Check Point experts spotted pre-Installed Android Malware on 38 Android devices

Pierluigi Paganini March 11, 2017

Experts discovered pre-installed malware on 38 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi and Asus.

In the past, security experts have already reported cases of pre-installed malware on mobile devices.

In September 2015, security experts at G-Data security firm discovered new cases of Chinese Android mobile devices infected by pre-installed malware.

In December 2016, experts from Doctor Web spotted new Trojans into the firmware of several dozens of low-cost Android smartphones and tablets.

The malicious code allows attackers to control the infected devices, from downloading, installing and executing Android malicious apps, accessing data and to dialing premium phone numbers.

The news of the day is that experts at security firm CheckPoint discovered at least 38 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by two unidentified companies have been found with pre-installed malware.

The researchers discovered two distinct families of malware, Loki and SLocker, on the mobile devices distributed by the companies.

According to the experts at CheckPoint, the malicious apps were not included in the official ROM firmware that was supplied by the vendors, but evidently, the supply chain is compromised and the devices are commercialized with pre-installed malware.

“According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain.” reads the blog post published by Check Point researchers.

The experts noticed that in some cases the malicious codes were added by using systems privileged making hard the removal of the apps.

“Six of the malware instances were added by a malicious actor to the device’s ROM using system privileges, meaning they couldn’t be removed by the user and the device had to be re-flashed.” continues the analysis.

The Loki malware implements spyware capabilities, it allows attackers to gain full control on the victims’ devices.

The SLocker is a mobile ransomware that locks victims mobile devices and requests the payment of a ransom to unlock them.

Below the list of infected mobile devices is:

  • Galaxy Note 2
  • LG G4
  • Galaxy S7
  • Galaxy S4
  • Galaxy Note 4
  • Galaxy Note 5
  • Galaxy Note 8
  • Xiaomi Mi 4i
  • Galaxy A5
  • ZTE x500
  • Galaxy Note 3
  • Galaxy Note Edge
  • Galaxy Tab S2
  • Galaxy Tab 2
  • Oppo N3
  • Vivo X6 plus
  • Nexus 5
  • Nexus 5X
  • Asus Zenfone 2
  • LenovoS90
  • OppoR7 plus
  • Xiaomi Redmi
  • Lenovo A850

The malware is very difficult to uninstall because the are part on device’s ROM using system privileges.

To remove the malware, users have to options:

  • Root your device and uninstall the malicious apps.
  • Flash the firmware/ROM.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – pre-installed malware, mobile devices)



you might also like

leave a comment