{"id":6415,"date":"2026-02-27T08:21:01","date_gmt":"2026-02-27T08:21:01","guid":{"rendered":"https:\/\/blog.cortado.com\/android-backdoor-malware-was-admins-pruefen-muessen\/"},"modified":"2026-03-03T15:03:08","modified_gmt":"2026-03-03T15:03:08","slug":"android-backdoor-malware-what-admins-must-check","status":"publish","type":"post","link":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/","title":{"rendered":"Android Backdoor Malware: What Admins Must Check Now"},"content":{"rendered":"\n<p><strong>Backdoor malware such as Keenadu poses a significant security risk to corporate data. Learn how IT administrators can detect compromised devices and effectively secure them using Mobile Device Management.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/\/Android-Firmware-Backdoor-\u2013-Blog-Image-1024x683.png\" alt=\"\" class=\"wp-image-6413\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-1024x683.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-300x200.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-768x512.png 768w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The recently disclosed <strong>Android firmware backdoor \u201cKeenadu\u201d<\/strong> exemplifies a new generation of mobile threats: malicious code that does not operate as a conventional app, but is deeply embedded within the system. For IT administrators, this means security strategies must assume that compromised components may already exist at the system or firmware level.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-android-backdoor-malware\">What Is Android Backdoor Malware?<\/h2>\n\n\n\n<p>Android backdoor malware is a hidden malicious function integrated directly into a device\u2019s firmware or core system components. It enables attackers to maintain persistent access to the system without appearing as a regular app.<\/p>\n\n\n\n<p>Unlike app-based malware, it operates at the system level and can exfiltrate data, install additional malicious software, and bypass security mechanisms. Because it is deeply embedded in the system, it generally cannot be removed through a factory reset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-technical-classification-why-backdoor-malware-is-especially-critical\">Technical Classification: Why Backdoor Malware Is Especially Critical<\/h2>\n\n\n\n<p>Backdoor malware compromises the device\u2019s entire trust foundation because it can control or manipulate core system functions. As a result, attackers gain extensive system privileges and access to sensitive data.<\/p>\n\n\n\n<p>Traditional countermeasures such as uninstalling apps or performing a factory reset are typically ineffective. In many cases, only a complete firmware replacement or device replacement provides a secure solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-risk-for-enterprises-compromised-devices-as-an-entry-point\">Risk for Enterprises: Compromised Devices as an Entry Point<\/h2>\n\n\n\n<p>Firmware-based malware presents a substantial risk to enterprise environments because it undermines fundamental security assumptions.<\/p>\n\n\n\n<p><strong>Potential impacts include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exfiltration of sensitive corporate data<\/li>\n\n\n\n<li>Theft of credentials and authentication tokens<\/li>\n\n\n\n<li>Compromise of MFA sessions<\/li>\n\n\n\n<li>Use of the device as a pivot point for further attacks<\/li>\n<\/ul>\n\n\n\n<p>Environments using devices from unknown or untrusted manufacturers are particularly at risk, especially where centralized device management and compliance monitoring are lacking. In such scenarios, the integrity and security posture of deployed endpoints often cannot be reliably verified or enforced.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-security-checks-for-admins\"><strong>Key Security Checks for Admins<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-review-device-manufacturers-and-model-portfolio\">1. Review Device Manufacturers and Model Portfolio<\/h3>\n\n\n\n<p>The trustworthiness of the hardware and firmware source is a critical security factor.<\/p>\n\n\n\n<p>Recommended actions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy devices with regular security updates<\/li>\n\n\n\n<li>Use devices with a clearly defined support lifecycle<\/li>\n\n\n\n<li>Prefer certified enterprise-grade devices<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-centrally-control-app-installation\">2. Centrally Control App Installation<\/h3>\n\n\n\n<p>Even though firmware malware is not exclusively distributed via apps, applications remain a relevant infection vector.<\/p>\n\n\n\n<p>Best practices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use a centrally managed app store<\/li>\n\n\n\n<li>Restrict installations to approved applications<\/li>\n\n\n\n<li>Disable sideloading and unknown sources<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-continuously-monitor-device-compliance\">3. Continuously Monitor Device Compliance<\/h3>\n\n\n\n<p>Important indicators of potential compromise include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unknown or unexpected system components<\/li>\n\n\n\n<li>Suspicious installation activities<\/li>\n\n\n\n<li>Deviations from expected system integrity<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-tie-access-to-corporate-resources-to-device-status\">4. Tie Access to Corporate Resources to Device Status<\/h3>\n\n\n\n<p>A device that does not comply with security policies must not be granted access to critical resources.<\/p>\n\n\n\n<p>Access to the following should be linked to the device\u2019s compliance status:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>VPN and internal systems<\/li>\n\n\n\n<li>Email<\/li>\n\n\n\n<li>Corporate applications<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-cortado-mdm-effectively-reduces-risk\">How Cortado MDM Effectively Reduces Risk<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.cortado.com\/en\/\">Cortado MDM<\/a> provides the foundation for securely integrating Android devices into enterprise IT environments. The Mobile Device Management solution ensures that security requirements are consistently enforced and that risks can be detected and mitigated early.