have a lot of short form content (TikTok’s, IG Reels, Pinterest Video Pins or YouTube Shorts) then you MUST repost them as Facebook Reels. In t
Inuri

Inuri

54 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

Study hack
Amazing secret #studylifestyle #student hacks #student hacks
nancycharles_258

nancycharles_258

18 likes

Comment your thoughts #strangerthings #strangerthings5 #strangerthingsfinale #conformitygate #netflix
Macy Ray

Macy Ray

165 likes

How to make your essay sound human 0% AI Detected
#essay #study #aitools #aihumanizer #edu
Self lock

Self lock

9 likes

Reposting from my instagram for my new followers 🤍 #muslim #revertmuslim #ummah #islam
Lemon8er

Lemon8er

2 likes

Best study hack
Use this amazing advice #studylifehacks #studylifestyle #studenthacks
sanjin_studies

sanjin_studies

17 likes

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

bro got his PhD at 22 😭 #college #collegelife #essay #collegestudent #chatgpt
John

John

11 likes

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

michelledavid_276

michelledavid_276

1 like

Secret tool
#summerbod #freesoftware #redirectsoftware
nancycharles_258

nancycharles_258

6 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

Study aesthetics
#studylifestyle #studyingvibes #studyy
Sarah student

Sarah student

1 like

Ekrim si nou gen kesyon, Map reponn nou!! #ugc #fypppp #ugccontentcreator #ugcjourneyupdate
Anizabelle

Anizabelle

0 likes

michelledavid_276

michelledavid_276

2 likes

Olivia Rodrigo

Olivia Rodrigo

1 like

Study vibes
#studyingvibes #studyvibes #studyingincollege
sanjin_studies

sanjin_studies

2 likes

sanjin_studies

sanjin_studies

3 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

Study hack
#studylifehacks #studentlifehacks #studenthacks
nancycharles_258

nancycharles_258

1 like

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

I Stopped Paying for Storage
I love using my microSD card to easily transfer files from my phone to my computer without having to email anything. All you need is an SD card reader, which I’ve included a photo of below. You can even use a USB drive if you prefer – no need to stick to a microSD card. Just plug the SD card rea
𝔼𝕝𝕚𝕤𝕒𝕄𝕖𝕕𝕧𝕒

𝔼𝕝𝕚𝕤𝕒𝕄𝕖𝕕𝕧𝕒

758 likes

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

George University

George University

0 likes

Best study hack
Use this amazing tool #studylikeapro #studybreakideas #studyskill
sanjin_studies

sanjin_studies

3 likes

🧠 Would YOU plug in a random USB? Jamie did… and almost let hackers into his system. ⚠️ This comic shows a real cybersecurity trick: USB Baiting — where attackers drop infected drives hoping someone connects them. 👀 Learn what a Trojan is 🔐 Discover how to spot dangerous files 💬 Drop a 🛑
CyberSnack

CyberSnack

1 like

Study hack
#studenthacks #studylifestyle #student hacks
Sarah student

Sarah student

0 likes

🤍🎧🎶How to make your Spotify bedroom!🤍🎶🎧
what’s your favorite song rn? 🎧 #songsforbedroom #spotify #bedroom #ilovemusic #musicplaylist
Bri 💞🌺🌷

Bri 💞🌺🌷

9 likes

Study secret
#studylikeapro #studyvibes #studyingvibes
michelledavid_276

michelledavid_276

0 likes

Comment your thoughts #strangerthings #strangerthings5 #strangerthingsfinale #conformitygate #vecna l
Macy Ray

Macy Ray

3 likes

Traveling full-time means your inbox, passwords, and wifi connections are CONSTANTLY at risk — and the scams are getting smarter every year. ✈️🔐 That’s why I use Bitdefender Premium Security to protect my devices from the biggest threats travelers face: • 💳 Credit card & payment fraud • 📧 Phis
MADISON BROOKS TRAVEL

MADISON BROOKS TRAVEL

0 likes

External Hard Drive Showing Empty? How to Fix?
Plugged in your external hard drive but found it empty? Here are a few easy fixes you can try! If your files are lost, use AOMEI FastRecovery to bring them back. Giveaway license code: code.aomeitech.com Discount code: Special30OFF  #externalharddrive #recovery #harddrive #empty
SmoothTechie

SmoothTechie

1 like

Free Games! ✅
Free Games! ✅ Yes it’s trusted by many people and it’s the best in the industry! And no malware or virus! Follow for more value! 😉 #freegames #pcgamers #steamgames #gamer #tech
Tech With Unes

Tech With Unes

7 likes

How to Fix Computer Keeps Blue Screening
Why is your computer keeps blue screening and how to fix it? This article gives full explanation to it and provides full guide to help your computer return to normal. #bluescreen #bsod #computerscience #fix #windows
Techcrafter

Techcrafter

1 like

Sarah student

Sarah student

0 likes

Best tool for students!!
It helps me prepare all my assignments 💕
Nancy Student

Nancy Student

1 like

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

Hack Back! Companies aren’t just selling products. They’re selling you. But you don’t have to make it easy 🙃 #AI #privacy #data #cybersecurity
Cathy

Cathy

6 likes

Sarah student

Sarah student

0 likes

See more