FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Android Tablets Ship With Firmware Backdoor Malware

Gregory Zuckerman
Last updated: February 17, 2026 7:13 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Security researchers have uncovered a firmware-level backdoor preinstalled on multiple Android tablet brands, raising urgent questions about the integrity of low-cost devices and the safety of buyers who never sideloaded a single shady app.

The threat, dubbed Keenadu by analysts, embeds itself deep in the operating system and quietly gains sweeping control over apps and data before the tablet even leaves the factory.

Table of Contents
  • What security researchers found in preinstalled malware
  • Evidence of a supply chain breach in Android tablets
  • Who is affected so far by the Keenadu backdoor
  • How the Keenadu backdoor operates on Android
  • Why budget Android tablet hardware is a soft target
  • What users and IT teams should do to stay protected
  • The bottom line on the Keenadu Android tablet threat
Android tablets with lock symbol highlighting preinstalled firmware backdoor malware risk

What security researchers found in preinstalled malware

Kaspersky investigators report that Keenadu ships inside tablet firmware images from more than one manufacturer. Help Net Security highlighted the findings, which show the backdoor arriving as part of the official system build rather than through post-purchase infections.

Once active, Keenadu injects into Android’s Zygote process—the component that spawns every user app. By hooking Zygote, the malware’s code can influence almost anything running on the device, from browser sessions to background services, with a level of reach that typical app-based malware can’t match.

Researchers observed Keenadu downloading additional modules that can redirect web searches, track app installations for affiliate payouts, and interact with advertising frameworks. These behaviors suggest a blend of monetization and potential botnet activity, not just nuisance adware.

Evidence of a supply chain breach in Android tablets

One confirmed case involves the Alldocube iPlay 50 mini Pro, where every examined firmware version contained the backdoor—even those released after initial malware reports. Crucially, images carried valid vendor signatures, indicating the problem was not a tampered over-the-air update but likely an upstream compromise during the build process.

That points to classic supply chain risk: malicious code embedded via compromised development environments, third-party components, or partner integrations used by original design manufacturers. Because the images are signed, Android’s Verified Boot treats them as trustworthy, and factory resets do not remove the threat.

Google’s Android security documentation has long warned that preinstalled threats are uniquely challenging, as they inherit system privileges and persistence that ordinary malware can’t achieve. Keenadu’s Zygote injection underscores how severe that advantage can be.

A diagram illustrating the Keenadu C2 infection process, showing Zygote and Keenadu combining, then forking into systemserver and AKServer, and separately forking into App and AKClient which injects a DEX payload.

Who is affected so far by the Keenadu backdoor

Kaspersky says 13,715 users worldwide have encountered Keenadu or its related modules, with the largest concentrations seen in Russia, Japan, Germany, Brazil, and the Netherlands. The firm also links the activity to established Android botnet families, including Triada, BadBox, and Vo1d, suggesting code reuse or shared operator infrastructure.

Current evidence does not implicate major flagship brands. Impact appears centered on lesser-known or budget-focused vendors, and researchers note that affected manufacturers have been notified and are working on clean firmware.

How the Keenadu backdoor operates on Android

By injecting into Zygote, Keenadu ensures its hooks load into nearly every app process that starts, enabling surveillance or manipulation without obvious indicators. At that privilege level, it can intercept intents, observe browser queries, and install or trigger components that perform ad fraud or traffic hijacking.

Because Keenadu resides in signed system partitions, mobile antivirus tools and Google Play Protect may have limited visibility. Even if malicious modules are removed, the underlying backdoor can redownload them after reboot unless the base firmware is replaced.

Why budget Android tablet hardware is a soft target

Low-cost tablets often rely on complex manufacturing chains, turnkey firmware from third parties, and monetization SDKs added to squeeze revenue in tight-margin markets. That mix creates opportunities for a single compromised component to cascade across multiple brands that share the same reference designs.

Patch velocity is another strain point. Smaller vendors may lack robust incident response, allowing tainted builds to persist longer. Keenadu’s presence in subsequent signed releases illustrates how slow remediation can keep users exposed.

What users and IT teams should do to stay protected

  • Check immediately for vendor firmware updates and install them. Look for release notes referencing security fixes or system integrity.
  • Understand that factory resets won’t help if the malware lives in system partitions. Only a clean, vendor-signed firmware image can fully remove it.
  • Use reputable mobile security apps to detect secondary modules and suspicious behavior while you await a firmware fix.
  • In organizations and schools, restrict procurement to vetted brands with transparent update policies. Enforce device allowlists through an EMM, and audit network traffic for unusual ad click patterns, search redirections, or unexplained APK fetches.
  • If your device exhibits persistent browser hijacks or reappearing adware despite resets, contact the vendor for a clean image or replacement.

The bottom line on the Keenadu Android tablet threat

Keenadu is a stark reminder that the most dangerous Android malware no longer depends on user mistakes. When the factory image is already compromised, defenses must move upstream—stronger supply chain controls for manufacturers, faster patch pipelines, and more cautious purchasing for buyers. Until clean firmware lands for every affected model, vigilance is the only viable mitigation.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Sony XM6 Headphones Drop To $368 At Amazon
Anker Prime 3‑in‑1 Charger Drops to $119.99
Anthropic Releases Sonnet 4.6 With 1M Context
Claude Sonnet 4.6 Puts Frontier AI In Free Users’ Hands
OpenAI Launches ChatGPT Lockdown Mode Against Cyberattacks
Valve Confirms Steam Deck OLED Shortage Amid Memory Crunch
Experts Share Three Ways To Switch Linux Distros Safely
Isaac 0 Home Robot Folds Laundry For $7,999
Valve Steam Deck Faces Stock Shortages Amid Memory Crunch
Social Media Reacts To Miss J. Alexander In Reality Check
Mistral AI Acquires Koyeb to Power Cloud Push
Oura Ring Challenges Apple Watch In Health Tracking
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.