Samsung, LG, and plenty android devices found with pre-installed malware

Last updated: January 24, 2024 Reading time: minutes
Disclosure
Share

A severe infection has been found in almost 38 android devices, belonging to a populous telecommunication company and multinational technology company, as mentioned by a multinational software provider check point software technologies in their blog.

In all the circumstances it is evident that the malware arrived with the device itself and was not downloaded as a result of customer’s use.

According to the findings, the malware already exists in the device, even before reaching to the users. However, the malware was not the part of the device’s actual ROM when provided by the vendor, yet it was injected somewhere along the supply chain.

The report says that in six cases a malicious actor, by accessing system privileges get through and supplemented the malware making impossible for the user to remove it which would only be eliminated by re-flashing the device.

“Most of the malware found to be pre-installed on the devices were info-stealers and rough ad networks, and one of them was Slocker, a mobile ransomware.” the check point report writes.

“Slocker uses the AES encryption algorithm to encrypt all files on the device and demand ransom in return for their decryption key. Slocker uses Tor for its C&C communications.”

Loki malware was the most notable rough adnet which targeted the device. The intricate malware works functions through accessing several different components; each has its own functionality and role in achieving the malware’s malicious goal.

Also, the malware presents illegitimate advertisements for revenue generating. Allowing the absolute control of the device and to acquire persistence, the malware as a part of its operation steals the device’s data and installs itself to the system.

Check Point Cyber Analyst Oren Koriat, in a blog post, noted that the most insidious aspect of pre-installed malware is that it can compromise the security of even the most careful users.

“The discovery of the pre-installed malware raises some alarming issues regarding mobile security. Users could receive devices which contain backdoors or are rooted without their knowledge,” he said.

“To protect themselves from regular and pre-installed malware, users should implement advanced security measures capable of identifying and blocking any abnormality in the device’s behavior.”

The devices that were infected included:

  • Galaxy Note 2
  • LG G4
  • Galaxy S7
  • Galaxy S4
  • Galaxy Note 4
  • Galaxy Note 5
  • Galaxy Note 8
  • Xiaomi Mi 4i
  • Galaxy A5
  • ZTE x500
  • Galaxy Note 3
  • Galaxy Note Edge
  • Galaxy Tab S2
  • Galaxy Tab 2
  • Oppo N3
  • vivo X6 plus
  • Nexus 5
  • Nexus 5X
  • Asus Zenfone 2
  • LenovoS90
  • OppoR7 plus
  • Xiaomi Redmi
  • Lenovo A850

The names of two businesses which had been affected are not disclosed by the check point.

Share this article

About the Author

Zehra Ali is a Tech Reporter and Journalist. She has done her Masters in Mass Communication. Topics related to cybersecurity, IoT, AI, Big Data and other privacy matters are extensively covered by her on various platforms. You can follow her on twitter.

More from Zehra Ali

Related Posts