Recommended

Android Malware, Security Update, Latest News: Pre-Installed Malware Detected in Almost 40 Devices

Several Android smartphones are being shipped infected with pre-installed malware.

According to a report published by San Carlos, California-based cybersecurity company Check Point Software Technologies on Friday, March 10, a severe infection was detected in 36 Android devices belonging to a large telecommunications company as well as a multinational technology company.

The findings of Check Point's research revealed that the malware was not downloaded to the device because of the user's use. Instead, the malware was already installed on the gadgets even before the users acquired them.

Get Our Latest News for FREE

Subscribe to get daily/weekly email with the top stories (plus special offers!) from The Christian Post. Be the first to know.

In their report, Check Point Mobile Research Team's Oren Koriat said, "The discovery of the pre-installed malware raises some alarming issues regarding mobile security. Users could receive devices which contain backdoors or are rooted without their knowledge."

The malicious apps were actually not part of the official ROM supplied by the vendor, but they were somehow added to devices somewhere along the supply chain. Six of the malware cases identified by Check Point were determined to have been installed to the ROM using system privileges. Hence, in order to disinfect the device from the malware, the gadget's firmware must be completely reinstalled.

"This finding proves that, even if a user is extremely careful, never clicks a malicious link, or downloads a fishy app, he can still be infected by malware without even knowing it," Check Point Mobile Threat Researcher Daniel Padon told Ars Technica. "This should be a concern for all mobile users."

The pre-installed malware detected on the devices by the cybersecurity company were mostly info-stealers and rough ad networks, including mobile ransomware Slocker. This malware uses an encryption algorithm to encrypt all the files on the mobile device. To get the decryption key, a ransom is demanded in return.

However, the most notable rough adnet detected on the devices is the Loki Malware, which steals data about the device and installs itself to the system in order to take full control of it. This allows the malware to display illegitimate advertisements and generate revenue.

In order to protect themselves from various malware, regular and pre-installed, the cybersecurity firm advised users to implement "advanced security measures" which will be able to identify and block any abnormality in their devices' behavior.

Was this article helpful?

Help keep The Christian Post free for everyone.

By making a recurring donation or a one-time donation of any amount, you're helping to keep CP's articles free and accessible for everyone.

We’re sorry to hear that.

Hope you’ll give us another try and check out some other articles. Return to homepage.