Загрузка...

2.3 Million Android Phones Hacked — Factory Reset Won't Save You

A sophisticated rootkit called NoVoice has infected 2.3 million Android devices through innocent-looking apps on the Google Play Store. This isn't ordinary malware — it burrows so deep into your phone's system that even a factory reset won't remove it. The malware specifically targets WhatsApp, cloning your entire messaging session so attackers can read your private conversations in real-time without you knowing.

McAfee's security research team discovered this attack chain uses 22 different zero-day exploits to gain root access, then modifies core Android system libraries to persist through factory resets. The infected apps passed Google's security screening by using delayed payload delivery — they remained completely benign during review, only downloading malicious code days after installation.

🕒 Key Timestamps:
0:00 2.3 Million Devices Compromised
1:15 How the Infection Starts
2:40 Why Factory Reset Fails
4:10 The WhatsApp Attack
5:50 Google Play Store Problem
7:05 What You Should Do
8:10 The Bigger Picture

The only way to remove NoVoice is a complete firmware reinstall from your device manufacturer. I'll walk you through exactly how this rootkit works, why Google's security failed, and what you need to do if your device is infected. This represents a fundamental shift in mobile malware sophistication — and it's just the beginning.

Check the McAfee security blog (linked below) for the full list of infected apps. If you downloaded any flashlight apps, gallery cleaners, or casual games recently, your device may be compromised.

🔔 Subscribe for more cybersecurity breakdowns and stay ahead of emerging threats. The next attack is already being built.

#AndroidSecurity #Malware #Cybersecurity #WhatsAppHack

Видео 2.3 Million Android Phones Hacked — Factory Reset Won't Save You канала Code and Kush
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять