Security News > 2020 > January > Threat From Pre-Installed Malware on Android Phones is Growing
Update] Pre-installed malware on Android phones is a growing menace - so much that on Wednesday this week, Privacy International and around 50 other international NGOs sent an open letter to Google demanding a stop to the habit.
The pre-installed malware comprises a Wireless Update app detected by Malwarebytes as Android/PUP.Riskware.
UMX. "From the moment you log into the mobile device," say the Malwarebytes researchers, "Wireless Update starts auto-installing apps. To repeat: There is no user consent collected to do so, no buttons to click to accept the installs, it just installs apps on its own." While it is possible to uninstall this app - which could potentially be used to secretly download malware - the user could miss out on critical operating system updates.
Secondly, pre-installed apps should be subject to the same Google scrutiny as is applied to Play Store apps.
"One of the biggest issues today," he commented, "Is that with system apps like the aforementioned Settings app, there is no solution. You should be able to easily update/replace system level malware with legitimate versions, even if generic, found on Google Play.".
News URL
Related news
- OpenAI confirms threat actors use ChatGPT to write malware (source)
- TrickMo malware steals Android PINs using fake lock screen (source)
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)
- Cyber crooks push Android malware via letter (source)