Thursday, March 28, 2024

The U.S. Government Funded Smartphones Comes Pre-installed With Unremovable Malware

Security researchers from Malwarebytes found pre-installed malware on UMX U683CL handsets. The phones are made under the Lifeline program to low-income consumers for Affordable Communications.

Multiple users reported to Malwarebytes that HiddenAds suddenly get installed on their UMX mobile phone, so the company purchased a UMX U683CL for further analysis.

Malware Comes Pre-Installed

The UMX U683CL phones offered by Assurance Wireless and it cost only $35 under the government-funded program.

Once the user logs into the device a questionable app named Wireless Update, starts auto-installing apps without user consent. It doesn’t notify users or request any permission to install apps, it just installs the apps on its own.

A malicious app detected as Android/PUP.Riskware.Autoins.Fota.fbcvd get’s installed during the update process. The Agent is heavily obfuscated and it is a vital part of the system. It is a variant of Adups malware.

UMX mobile

It is a malicious firmware that comes preinstalled on the devices and it has system-level rights, Malwarebytes able to confirm the firmware presence on the phones.

“It’s with great frustration that I must write about another unremovable pre-installed app found on the UMX U683CL phone: the mobile device’s own Settings app functions as a heavily-obfuscated malware we detect as Android/Trojan.Dropper.Agent.UMX.”

“The more discernible variant of this malware uses Chinese characters for variable names. Therefore, we can assume the origin of this malware is China.”

The Trojan agent downloads another piece of the malware known as HiddenAds. The malware strains display aggressive ads and it is hard for an end-user to find which app displaying the ads.

Malwarebytes informed Assurance Wireless about their findings of the devices with pre-installed, but Assurance Wireless didn’t respond.

To note the UMX mobile device is made by a Chinese company, it’s unclear who installed the malware as several companies involved in the device supply chain between device manufacturer to the buyer.

UMX mobile

There is no current solution, uninstalling the wireless Update may lead to missing out critical OS updates.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles