The NoVoice malware family targets Android devices by exploiting publicly known vulnerabilities to escalate privileges and gain root access. Distributed through over 50 malicious applications on the Google Play Store, these apps have collectively surpassed 2.3 million downloads, posing a widespread threat to Android users.

NoVoice leverages vulnerabilities such as CVE-2021-1048 and CVE-2020-0041, which affect Android's system components and allow privilege escalation. By exploiting these flaws, NoVoice bypasses Android's security model to obtain root-level control, enabling extensive system manipulation.

Once installed, NoVoice establishes persistence by embedding itself into system processes and modifies startup scripts to maintain execution after device reboot. The malware implements data exfiltration capabilities, collecting sensitive user information, including contact lists, SMS messages, call logs, and device identifiers. NoVoice communicates with command and control (C2) servers via encrypted channels, receiving instructions for further payload delivery and remote commands.

The malware's delivery mechanism relies heavily on social engineering, posing as legitimate utility or media applications to evade initial detection by users and automated security controls. The affected apps were found in multiple categories, including photo editors and system optimization tools.

Google has removed identified NoVoice-infected applications from the Play Store following coordinated vulnerability disclosures and threat intelligence sharing between Google Threat Analysis Group (TAG) and cybersecurity vendors such as Kaspersky and Trend Micro.

Affected platforms include Android versions 8.0 (Oreo) through 11 (R). Devices running these versions without timely security patches remain vulnerable to the exploit chains used by NoVoice.

Detection signatures for NoVoice include heuristic analysis of root-level process injections, network traffic anomalies targeting known C2 domains, and file system modifications of critical Android directories. Endpoint detection and response (EDR) solutions from vendors like CrowdStrike and SentinelOne have released specific detection modules for NoVoice indicators of compromise (IOCs).

Removal guidance involves performing a full device factory reset after backing up essential data, as standard uninstallation methods do not fully eliminate root-level implants. Updating the device to the latest security patches released by OEMs is critical to prevent reinfection. Security teams should monitor network traffic for unusual encrypted communications originating from mobile devices and scan for the presence of known NoVoice file hashes.

References:

  • CVE-2021-1048: Android system privilege escalation vulnerability
  • CVE-2020-0041: Android kernel privilege escalation vulnerability
  • Google Threat Analysis Group advisories
  • Vendor detection signatures from Kaspersky, Trend Micro, CrowdStrike

SOC analysts and mobile security teams must prioritize scanning for NoVoice indicators across enterprise Android devices and enforce patch management policies to mitigate ongoing risks.