Security News > 2021 > April > Gigaset Android Update Server Hacked to Install Malware on Users' Devices
Gigaset has revealed a malware infection discovered in its Android devices was the result of a compromise of a server belonging to an external update service provider.
Impacting older smartphone models - GS100, GS160, GS170, GS180, GS270, and GS370 series - the malware took the form of multiple unwanted apps that were downloaded and installed through a pre-installed system update app.
The German manufacturer of telecommunications devices said it took steps to alert the update service provider of the issue, following which further infections were prevented on April 7.
"Measures have been taken to automatically rid infected devices of the malware. In order for this to happen the devices must be connected to the internet. We also recommend connecting the devices to their chargers. Affected devices should automatically be freed from the malware within 8 hours," the company said in a statement shared with The Hacker News.
The full list of malware apps installed on the devices include -.
Gigaset has also urged users to check for signs of any infection by visiting the Settings app and manually uninstall the apps in question, in addition to installing all software updates that may be available for the device.
News URL
Related news
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- TrickMo malware steals Android PINs using fake lock screen (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)
- Cyber crooks push Android malware via letter (source)