DNS Analysis of the Keenadu Backdoor Network
A backdoor dubbed “Keenadu” has been identified in the firmware of certain Android devices, likely introduced through a malicious static library linked with libandroid_runtime.so during the firmware build process or delivered via compromised OTA updates. The malware acts as a multistage loader, enabling remote control of infected devices and supporting activities such as search hijacking and app monetization.
Securelist identified1 several IoCs associated with the threat. Building on these, we analyzed 29 refined IoCs, leading to these findings:















