FINALLY POSTED: List of Android devices that contain preinstalled software (malware) for spying
List of infected Android devices was released after a commercial scanner found cases in which the malware (spyware software) pre-installed on 38 devices on the market
This discovery comes just days after WikiLeaks revealed that the CIA had routinely hacked smartphones, and are infected with malware to spy on the American and world public.According to the blog published a few days ago by the computer company "Check Point Software Technologies (CPST)," malicious code (malware) is found preinstalled on a variety of Android devices that is not in them installed by the original manufacturer of the phone, writes MG.
In six cases, the malware was installed on the ROM, using the benefits system, a phone is malware could solve only technique that requires firmware and reinstall to get the phone fully disinfected."This discovery proves that, even if the user is extremely attentive, and never click on a malicious link or takes suspicious application, it can still be infected with malicious software, without even to know about it," said Daniel Padon from CPST- a. "This should be a concern all mobile users."
The majority of malicious applications are "thieves of information" and programs that serve ads on phones.A malicious application for the display named "Loki", gets great powers of the device when it infects. Another application is the mobile "Ransomware" (software for blackmail), known as "Slocker", used an application Tor to mask the identity of its operator.
Infected devices are:
Galaxy Note 2
LG G4
Galaxy S7
Galaxy S4
Galaxy Note 4
Galaxy 5
Galaxy Note 8
Xiaomi Mi 4i
Galaxy A5
ZTE x500
Galaxy Note 3
Galaxy Note Edge
Galaxy S2
Galaxy Tab 2
Oppo N3
vivo X6 plus
Asus Zenfone 2
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A850
Check Point did not disclose the names of companies that distribute and sell these infected phone.Padon said it was not clear whether the two companies specifically targeted or the infections were part of a wider, opportunistic campaign. The presence of ransomware and other malicious programs that are easy to detect seem to indicate the latter.Check Point does not know where they came from infected phones. One of the interested parties to detect spyware software was "a big telecommunications company" and another was "a multinational technology company."
This is not the first time that Android phones sold and supplied customers with installed spy software that secretly to send sensitive user data to unknown persons.In November, the researchers found a "secret door" installed on hundreds of thousands of Android device manufacturers BLU. A few days later, a separate research team has discovered another "secret door" to more than 3 million Android devices from the company BLU and other manufacturers.
A report published shows why never a bad idea to carry out a scan of the new Android device to malware, especially if the device is purchased through cost suppliers.
- 16 Mar, 2017
- 2179 views
- No comments