Security News > 2020 > January > Threat From Pre-Installed Malware on Android Phones is Growing
Update] Pre-installed malware on Android phones is a growing menace - so much that on Wednesday this week, Privacy International and around 50 other international NGOs sent an open letter to Google demanding a stop to the habit.
The pre-installed malware comprises a Wireless Update app detected by Malwarebytes as Android/PUP.Riskware.
UMX. "From the moment you log into the mobile device," say the Malwarebytes researchers, "Wireless Update starts auto-installing apps. To repeat: There is no user consent collected to do so, no buttons to click to accept the installs, it just installs apps on its own." While it is possible to uninstall this app - which could potentially be used to secretly download malware - the user could miss out on critical operating system updates.
Secondly, pre-installed apps should be subject to the same Google scrutiny as is applied to Play Store apps.
"One of the biggest issues today," he commented, "Is that with system apps like the aforementioned Settings app, there is no solution. You should be able to easily update/replace system level malware with legitimate versions, even if generic, found on Google Play.".
News URL
Related news
- SpyLoan Android malware on Google play installed 8 million times (source)
- 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play (source)
- New DroidBot Android banking malware spreads across Europe (source)
- New DroidBot Android malware targets 77 banking, crypto apps (source)
- New Android spyware found on phone seized by Russian FSB (source)
- Germany sinkholes BadBox malware pre-loaded on Android devices (source)
- Germany blocks BadBox malware loaded on 30,000 Android devices (source)
- Android malware found on Amazon Appstore disguised as health app (source)
- BadBox malware botnet infects 192,000 Android devices despite disruption (source)
- New FireScam Android malware poses as RuStore app to steal data (source)