Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha
December 11, 2018
Latest Cyber News, Help & Advice




EU e-Privacy Directive

This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.

View e-Privacy Directive Documents

You have declined cookies. This decision can be reversed.

Over 140 Low-Cost Android Devices Found with Serious Malware

Written by  May 27, 2018

Even after the identification of a criminal operation that has been inserting malware into the firmware of the low-cost Android devices, it is still operating in many cellphones.

A report from the antivirus vendor Dr.Web reported that there has been a mysterious threat actor which has found its way to penetrate the supply chain of the many cellphone carriers that has been infecting the phones with the malware. At that time it was found that the malware had affected more than 26 low-cost devices.


A report from the cyber-security firm Avast advised that the group has never ceased activity within its operations and it is still continuing to maliciously alter the firmware of more and more devices growing its user base. Avast stated in their report that more than 140 Android smartphones and tablets were affected by this malware. The malware runs from the “/system” folder with has full root access rights and the main role of this malware is to establish a connection to a remote server and download an XML file and install the apps that are in the XML document. The malware is currently being shipped as the firmware component and it can get the handle of the app crooks and install it without the permission of the user.

The apps that are installed by this malware just show the ads on the top of the apps and the Android interface itself. Many Android users have reported ads showing up on their screens. The main aim of the malware is to generate the revenue via ads and no other bad behaviour. When the malware downloads these apps the language is set to Chinese and the public IP of the malware’s server is of China’s. The group operating the malware might be in China but Avast was not able to confirm this.

Avast said that it is currently very hard to track the malware as it runs at the firmware level and there are so many device carrier networks.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Top News

Error: No articles to display


  1. Popular
  2. Trending


« December 2018 »
Mon Tue Wed Thu Fri Sat Sun
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30