Complete History of Android Hacks
A comprehensive timeline of security breaches, exploits, and vulnerabilities affecting Android devices from 2008 to 2025
Pegasus on Android: Chrysaor Spyware
While Pegasus is most famous on iOS, the Android version called Chrysaor is equally dangerous. Developed by NSO Group, it provides complete remote access to Android devices.
What Chrysaor/Pegasus Can Do on Android:
- Root Android devices to gain complete system control
- Read all messages, emails, and encrypted communications
- Access all files, photos, and videos
- Record calls, activate microphone and camera remotely
- Track location and log all device activity
- Extract passwords and browsing history
- Install additional malware modules
September 2025: CVE-2025-21043 Samsung Zero-Day
Samsung released emergency patches for a critical zero-day vulnerability being actively exploited in targeted attacks against Android users. The vulnerability had a CVSS score of 8.8 (Critical).
Impact:
- Actively exploited in the wild before patch
- Critical severity vulnerability
- Affected Samsung Android devices globally
- Required immediate security update
September 2025: Google Patches Two Android Zero-Days
Google's September security update addressed 120 software defects including two actively exploited zero-day vulnerabilities affecting all Android devices.
Details:
- Two zero-day vulnerabilities exploited in the wild
- 120 total security defects patched
- Affected all Android versions
- Added to CISA's Known Exploited Vulnerabilities catalog
2024-2025: BadBox 2.0 Botnet
Over 1 million Android devices were compromised by the BadBox botnet, which came pre-installed on budget Android devices and smart TVs, creating a massive botnet for cybercriminals.
Scope:
- 1+ million infected Android devices
- Pre-installed malware on budget devices
- Used for ad fraud, residential proxies, and data theft
- Affected smart TVs, tablets, and smartphones
- Extremely difficult to remove without firmware reflash
August 2024: Gigabud Malware Campaign
Sophisticated global malware campaign targeting banking apps worldwide, linked to the notorious Spynote Android RAT (Remote Access Trojan).
Capabilities:
- Complete remote access to infected devices
- Banking credential theft
- Screen recording and keylogging
- SMS interception for 2FA bypass
- Distributed via phishing websites posing as banks
2022-2023: NSO Pegasus Spyware Returns
NSO Group's Pegasus spyware continued targeting both Android and iOS devices with new zero-click exploit chains, targeting civil society members, journalists, and human rights defenders.
Notable Targets:
- Mexican human rights defenders
- Journalists from multiple countries
- Zero-click exploits requiring no user interaction
- Both Android and iOS devices compromised
- Extensive forensic evidence documented by Citizen Lab
April 2017: Chrysaor - Pegasus for Android Discovered
Google and Lookout discovered Chrysaor, the Android version of NSO Group's Pegasus spyware. This marked the first documented evidence of professional-grade mobile spyware on Android with military-level sophistication.
Technical Details:
- Sophisticated Android spyware by NSO Group
- Could root devices to gain complete control
- Targeted activists, journalists, and dissidents
- Signs of professional cyber warfare development
- Estimated to have infected "dozens" of devices globally
- Used multiple zero-day exploits
August 2016: Quadrooter Vulnerabilities
Four critical vulnerabilities in Qualcomm chipset drivers affected over 900 million Android devices, allowing attackers to gain root access and complete device control.
Impact:
- 900+ million devices affected globally
- Allowed root access via malicious apps
- Affected devices with Qualcomm chipsets
- Complete device takeover possible
- Many devices never received patches
October 2016: Dirty Cow (CVE-2016-5195)
A critical Linux kernel vulnerability that existed for 9 years affected all Android devices. Attackers could gain root privileges and take complete control of devices.
Details:
- Existed undetected for 9 years (2007-2016)
- Affected ALL Android versions
- Allowed privilege escalation to root
- Used by malware to permanently root devices
- One of the longest-lived vulnerabilities in Android history
July 2015: Stagefright - The Worst Android Vulnerability
A series of critical vulnerabilities in Android's media playback engine affected 95% of Android devices (950 million devices). Attackers could execute code by simply sending a specially crafted MMS message - no user interaction required.
