No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Android OS |
Advisory ID: |
ngCERT-2026-020002 |
Version: |
nil |
CVE: |
CVE-2012-6422 and CVE-2013-6282 |
Published: |
March 3, 2026 |
ngCERT is issuing an alert on the Android systems compromised by multiple malware families, including Android Backdoor, Prizmes (BADBOX-related), Hummer (HummingBad), Rootnik, Triada, and Uupay. These malwares leverage vulnerabilities The combined impact of these malware variants is severe, with consequences including loss of sensitive data, financial fraud, device instability, large-scale botnet participation, and erosion of user trust in mobile ecosystems. Given the widespread use of Android devices across the nation, ngCERT strongly urges government agencies, enterprises, and individuals to promptly apply the latest security patches and adopt proactive security measures to mitigate these threats.
The aforementioned malware families compromise devices through firmware pre-installation, repackaged apps, or malicious downloads from third-party sources, exploiting the supply chain or user installations. Capabilities include rooting for privilege escalation, data exfiltration, ad fraud, credential theft, SMS interception, and backdoor access. Variants like Triada and Prizmes/BADBOX embed in system partitions for persistence post factory reset, while Hummer and Rootnik leverage exploits such as CVE-2012-6422 and CVE-2013-6282 for rooting, and Uupay enables ad pushing and data collection. Once root access is gained, injections into system processes like Zygote is carried out for persistence. This further enables activities such as data theft, credential interception, ad fraud, botnet integration, remote control, additional malware deployment, and evasion of security measures.
Successful exploitation may result in:
Organisations and individuals are strongly advised to:

