Executive Summary
In February 2026, Kaspersky researchers uncovered a firmware-level backdoor named Keenadu embedded in Android tablets from multiple manufacturers, including Alldocube. This malware, integrated during the firmware build process, injects itself into the Zygote process, granting attackers extensive control over the device. Keenadu enables remote execution of malicious payloads, such as hijacking browser searches, monetizing app installations, and interacting with advertising elements. The backdoor has been detected in firmware dating back to August 2023, affecting over 13,700 users worldwide, with significant concentrations in Russia, Japan, Germany, Brazil, and the Netherlands. The discovery of Keenadu underscores the escalating threat of supply chain attacks targeting device firmware. This incident highlights the critical need for manufacturers to secure their development processes and for consumers to remain vigilant about device integrity. The integration of malware at such a fundamental level poses significant challenges for detection and removal, emphasizing the importance of robust security measures throughout the supply chain.
Why This Matters Now
The Keenadu backdoor exemplifies the growing sophistication of supply chain attacks, where malware is embedded directly into device firmware during manufacturing. This method allows attackers to compromise devices before they reach consumers, bypassing traditional security measures. The incident underscores the urgent need for enhanced security protocols in the manufacturing process and increased vigilance from both manufacturers and consumers to prevent such deeply embedded threats.
Attack Path Analysis
The Keenadu malware was embedded into Android device firmware during the build phase, leading to initial compromise. It then escalated privileges by injecting into the Zygote process, gaining control over all applications. The malware's architecture allowed it to move laterally within the device, infecting every app. It established command and control by communicating with attacker-controlled servers to download additional payloads. These payloads enabled data exfiltration, such as redirecting browser searches and tracking app installations. The impact included unauthorized control over devices, leading to ad fraud and potential data theft.
Kill Chain Progression
Initial Compromise
Description
Keenadu was embedded into the firmware during the build phase, compromising devices before they reached users.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Obfuscated Files or Information
Exploitation for Privilege Escalation
Broadcast Receivers
System Partition Cross-Contamination
Code Injection
Capture SMS Messages
Application Discovery
Network Service Scanning
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity
Control ID: Pillar 1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Consumer Electronics
Android tablet firmware supply chain attacks compromise device integrity, enabling unrestricted backdoor access that bypasses all security controls and app sandboxing mechanisms.
Telecommunications
Keenadu malware targets carrier apps and system processes, potentially compromising mobile network infrastructure and enabling unauthorized device control through firmware backdoors.
E-Learning
Educational tablets infected with firmware backdoors expose student data and learning platforms to unauthorized access, violating privacy regulations and institutional security policies.
Entertainment/Movie Production
Media consumption devices compromised by firmware malware enable ad fraud, content hijacking, and unauthorized interaction with streaming platforms and digital entertainment services.
Sources
- Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updateshttps://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.htmlVerified
- Keenadu the tablet conqueror and the links between major Android botnetshttps://securelist.com/keenadu-android-backdoor/118913/Verified
- Firmware-level Android backdoor found on tablets from multiple manufacturershttps://www.helpnetsecurity.com/2026/02/17/firmware-level-android-backdoor-keenadu-tablets/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely limit the malware's ability to escalate privileges, move laterally, and exfiltrate data, thereby reducing the attacker's operational reach and impact.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily secures cloud workloads, its principles could inspire similar embedded security measures in device firmware to detect and limit unauthorized code execution during the build phase.
Control: Zero Trust Segmentation
Mitigation: By enforcing strict segmentation policies, Aviatrix Zero Trust Segmentation could likely limit the malware's ability to escalate privileges by restricting unauthorized inter-process communications.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit the malware's lateral movement by enforcing strict communication policies between applications, reducing the spread of infection.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely detect and limit unauthorized outbound communications to attacker-controlled servers, reducing the malware's ability to receive commands.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit unauthorized data exfiltration by enforcing strict egress policies, reducing the leakage of sensitive information.
While Aviatrix CNSF focuses on cloud environments, its security principles could inspire similar measures in device security to limit unauthorized control and reduce the impact of malware.
Impact at a Glance
Affected Business Functions
- Device Security Management
- User Data Privacy
- Application Integrity
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of user data including personal information, browsing habits, and application usage due to unauthorized access by the Keenadu backdoor.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to limit the spread of malware within the network.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to unusual activities promptly.
- • Utilize Inline IPS (Suricata) to detect and prevent known exploit patterns and malicious payloads.
- • Deploy Cloud Native Security Fabric (CNSF) for real-time inspection and enforcement of security policies.
- • Regularly update and patch systems to mitigate vulnerabilities exploited by malware.



