Actively Exploited 'GhostTouch' Zero-Day in Androis Allows Silent Malware Installation

'GhostTouch' Zero-Day (CVE-2026-31999) in Androis OS Allows No-Interaction App Installation

CRITICAL
February 16, 2026
5m read
VulnerabilityMobile SecurityMalware

Impact Scope

People Affected

Billions of users

Industries Affected

Technology

Related Entities

Organizations

Google's Project Zero Google Androis Open Source Project (AOSP)

Products & Tech

Androis

Other

GhostTouch

CVE Identifiers

CVE-2026-31999
CRITICAL
CVSS:9.3

Full Report

Executive Summary

Google's Project Zero has revealed the existence of CVE-2026-31999, a critical zero-day vulnerability in the Androis mobile operating system. Dubbed 'GhostTouch', the flaw enables attackers to remotely and silently install arbitrary applications onto a target device without any user interaction beyond visiting a malicious website. The vulnerability is confirmed to be under active, targeted exploitation in the wild. It affects Androis versions 14, 15, and the beta of 16, putting billions of users at risk. A patch has been released to the Androis Open Source Project (AOSP), but its delivery to end-users will be delayed due to carrier and manufacturer update cycles, creating a significant window of exposure for the majority of the Androis user base.


Vulnerability Details

CVE-2026-31999 ('GhostTouch') is a flaw in the background installation service of the Androis operating system. An attacker can exploit it by crafting a malicious webpage with a specific JavaScript payload.

  • CVE ID: CVE-2026-31999
  • CVSS Score: 9.3 (Assigned based on description)
  • Attack Vector: Network (via web browser)
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required (victim must visit a malicious page)

When a user on a vulnerable device visits the malicious page, the JavaScript payload triggers the flaw in the background service. This service then downloads and installs an Android Package Kit (APK) from an attacker-controlled server. The entire process is invisible to the user—there are no permission prompts, notifications, or other on-screen indicators.

Affected Systems

  • Product: Androis Operating System
  • Affected Versions:
    • Androis 14
    • Androis 15
    • Androis 16 (Beta)

This wide range of affected versions means a vast majority of modern Androis smartphones and tablets are vulnerable until they receive a security update containing the patch.

Exploitation Status

Google's Project Zero has confirmed that CVE-2026-31999 is being actively exploited in the wild. The attacks are described as 'highly targeted', suggesting they are being used against specific individuals of interest, such as journalists, activists, and dissidents, for the purpose of installing advanced spyware. The identity of the threat actor has not been disclosed, but the sophistication points towards a well-resourced group, possibly a commercial spyware vendor or a nation-state actor.

Impact Assessment

  • Total Device Compromise: By silently installing a malicious application, an attacker can gain complete control over a user's device. A spyware app could access the microphone, camera, GPS location, messages, call logs, and contacts.
  • Data Theft: All personal and corporate data on the device is at risk of being stolen.
  • Surveillance: The exploit turns the user's phone into a sophisticated surveillance device in their pocket.
  • Credential Theft: The malicious app can use keyloggers or overlay screens to steal passwords for banking, email, and other sensitive accounts.

The 'zero-click' nature of the installation (post-visiting the webpage) makes this an exceptionally dangerous exploit, as it requires no further action or mistake from the user to be compromised.

Detection & Remediation

For end-users, detection is extremely difficult as the exploit is designed to be silent.

  1. Check for Unrecognized Apps: Users can manually review their list of installed applications for anything they do not recognize. However, sophisticated spyware often disguises itself with a generic name and icon (e.g., 'Sync Service').
  2. Apply Security Updates: The only effective remediation is to install the security patch from Google. Users should go to Settings > System > System update and install any available updates immediately. See M1051 - Update Software.
  3. Use Mobile Threat Defense (MTD): In a corporate environment, MTD solutions can help detect the installation of malicious apps or anomalous network traffic originating from a compromised device.

Mitigation

While waiting for the patch, users can take steps to reduce their risk:

  1. Be Wary of Links: Exercise extreme caution when clicking links from emails, text messages, or social media, especially if they are unsolicited or suspicious. This is the primary way users are directed to malicious webpages.
  2. Use a Secure Browser: Use a mobile browser with strong security features, such as Google Chrome with Enhanced Safe Browsing enabled, which can help block malicious sites.
  3. Reboot Regularly: While not a complete fix, rebooting a device can sometimes disrupt the persistence of certain types of malware, forcing it to re-establish itself and creating an opportunity for detection.
  4. Limit App Installations: In Androis settings, ensure that 'Install unknown apps' is disabled for all applications, especially web browsers. While this exploit bypasses normal prompts, this setting is still a critical layer of defense.

Timeline of Events

1
February 16, 2026
This article was published

MITRE ATT&CK Mitigations

The most critical mitigation is to apply the security update from Google as soon as it becomes available for the device.

Use web filtering and be cautious about clicking links to avoid visiting the malicious pages that trigger the exploit.

Mobile Threat Defense (MTD) solutions may be able to detect the installation or behavior of the malicious payload.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

zero-dayAndroidmobile securityvulnerabilityspywareProject ZeroRCE

📢 Share This Article

Help others stay informed about cybersecurity threats