{"id":15277,"date":"2020-08-07T00:15:00","date_gmt":"2020-08-06T22:15:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15277"},"modified":"2022-09-04T22:10:37","modified_gmt":"2022-09-04T20:10:37","slug":"android-preinstalled-malware-found-on-subsidized-us-smartphones","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/08\/07\/android-preinstalled-malware-found-on-subsidized-us-smartphones\/","title":{"rendered":"Android: Preinstalled malware found on subsidized US smartphones"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2012\/07\/android.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=234225\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Security researchers from Malwarebytes have found Malware on state-subsidized Android smartphones. The malware was pre-installed on the state sponsored devices.<\/p>\n<p><!--more--><\/p>\n<h2>Smartphones sponsored by the US states<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/122557f7b8484d96914d918180650694\" width=\"1\" height=\"1\">In the USA, there are state-subsidized smartphones that are made available to financially disadvantaged citizens. The whole thing there is known as 'Assurance Wireless', and such devices can be obtained from Virgin Mobile, for example. This is intended to enable citizens who have few financial resources to participate in digital life.<\/p>\n<h2>Malware found on Android smartphones<\/h2>\n<p>Security researchers from Malwarebytes <a href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/07\/we-found-yet-another-phone-with-pre-installed-malware-via-the-lifeline-assistance-program\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered<\/a> some time ago that smartphones funded by the US state and made available to financially disadvantaged citizens had malware pre-installed on them. The ANS UL40 smartphone with Android operating system 7.1.1, which can be obtained from Virgin Mobile via Assurance Wireless, is affected.&nbsp; <\/p>\n<p><img decoding=\"async\" title=\"ANS UL40 \" alt=\"ANS UL40 \" src=\"https:\/\/web.archive.org\/web\/20220712032220\/https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/07\/ANS-UL40-600x201.png\"><br \/>(ANS UL40 , Source: Malwarebytes)<\/p>\n<p>A user who has received such a device has provided this malware byte for analysis. Therefore, it is currently unclear whether the device is still available &#8211; which does not change the facts of the case. Just like the UMX U683CL, the ANS UL40 is also infected with a compromised Settings app and a Wireless Update app. <\/p>\n<blockquote>\n<p>Paketname: com.android.settings<br \/>MD5: 7ADA4AAEA49383499B405E4CE0A9447F<br \/>App Name: Einstellungen<br \/>Erkennung: Android\/Trojaner.Herunterladen.Wotby.SEK<\/p>\n<\/blockquote>\n<p>The app contains a Trojan, but the Malwarebytes security researchers did not detect any malicious activity triggered by this infected Settings app during the analysis period of the app. However, it must be noted that the security researchers also did not spend the time on the device that a typical user would spend on a mobile device. No SIM card was installed in the device, which could have an effect on the behavior of the malware. Nevertheless, there is enough evidence that this settings app has the ability to download apps from a third-party app store. <\/p>\n<p>For the <em>Wireless Update<\/em> app, the infection looks like this:<\/p>\n<blockquote>\n<ul>\n<li>Package Name: <em>com.fota.wirelessupdate<\/em>\n<li>MD5: <em>282C8C0F0D089E3CD522B4315C48E201<\/em>\n<li>App Name: <em>WirelessUpdate<\/em>\n<li>Detections: Three variants of <em>Android\/PUP.Riskware.Autoins.Fota<\/em>\n<ul>\n<li>Variants<em> .INS, .fscbv, and .fbcv<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/blockquote>\n<p><em>WirelessUpdate<\/em> is categorized as a PUP (Potentially Unwanted Program) riskware auto-installer that is capable of automatically installing applications without the user's consent or knowledge. It also acts as the mobile device's primary source for updating security patches, operating system updates, and so on. <em>Android\/PUP.Riskware.Autoins.Fota<\/em> has been known to install different variants of Android\/Trojan.HiddenAds &#8211; and it actually did! In fact, it automatically installed four different variants of HiddenAds, as the security researchers write in <a href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/07\/we-found-yet-another-phone-with-pre-installed-malware-via-the-lifeline-assistance-program\/\" target=\"_blank\" rel=\"noopener noreferrer\">their blog post<\/a>. There you can also read more details.<\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2019\/06\/08\/german-authorities-found-preinstalled-malware-on-4-china-phones-june-2019\/\">German authorities found preinstalled Malware on 4 China phones (June 2019)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Security researchers from Malwarebytes have found Malware on state-subsidized Android smartphones. The malware was pre-installed on the state sponsored devices.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,580],"tags":[60,244,450],"class_list":["post-15277","post","type-post","status-publish","format-standard","hentry","category-android","category-security","tag-android","tag-malware","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15277"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15277\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}