Why It Was Catastrophic:
- 950+ million devices vulnerable
- Zero-click exploit via MMS message
- No user interaction required for infection
- Complete device compromise possible
- Could execute before message notification appeared
- Many devices never received security patches
- Called "the mother of all Android vulnerabilities"
July 2014: FakeID Vulnerability
A vulnerability in Android's application signing system allowed malicious apps to impersonate trusted applications and gain elevated privileges.
Impact:
- Apps could impersonate legitimate apps
- Bypass Android's permission model
- Access sensitive data without user knowledge
- Affected Android versions 2.1 through 4.4
July 2013: Master Key Vulnerability
A cryptographic signature verification flaw allowed attackers to modify legitimate apps without breaking their signatures, affecting 99% of Android devices at the time.
What It Allowed:
- Modify legitimate apps to include malware
- Bypass Android's security verification
- Apps appeared authentic with valid signatures
- 99% of Android devices vulnerable
- Used in the wild by malware developers
2010-2011: Early Android Root Exploits
The early days of Android were plagued with numerous root exploits including "RageAgainstTheCage," "Exploid," and "GingerBreak" that allowed easy privilege escalation.
Notable Exploits:
- RageAgainstTheCage (2010): Used ADB daemon exploit
- Exploid (2010): udev privilege escalation
- GingerBreak (2011): Volume daemon exploit
- Demonstrated fundamental security weaknesses
- Easy to exploit by malware
- Led to massive security improvements in Android 4.0+
Android Security: The Numbers
According to CVE Details:
- 7,094+ documented vulnerabilities in Android OS
- Hundreds of zero-day exploits discovered over the years
- Millions of devices never receive security updates
- Most manufacturers abandon security updates after 2-3 years
- Stock Android from Google is the most secure, but still vulnerable
How GrapheneOS Protects Against These Exploits
GrapheneOS was built from the ground up to prevent these exact types of attacks:
- Hardened memory allocator: Prevents exploitation of memory corruption bugs like Stagefright
- Exploit mitigations: Makes privilege escalation attacks like Dirty Cow and Quadrooter ineffective
- Verified boot: Prevents persistent rootkits and firmware-level malware
- Enhanced sandboxing: Even if an app is compromised, damage is contained
- Network permissions: Control which apps can access the internet
- Sensor permissions: Control access to camera, microphone, and location
- Regular security updates: Patches applied faster than any Android manufacturer
- No bloatware: No pre-installed apps that could contain vulnerabilities
- Attestation: Cryptographically verifies system integrity
- Zero telemetry: No data sent to Google or manufacturers
⚠️ Critical Reality:
Standard Android devices from Samsung, Google, Xiaomi, and other manufacturers remain vulnerable to sophisticated attacks. Many older devices never receive patches for critical vulnerabilities. GrapheneOS is the only Android-based system hardened against military-grade spyware like Pegasus and advanced persistent threats.
Protect Yourself: Related Reading
GrapheneOS Features
See exactly how GrapheneOS hardens Android against Stagefright-class exploits.
iPhone Security Flaws
Compare with the timeline of iOS exploits, Pegasus and zero-click attacks.
Secure Phones
Browse pre-configured GrapheneOS phones ready to ship in Australia.
Degoogled Phones
No Google services, no telemetry — Android without the surveillance.
DV Safe Phones
Phones hardened for domestic violence survivors and at-risk users.
Phone Finder Quiz
Answer a few questions to find the right secure phone for you.
Privacy Blog
Latest writing on mobile threats, encryption and digital safety.
Secure Networks
Pair a hardened phone with a private SIM and trustworthy DNS.
Talk to an Expert
Australian-based support — get help choosing or migrating safely.
