NoVoice malware hid in 50+ Google Play apps and reached at least 2.3 million downloads


A newly detailed Android malware campaign called Operation NoVoice hid inside more than 50 apps on Google Play and reached at least 2.3 million downloads before removal. McAfee says the campaign used a rootkit that targeted older, unpatched Android devices and could persist even after a factory reset on some affected phones.

The malware did not need obvious dangerous permissions to get started. McAfee says the carrier apps looked like normal cleaners, gallery tools, and games, and the attack began after the app was opened, with no sideloading required. The malicious components were blended into common app structures, including Facebook SDK-related naming, to look less suspicious.

The headline number needs care. McAfee confirmed at least 2.3 million downloads, not 2.3 million proven successful root compromises. The real infection count could be lower because the rootkit depended on device-specific exploit success and older patch levels. McAfee says devices with a security patch level of 2021-05-01 or higher were not susceptible to the exploits it recovered from the command-and-control server.

Why NoVoice stands out

NoVoice is more serious than a typical Android trojan because it tries to gain root access and then modify core system behavior. McAfee says the malware overwrites a core system library so every app on the device can run attacker-controlled code at launch. That gives the operators a much deeper foothold than ordinary app-level spyware.

The campaign also used a large exploit toolkit. McAfee says it recovered 22 exploits from the attack infrastructure, and one analyzed chain used an IPv6 use-after-free, a Mali GPU driver bug, and credential patching plus SELinux disablement to finish the compromise.

That makes older Android phones the biggest concern. McAfee says Android 7 and lower devices that stopped receiving Android security updates remain at particular risk, and a normal factory reset will not fully remove the rootkit once it writes into the system partition.

How the malware stayed quiet

McAfee says the campaign name comes from a silent audio resource called R.raw.novioce, a deliberate misspelling of “no voice.” The file plays at zero volume to keep a foreground service alive while staying effectively invisible to the user.

The malware also hid its early payload in what looked like a normal image file. McAfee says the encrypted malicious content sat after the PNG end marker, so the file still rendered normally while carrying a hidden payload. That helped the apps pass casual inspection and simple scanning.

Google says Play Protect checks apps and devices for harmful behavior, can warn users about malicious apps, and may disable or remove harmful apps automatically. Even so, this campaign shows that bad apps can still get through and stay live long enough to rack up major install numbers before detection and removal.

What the attackers wanted

McAfee says the only theft module it recovered targeted WhatsApp. The payload copied WhatsApp’s encrypted database, extracted session-related keys and account data, and sent the stolen information to attacker infrastructure so the operators could clone the victim’s session on another device.

SELinux enforcement disabled as part of the exploit chain (Source – McAfee)

That does not mean WhatsApp was the only goal. McAfee says the framework was plugin-based and designed to accept any objective at runtime, which means the operators could push new payloads later without changing the original carrier app.

The attack infrastructure also remained active when McAfee published its research. That suggests the campaign had room to evolve even after the first public disclosure.

Key facts

ItemVerified detail
Campaign nameOperation NoVoice
DistributionMore than 50 apps on Google Play
ReachAt least 2.3 million downloads
Exploit count recovered22 exploits
Most exposed devicesOlder Android devices, especially Android 7 and lower
Patch threshold McAfee cited2021-05-01 or higher not susceptible to the recovered exploits
PersistenceCan survive factory reset on some rooted devices
Recovered theft payloadWhatsApp session cloning module

What Android users should do now

  • Check your Android security patch level and update it if your device still receives updates. Google says Play Protect works alongside Android security updates, and Android’s May 2021 bulletin states that security patch levels of 2021-05-01 or later address all issues associated with that patch level.
  • Keep Google Play Protect turned on. Google says it checks apps on install, scans devices periodically, and may disable or remove harmful apps automatically.
  • Remove suspicious cleaner, gallery, and utility apps you do not recognize, especially on older phones. McAfee says those app categories were common carriers in this campaign.
  • If you suspect a rooted infection on an older unsupported device, do not rely on a factory reset alone. McAfee says a full firmware reflash is required to fully restore a compromised device.
  • Treat WhatsApp and other account sessions as exposed if the device shows signs of compromise. Change passwords, re-register accounts, and review active sessions from a clean device. This recommendation follows from McAfee’s finding that the recovered payload targeted WhatsApp session data.

FAQ

Was NoVoice really on Google Play?

Yes. McAfee says all carrier apps in the campaign were distributed through Google Play and required no sideloading.

Did NoVoice infect 2.3 million devices?

Not necessarily. McAfee confirmed at least 2.3 million downloads across the malicious apps, but successful exploitation depended on device age, patch level, and exploit compatibility.

Can a factory reset remove NoVoice?

Not on the older rooted devices McAfee described. The researchers say the rootkit can survive a standard factory reset because it writes to the system partition, and only a clean firmware reflash fully removes it.

What was the only theft payload McAfee recovered?

McAfee says the only recovered payload targeted WhatsApp session cloning by stealing encryption databases, keys, and related account data.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages