Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 948

Rooting (Android)

What is Rooting (Android)?

Rooting (Android)Gaining unrestricted superuser (root) privileges on an Android device, bypassing the protections enforced by the Linux kernel, SELinux, and the Android verified boot chain.


Rooting Android usually means installing a su binary and a manager such as Magisk so any app can request elevated privileges, often after unlocking the bootloader and flashing a custom boot image. Modern Android resists this through Verified Boot (AVB), SELinux in enforcing mode, dm-verity, and the Play Integrity API, which signals to relying apps that a device is no longer in a verified state. Rooting gives users full control of the system, but it also breaks app sandbox isolation, can disable Google SafetyNet/Play Integrity attestation, and is a favorite escalation step for Android malware families such as BRATA and SharkBot. Banking, MDM, and DRM apps commonly refuse to run on rooted devices.

Examples

  1. 01

    A user unlocks the bootloader and uses Magisk to gain root and hide that fact from Play Integrity.

  2. 02

    An Android trojan asks the user to grant Magisk root in order to read SMS messages used for 2FA.

Frequently asked questions

What is Rooting (Android)?

Gaining unrestricted superuser (root) privileges on an Android device, bypassing the protections enforced by the Linux kernel, SELinux, and the Android verified boot chain. It belongs to the Mobile Security category of cybersecurity.

What does Rooting (Android) mean?

Gaining unrestricted superuser (root) privileges on an Android device, bypassing the protections enforced by the Linux kernel, SELinux, and the Android verified boot chain.

How does Rooting (Android) work?

Rooting Android usually means installing a su binary and a manager such as Magisk so any app can request elevated privileges, often after unlocking the bootloader and flashing a custom boot image. Modern Android resists this through Verified Boot (AVB), SELinux in enforcing mode, dm-verity, and the Play Integrity API, which signals to relying apps that a device is no longer in a verified state. Rooting gives users full control of the system, but it also breaks app sandbox isolation, can disable Google SafetyNet/Play Integrity attestation, and is a favorite escalation step for Android malware families such as BRATA and SharkBot. Banking, MDM, and DRM apps commonly refuse to run on rooted devices.

How do you defend against Rooting (Android)?

Defences for Rooting (Android) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Rooting (Android)?

Common alternative names include: Android root.

Related terms