سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

Operation NoVoice: Android Rootkit on Google Play Threatens Mobile Banking Security

McAfee uncovers Operation NoVoice — a rootkit infecting 2.3M Android devices via Google Play that survives factory resets and clones WhatsApp sessions. Critical implications for Saudi financial institutions.

F
FyntraLink Team

McAfee researchers have uncovered Operation NoVoice — a sophisticated Android rootkit campaign that infected over 2.3 million devices through 50+ legitimate-looking apps on Google Play. The malware exploits 22 known kernel vulnerabilities to gain root access, replaces core system libraries, and survives factory resets. For Saudi financial institutions where employees and customers rely on mobile banking and WhatsApp-based communications, this campaign represents a direct threat to session integrity and data confidentiality.

How Operation NoVoice Works: From Clean App to Full Device Compromise

The attack chain begins with innocuous-looking utility apps — cleaners, image galleries, and casual games — published on Google Play with no visible malicious behavior. Once installed, the app silently contacts a command-and-control (C2) server, fingerprints the device's hardware, Android version, and security patch level, then downloads a tailored exploit package. McAfee's analysis recovered 22 distinct exploits targeting vulnerabilities patched between 2016 and 2021, including advanced kernel-level attacks against IPv6 use-after-free flaws and Mali GPU driver bugs. One particularly sophisticated chain executes a three-stage kernel attack: exploiting an IPv6 vulnerability, leveraging a Mali GPU driver flaw, then patching kernel credentials to fully disable SELinux protections.

CsKaitno.d: A Rootkit That Survives Factory Resets

After obtaining root privileges, NoVoice deploys a rootkit component identified as CsKaitno.d. This component replaces critical system libraries — specifically libandroid_runtime.so and libmedia_jni.so — with hooked wrappers that intercept system calls and redirect execution to attacker-controlled code. The rootkit establishes multiple persistence layers: recovery scripts ensure reinstallation after reboots, the system crash handler is replaced with a rootkit loader, and fallback payloads are stored on the system partition. Because the system partition is not wiped during a standard factory reset, the malware persists even after the most aggressive user-initiated cleanup. A watchdog process runs every 60 seconds to verify the rootkit remains active, reinstalling components if any are removed.

WhatsApp Session Cloning: The Primary Payload

Once the rootkit is active, every app the user opens is injected with attacker-controlled code. McAfee recovered a payload specifically designed to execute when WhatsApp launches. This payload harvests all session tokens, encryption keys, and authentication data needed to clone the victim's WhatsApp account on a remote device. While researchers confirmed that the modular architecture supports payloads for any application on the device, the WhatsApp-targeting module was the primary payload recovered from C2 infrastructure. For organizations where WhatsApp serves as a communication channel for sensitive business discussions — common across Saudi financial institutions — this represents a significant data exfiltration vector.

Impact on Saudi Financial Institutions and Regulatory Exposure

The NoVoice campaign carries substantial implications for SAMA-regulated entities. Under the SAMA Cyber Security Framework (CSCC), Domain 3 (Cyber Security Operations and Technology) mandates mobile device management controls and endpoint protection for any device accessing banking systems. Institutions that permit BYOD policies without enforcing minimum Android security patch levels are directly exposed. The NCA Essential Cybersecurity Controls (ECC) similarly require organizations to maintain updated systems and implement endpoint detection capabilities — requirements that NoVoice specifically circumvents by targeting unpatched devices. From a PDPL perspective, the exfiltration of WhatsApp session data — which may include customer personal information shared via messaging — constitutes a reportable data breach under Saudi Arabia's Personal Data Protection Law. Financial institutions must consider that employee devices compromised by NoVoice could leak customer data, internal communications, and authentication credentials for mobile banking platforms.

Why This Bypasses Standard Mobile Security Controls

NoVoice is particularly dangerous because it operates below the application layer. Traditional Mobile Threat Defense (MTD) solutions that monitor app behavior and network traffic may not detect kernel-level rootkits that have already disabled SELinux and replaced system libraries. The malware was distributed through Google Play — the trusted source that most enterprise MDM solutions whitelist by default. Google has since removed all 50+ identified apps and confirmed that Play Protect now detects NoVoice variants, but the campaign highlights a fundamental gap: supply chain trust in app stores does not guarantee the absence of sophisticated threats. Devices already infected require reflashing the firmware, not just a factory reset.

Recommendations for CISOs and Security Teams

  1. Enforce minimum security patch levels: Configure your MDM solution to block access to corporate resources from any Android device with a security patch level earlier than 2021-05-01. All 22 exploits used by NoVoice target vulnerabilities patched by that date.
  2. Audit BYOD policies immediately: Identify all employee-owned Android devices accessing corporate email, VPN, or banking systems. Devices running Android 10 or earlier without recent security patches should be flagged and remediated.
  3. Deploy kernel integrity monitoring: Implement solutions that verify system library integrity (particularly libandroid_runtime.so and libmedia_jni.so) and detect SELinux policy modifications at the kernel level.
  4. Restrict WhatsApp for sensitive communications: Establish approved enterprise messaging platforms with end-to-end encryption and centralized key management. Prohibit sharing customer PII or regulatory data via consumer messaging apps.
  5. Update incident response playbooks: Add mobile rootkit scenarios to your IR procedures. Include firmware reflashing as the remediation step — document that factory reset is insufficient for kernel-level compromises.
  6. Review Google Play app approvals: If your organization maintains a managed Google Play store for enterprise devices, audit all approved utility apps against McAfee's published indicators of compromise (IoCs) for Operation NoVoice.
  7. Report to SAMA if affected: Under SAMA's incident reporting requirements, any confirmed NoVoice infection on a device with access to banking systems should be reported within the mandated timeframe, with details on potential data exposure.

Conclusion

Operation NoVoice demonstrates that mobile threats have evolved far beyond adware and phishing apps. Kernel-level rootkits distributed through trusted app stores, capable of surviving factory resets and cloning encrypted messaging sessions, represent a new class of risk for financial institutions. Saudi organizations under SAMA and NCA oversight must treat mobile endpoint security with the same rigor applied to servers and workstations — enforcing patch compliance, monitoring system integrity, and assuming that app store trust alone is not a sufficient control.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment that includes mobile security posture evaluation and BYOD policy review.