Feb 19, 2026

Rapid Response: Zimperium's Zero Day Coverage of Keenadu — A Firmware-Level Android Backdoor That Escapes Traditional Defenses

A new firmware-level Android backdoor dubbed Keenadu has been uncovered by Securelist, revealing an advanced and deeply embedded threat that goes beyond traditional app-based malware. Unlike ordinary malicious applications, Keenadu installs itself during the device firmware build process, embedding into a core shared library that is loaded into the Android runtime and then injected into the Zygote process, the parent process responsible for launching all Android apps. This enables the backdoor to run within the context of every app on the device, bypassing standard sandboxing and permission boundaries that typically constrain mobile threats.

Keenadu’s presence at the firmware level means it can persist on a device before the user ever completes setup, and in some cases has been confirmed to arrive via compromised firmware images or even OTA updates. Once active, the backdoor functions as a multi-stage loader, allowing operators to remotely control the infected device, intercept app behavior, and execute malicious payloads. In many observed cases, payload modules associated with Keenadu exhibited ad fraud-oriented behavior, hijacking browser search engines, monitoring installs, and manipulating advertising elements. However, the underlying backdoor mechanism remains capable of providing unrestricted control over the device — a capability that could be adapted for more harmful operations such as data exfiltration, surveillance, or lateral movement across enterprise networks.

The research highlights how Keenadu shares traits with previously documented firmware-level threats like Triada and demonstrates links to other prolific Android botnets such as BADBOX and Vo1d, suggesting a broader ecosystem of deeply embedded Android malware. Because the compromise occurs at the supply chain or firmware build stage, traditional app store vetting, signature-based detection, and endpoint security approaches are often ineffective at preventing initial infection or ensuring the integrity of device software.

Both Zimperium’s Mobile Threat Defense (MTD) and Runtime Application Protection (zDefend) provide zero-day coverage against the reported samples. Moreover, Zimperium’s own telemetry has validated detections of these samples across multiple active environments.

For enterprises, the emergence of Keenadu underscores a critical shift in mobile risk: threats are no longer confined to apps downloaded from third-party sources or sideloaded by unwitting users. Instead, supply chain compromises and firmware-integrated backdoors can undermine device integrity at the highest level, exposing corporate data, authentication credentials, and sensitive business workflows without any explicit user action. Devices compromised at this depth can serve as persistent footholds into corporate environments, enabling remote control, credential harvesting, and lateral pivoting into enterprise systems that rely on mobile endpoints for secure access.

The discovery of Keenadu serves as a stark reminder that firmware integrity must be considered a core part of mobile security. Organizations should demand transparency and supply chain assurance from device manufacturers, deploy rigorous firmware validation, and extend mobile threat detection to include behavior-based analysis that operates on the device itself. Only by combining enterprise-grade runtime protection with real-time threat intelligence and anomaly detection can enterprises stay ahead of advanced threats that bypass traditional defenses and embed themselves deep within the mobile stack.