Millions of Android phones come with pre-installed malware, and there's no easy fix

nanoguy

Posts: 1,355   +27
Staff member
A hot potato: The Google Play Store is notorious for harboring apps that contain malware, adware, or some flavor of spyware or fleeceware. A lesser-known fact is that hackers are increasingly targeting pre-installed apps for their misdeeds, and researchers are trying to raise awareness about this growing trend. Millions of affordable Android phones come with numerous pre-installed apps, and hackers only need to subvert one. However, addressing this issue is significantly more challenging than dealing with rogue apps that find their way into the Play Store.

Last month, we learned that malware had been discovered in 60 Android apps with over 100 million downloads – another black eye for the mobile operating system that has an estimated three billion active users worldwide. Malicious developers regularly exploit various loopholes in Google's app vetting process to create apps that steal login credentials or fleeceware that squeeze as much as $400 million per year from users by tricking them into signing up for expensive in-app subscriptions.

However, researchers at Trend Micro are sounding the alarm about the growing trend of Android devices that come with malicious software pre-installed. While you can easily remove an app you've downloaded from the Play Store, addressing malware embedded in system apps or device firmware is a significantly more challenging task.

Android's open nature allows manufacturers to create a wide range of phone models and target price-conscious consumers with more affordable options. However, it also opens the door for hackers to sneak in malicious code before those devices even leave the factory floor. This risk also applies to other Android devices, including smartwatches, tablets, set-top boxes, and smart TVs.

Senior Trend Micro researcher Fyodor Yarochkin says pre-installed malware has become much more common in recent years, partly due to a race to the bottom among mobile firmware developers. Once selling firmware became unprofitable, many developers began offering it for free.

As expected, there's a catch to this new business model – many of the firmware images analyzed by Trend Micro contained bits of code described as "silent plugins." The researchers have discovered over 80 flavors so far, but only a few have seen widespread distribution. The more popular ones are being sold underground and promoted on Facebook, YouTube, and various blogs.

Some of these plugins allow cyber criminals to "rent out" Android devices for up to five minutes at a time and use them to steal login credentials or other sensitive user information. Others are capable of downloading additional malware onto the infected device.

Researchers estimate that millions of infected devices are in use worldwide, with a large portion concentrated in Eastern Europe and Southeast Asia. Interestingly, the criminals themselves claim that 8.9 million Android devices are loaded with their silent plugins.

Trend Micro confirmed the presence of malware in phones from at least 10 vendors, most of them Chinese. The firm suspects an additional 40 vendors are affected, but researchers are more interested in determining where along the supply chain the infection is most likely to occur.

Google has been aware of pre-installed Android malware for years, but it cannot easily solve the problem due to its limited control over the complex OEM Android supply chain. Cheaper phones tend to use the Android Open Source Platform (AOSP) and come with anywhere between 100 and 400 pre-installed apps – all it takes is infecting one of them.

It also doesn't help that as many as 225 device manufacturers regularly leave diagnostic software on Android phones, which essentially enables backdoor remote access for spyware and censorship tools. This behavior has been observed in numerous Chinese brands as well as big names like Oppo, OnePlus, Realme, and Xiaomi. Some, like Chinese-owned Gigaset, which sells phones in the EU, were found to have buried a malware auto-installer in a system update app.

Back in 2019, Google Project Zero researcher Maddie Stone revealed the existence of an SMS and ad fraud botnet called Chamois that had affected at least 21 million Android devices in previous years through pre-installed malware. The company discovered that vendors would often unknowingly incorporate Chamois code into their Android distributions because they were easily fooled into believing it was a legitimate ad service.

Also read: Does Android need saving? If yes, here's how to do it.

Since then, Google has invested significant effort in refining Google Play Protect and expanding its capabilities to monitor pre-installed apps on Android devices for malicious behavior. That said, hackers continue to find ways to bypass these protections, and they're even developing lucrative business models around it on the dark web. A recent Kaspersky analysis found that accessing these malicious services costs anywhere between $2,000 and $20,000.

As for protecting yourself, Yarochkin recommends opting for higher-end devices and sticking to brands like Samsung and Google, which supposedly have better supply chain security. Most mobile antivirus apps are ineffective against real security threats, so it's best not to rely on them, unless you want to end up like thousands of users who downloaded password-stealing malware disguised as antivirus tools.

Image credit: Luis Andrés Villalón

Permalink to story.

 
Get an unlocked phone, unlock the bootloader, install LineageOS, add a GApps or equivalent, then install what you need. You can additionally root and place an ad blocker in as well, but that's not totally necessary.

If this is too difficult, spend more money for an expensive phone, or go the other direction and get a cheap basic phone on a prepaid plan, and use your PC instead where needed. This is especially preferable if you have gone to remote work. Use an e-book reader or buy a handheld gaming device if you need something on commutes or while waiting, albeit any of these other options work as well.

Personally I am using an old Moto G7 with LOS 20 (Android 13) on it.
 