<\/p>\n\n\n\n<p>With Cortado MDM, organizations can:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enforce Security Standards<\/h3>\n\n\n\n<p>Devices must meet defined requirements, such as up-to-date security patches, active encryption, and secure screen locks. This reduces the overall attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Control Access to Corporate Data Based on Risk<\/h3>\n\n\n\n<p>Access to email, applications, and enterprise systems can be tied to the device\u2019s security posture. Devices identified as high-risk can be restricted accordingly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Manage App Installation and Usage<\/h3>\n\n\n\n<p>Specific apps can be blocked, and installation from insecure sources such as third-party app stores can be restricted. This minimizes the risk of malware entering the device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enforce Google Play Protect<\/h3>\n\n\n\n<p>Google Play Protect is a core Android security mechanism that regularly scans apps and warns about harmful software. With Cortado MDM, organizations can ensure that this protection remains active and cannot be disabled by users or malware. This preserves an essential built-in security layer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Isolate Corporate Data<\/h3>\n\n\n\n<p>Business information is stored in a protected workspace. Even if the device as a whole poses a risk, access to corporate data remains controlled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Respond Quickly in Critical Situations<\/h3>\n\n\n\n<p>If a device is classified as potentially insecure, IT can take immediate action, such as restricting access to corporate resources or removing business data.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cortado.com\/en\/\">Cortado MDM<\/a>  therefore establishes the key prerequisites for significantly minimizing malware infection risks, making security incidents visible, and responding appropriately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>Firmware-based Android backdoors such as Keenadu demonstrate that mobile threats are increasingly establishing themselves below the app layer. Defensive strategies must therefore expand beyond app management to focus on the integrity of the entire device.<\/p>\n\n\n\n<p>For enterprises, centralized control, clear device policies, and continuous monitoring are essential to effectively address this class of threat.<\/p>\n\n\n\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-neutral-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">Ready to secure your Android devices against advanced mobile threats? Book your <strong>free consultation<\/strong> today.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/go.cortado.com\/meetings\/michael-roediger\/expert-meeting\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-base-color\">Book a call now<\/mark><\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Backdoor-Malware wie Keenadu stellen ein erhebliches Sicherheitsrisiko f\u00fcr Unternehmensdaten dar. Erfahren Sie, wie IT-Admins kompromittierte Ger\u00e4te erkennen und mit Mobile Device Management effektiv absichern.<\/p>\n","protected":false},"author":6,"featured_media":6413,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[437],"tags":[38],"class_list":["post-6415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-management-hands-on","tag-android-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android Backdoor Malware: What Admins Must Check Now<\/title>\n<meta name=\"description\" content=\"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Backdoor Malware: What Admins Must Check Now\" \/>\n<meta property=\"og:description\" content=\"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-27T08:21:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T15:03:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Linda Martin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linda Martin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\"},\"author\":{\"name\":\"Linda Martin\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794\"},\"headline\":\"Android Backdoor Malware: What Admins Must Check Now\",\"datePublished\":\"2026-02-27T08:21:01+00:00\",\"dateModified\":\"2026-03-03T15:03:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\"},\"wordCount\":811,\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\",\"keywords\":[\"Android Management\"],\"articleSection\":[\"Mobile Management \u2013 Hands-On\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\",\"name\":\"Android Backdoor Malware: What Admins Must Check Now\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\",\"datePublished\":\"2026-02-27T08:21:01+00:00\",\"dateModified\":\"2026-03-03T15:03:08+00:00\",\"description\":\"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Backdoor Malware: What Admins Must Check Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794\",\"name\":\"Linda Martin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g\",\"caption\":\"Linda Martin\"},\"url\":\"https:\/\/blog.cortado.com\/en\/author\/dani\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Android Backdoor Malware: What Admins Must Check Now","description":"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/","og_locale":"en_US","og_type":"article","og_title":"Android Backdoor Malware: What Admins Must Check Now","og_description":"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.","og_url":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/","og_site_name":"Cortado Blog","article_published_time":"2026-02-27T08:21:01+00:00","article_modified_time":"2026-03-03T15:03:08+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png","type":"image\/png"}],"author":"Linda Martin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linda Martin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#article","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/"},"author":{"name":"Linda Martin","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794"},"headline":"Android Backdoor Malware: What Admins Must Check Now","datePublished":"2026-02-27T08:21:01+00:00","dateModified":"2026-03-03T15:03:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/"},"wordCount":811,"publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png","keywords":["Android Management"],"articleSection":["Mobile Management \u2013 Hands-On"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/","url":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/","name":"Android Backdoor Malware: What Admins Must Check Now","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png","datePublished":"2026-02-27T08:21:01+00:00","dateModified":"2026-03-03T15:03:08+00:00","description":"Backdoor malware such as Keenadu pose a significant security risk to corporate data. Learn how to detect compromised devices and secure them.","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"Android Backdoor Malware: What Admins Must Check Now"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794","name":"Linda Martin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g","caption":"Linda Martin"},"url":"https:\/\/blog.cortado.com\/en\/author\/dani\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/6415"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=6415"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/6415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/6413"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=6415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/categories?post=6415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/tags?post=6415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}