radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

sourceThe Hacker News
calendar_todayFebruary 17, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Keenadu Backdoor Threatens Android Tablets with Firmware-Level Exploitation

Summary

A newly discovered Android backdoor, Keenadu, is capable of data harvesting and remote control by embedding itself in device firmware. This backdoor was identified by Kaspersky in devices from various brands, including Alldocube, during the firmware build phase.

Key Points

  • Keenadu is an Android backdoor embedded in device firmware.
  • Discovered by Kaspersky, a Russian cybersecurity company.
  • Affects devices from multiple brands, including Alldocube.
  • The compromise occurs during the firmware build phase.
  • Allows for silent data harvesting and remote control of devices.

Analysis

The discovery of the Keenadu backdoor highlights a significant threat to Android devices, particularly those compromised at the firmware level. This type of vulnerability is particularly concerning as it can be difficult to detect and mitigate, given its deep integration into the device's operating system. The involvement of multiple brands suggests a widespread issue that could affect a large number of users globally.

Conclusion

IT professionals should prioritize assessing the security of Android devices, especially those from affected brands. Regular security audits and firmware integrity checks are recommended to detect and prevent such embedded threats.