I have no doubt the Chinese are doing their worst to spy on the phones they sell to EU and US customers, however I bought my own from inside Red China. Inside Job. It's even got an all-Mandarin Browser.

Chinese phone=free of the spyware they reserve for EU and US customers. I beat them in their own game.

Oh and I have got zero apps installed. Just Vanilla.
 
I have no doubt the Chinese are doing their worst to spy on the phones they sell to EU and US customers, however I bought my own from inside Red China. Inside Job. It's even got an all-Mandarin Browser.

Chinese phone=free of the spyware they reserve for EU and US customers. I beat them in their own game.

Oh and I have got zero apps installed. Just Vanilla.
Just by being on the Chinese network you are already in their hands. lol
 
Facebook is one of the worst offenders in the embedded malware arena. Even on high end mobiles, you can't remove their bs.
 
Er its not that hard at all. Install and use Titanium Backup app to force remove or freeze apps and if that dosent work you can use ADB (android debug bridge) and a pc/mac to remove them from the rom directly so said apps dont come back even after a factory reset.

You can also install root and non-root firewalls and limit access to only those apps that need access to the net. On my samsung for example the OS has no access to the internet at all.

And I have gone a step further and am running a permissions managed (xprivacy), so for those apps that are allowed to access the net, they either get randomissed data or null info (imei, phone number, serial, contacts, location, accounts, etc, etc,).
 
Last edited:
My Advice is to avoid using your phone for financial matters. Get a computer for your important stuff.
For those that say this is impossible for them, get a debit card with a different bank and never have a large balance in it. And use that on your phone to your hearts content.
Do your logging in to important sites on your computer.
If you don't want a computer, get a Tablet from a known brand (eg Samsung). An earlier model should keep the cost down.
 
My Advice is to avoid using your phone for financial matters. Get a computer for your important stuff.
For those that say this is impossible for them, get a debit card with a different bank and never have a large balance in it. And use that on your phone to your hearts content.
Do your logging in to important sites on your computer.
If you don't want a computer, get a Tablet from a known brand (eg Samsung). An earlier model should keep the cost down.
The only fly in the ointment here is banks are making it easyer to do banking on mobile than on desktop. My own bank are guilty of this. And I have told them multiple time. They are even thing of introducing biometrics, to which I formally complaining (basically f**k no).
 
DUH!

This behavior has been observed in numerous Chinese brands as well as big names like Oppo, OnePlus, Realme, and Xiaomi. Some, like Chinese-owned Gigaset, which sells phones in the EU, were found to have buried a malware auto-installer in a system update app.
 
My Advice is to avoid using your phone for financial matters. Get a computer for your important stuff.
For those that say this is impossible for them, get a debit card with a different bank and never have a large balance in it. And use that on your phone to your hearts content.
Do your logging in to important sites on your computer.
If you don't want a computer, get a Tablet from a known brand (eg Samsung). An earlier model should keep the cost down.

I have a debit card, and a savings account. I don't keep much in the debit card, JUST in case it gets hacked, stolen etc for this very reason.
 
Pffft. Windows have billion malwares included in factory install, and nobody cares

Really?? And where /what are they exactly??

The dozens of AV systems that professionals and corporations install on their Windows machines never caught a "Windows built in malware" all those years??

And does that mean it's OK for the Android septic tank to have built in malware because of your Windows claim??
 
DUH!

This behavior has been observed in numerous Chinese brands as well as big names like Oppo, OnePlus, Realme, and Xiaomi. Some, like Chinese-owned Gigaset, which sells phones in the EU, were found to have buried a malware auto-installer in a system update app.
Would never even consider a phone of this type unless there is an ASOP rom pf some kind for it.
 
Really?? And where /what are they exactly??

The dozens of AV systems that professionals and corporations install on their Windows machines never caught a "Windows built in malware" all those years??

And does that mean it's OK for the Android septic tank to have built in malware because of your Windows claim??
I think he is referring rather dramaticly to the bloatware thats in window 10/11.
 
I have a debit card, and a savings account. I don't keep much in the debit card, JUST in case it gets hacked, stolen etc for this very reason.
I, too, have a debit card and a savings account.
I take out some cash and then use that for my purchases like groceries and gas. :)
 
Er its not that hard at all. Install and use Titanium Backup app to force remove or freeze apps and if that dosent work you can use ADB (android debug bridge) and a pc/mac to remove them from the rom directly so said apps dont come back even after a factory reset.

You can also install root and non-root firewalls and limit access to only those apps that need access to the net. On my samsung for example the OS has no access to the internet at all.

And I have gone a step further and am running a permissions managed (xprivacy), so for those apps that are allowed to access the net, they either get randomissed data or null info (imei, phone number, serial, contacts, location, accounts, etc, etc,).
That works for maybe 5% of Android phone users. The rest? It's beyond their comprehension--which is still too big a problem with tech. It's great that someone can just take their shiny new device out of the box and start using it, but OS and apps are already out of date, and not all automatically update--or more likely, the user is in too much of a hurry to let it update.
 
Back