Mobile

5/25/2018
02:40 PM
100%
0%

Android Malware Comes Baked into Some New Tablets, Phones

Ad-loading malware is being built into the firmware and operating system of some new tablets and phones from three major manufacturers.

Malware could be one of the features of your fancy new Android tablet. According to researchers at Avast, this malware isn't just pre-loaded: it's fully baked in.

Some phones and tablets from ZTE, Archos, and myPhone are coming with malware called Cosiloon pre-installed. It's an ad loader, and while it loads ads rather than steals information, it's also impossible to fully eradicate since it's built into the firmware of the infected devices.

There are two "dropper" apps that load ads over Web pages or games. One of the droppers is built into the firmware of the devices while the other is completely integrated into the operating system. Once active, they download ad presentation software that is highly sophisticated and thoroughly obfuscated, making the entire operation impossible to eradicate and very difficult to mitigate.

Avast found the malware on more than 18,000 devices in more than 100 countries. Most of the devices affected are not certified by Google, which is looking into remedies. Google said that as long as the malware is built into the firmware, there's really very little it can do.

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ebyjeeby
50%
50%
ebyjeeby,
User Rank: Strategist
5/30/2018 | 7:18:15 PM
Google can't do anything about it?
stop licensing the OS to them
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:09:26 PM
18K devices
Avast found the malware on more than 18,000 devices in more than 100 countries. It does no seems that many devices. But too many countries obviously.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:07:50 PM
dropper
There are two "dropper" apps that load ads over Web pages or games. One of the droppers is built into the firmware of the devices while the other is completely integrated into the operating system Maybe Android should nor this much open, obviously they can do whatever they want in the OS level.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:04:34 PM
Re: Recall/Return
So much so that if a recall hasn't been offered I would look towards returning the device Good advice. No need to deal with firmware problems, there are tons of good devices.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:02:23 PM
Re: Recall/Return
As an Android user I would be extremely perturbed at baking this into the firmware. Agree. Firmware is hard to deal with. Why dont we go with Google devices, pixcel seems great.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:00:22 PM
ZTE?
ZTE again. We keep hearing this name a lot these days. :))
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/29/2018 | 9:07:02 AM
Recall/Return
As an Android user I would be extremely perturbed at baking this into the firmware. So much so that if a recall hasn't been offered I would look towards returning the device. It's unacceptable.
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1744
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 148423.
CVE-2018-1747
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 148428.
CVE-2018-18324
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has XSS via the admin/fileManager2.php fm_current_dir parameter, or the admin/index.php module, service_start, service_fullstatus, service_restart, service_stop, or file (within the file_editor) parameter.
CVE-2018-18322
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Command Injection via shell metacharacters in the admin/index.php service_start, service_restart, service_fullstatus, or service_stop parameter.
CVE-2018-18323
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Local File Inclusion via directory traversal with an admin/index.php?module=file_editor&file=/../ URI.