Billions of users
Google's Project Zero has revealed the existence of CVE-2026-31999, a critical zero-day vulnerability in the Androis mobile operating system. Dubbed 'GhostTouch', the flaw enables attackers to remotely and silently install arbitrary applications onto a target device without any user interaction beyond visiting a malicious website. The vulnerability is confirmed to be under active, targeted exploitation in the wild. It affects Androis versions 14, 15, and the beta of 16, putting billions of users at risk. A patch has been released to the Androis Open Source Project (AOSP), but its delivery to end-users will be delayed due to carrier and manufacturer update cycles, creating a significant window of exposure for the majority of the Androis user base.
CVE-2026-31999 ('GhostTouch') is a flaw in the background installation service of the Androis operating system. An attacker can exploit it by crafting a malicious webpage with a specific JavaScript payload.
When a user on a vulnerable device visits the malicious page, the JavaScript payload triggers the flaw in the background service. This service then downloads and installs an Android Package Kit (APK) from an attacker-controlled server. The entire process is invisible to the user—there are no permission prompts, notifications, or other on-screen indicators.
This wide range of affected versions means a vast majority of modern Androis smartphones and tablets are vulnerable until they receive a security update containing the patch.
Google's Project Zero has confirmed that CVE-2026-31999 is being actively exploited in the wild. The attacks are described as 'highly targeted', suggesting they are being used against specific individuals of interest, such as journalists, activists, and dissidents, for the purpose of installing advanced spyware. The identity of the threat actor has not been disclosed, but the sophistication points towards a well-resourced group, possibly a commercial spyware vendor or a nation-state actor.
The 'zero-click' nature of the installation (post-visiting the webpage) makes this an exceptionally dangerous exploit, as it requires no further action or mistake from the user to be compromised.
For end-users, detection is extremely difficult as the exploit is designed to be silent.
Settings > System > System update and install any available updates immediately. See M1051 - Update Software.While waiting for the patch, users can take steps to reduce their risk:
The most critical mitigation is to apply the security update from Google as soon as it becomes available for the device.
Use web filtering and be cautious about clicking links to avoid visiting the malicious pages that trigger the exploit.
Mobile Threat Defense (MTD) solutions may be able to detect the installation or behavior of the malicious payload.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats