DKFBootKit replaces certain boot processes and can begin running even before the system is completely booted up. Malware repackages legitimate apps by enclosing its own malicious payloads in them. NQ says the malicious code has already infected 1,657 Android devices in the past two weeks and has appeared on at least 50 different mobile apps. In order to avoid being infected by this beast, NQ recommends three commonsense steps: download a security app that can scan your apps for you to search for malicious code.
Source: https://thehackernews.com/2012/03/dkfbootkit-first-android-bootkit.html

