Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Voyage Technology can help. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management Smartphones VoIP Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Windows Social Media Managed IT Services Microsoft Office Remote Current Events Tech Term Network Internet of Things Productivity Facebook Artificial Intelligence Automation AI Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Miscellaneous Holiday Server Outsourced IT Information Employee/Employer Relationship Spam Training Encryption Compliance Office Windows 10 Data Management Government Business Continuity Blockchain Windows 10 Virtualization Bandwidth Business Technology Wi-Fi Two-factor Authentication Vendor IT Support Data Security Apps Mobile Office Mobile Device Management Gmail Networking Chrome Budget BYOD Employer-Employee Relationship Apple Managed Services Voice over Internet Protocol App Information Technology HIPAA Office 365 How To Applications BDR WiFi Conferencing Access Control Hacker Avoiding Downtime Tip of the week Computing Marketing Risk Management Retail Managed IT Services Router Analytics Office Tips Augmented Reality Big Data Storage Password Help Desk Bring Your Own Device Virtual Private Network Computers Healthcare Health Operating System Website Windows 7 Microsoft 365 Firewall Scam Data loss Solutions The Internet of Things Patch Management Save Money Social Remote Monitoring Windows 11 End of Support Vulnerability Monitoring 2FA Vendor Management Excel Physical Security Display Printer Customer Service Remote Workers Going Green Paperless Office Telephone Infrastructure Cybercrime Free Resource Cooperation Document Management Project Management Images 101 Cryptocurrency Word Telephone System Multi-Factor Authentication Maintenance Mobility Cost Management Antivirus Virtual Desktop Data storage LiFi Safety Employees Outlook Integration Money User Tip Humor Modem Mobile Security Robot Processor Holidays Sports Data Storage Mouse IT Management Supply Chain Smart Technology VPN Meetings Video Conferencing Managed Services Provider Administration Customer Relationship Management Saving Time Virtual Machines Professional Services Computer Repair Managed IT Service Hacking Presentation Downloads iPhone Settings Printing Licensing Wireless Wireless Technology Content Filtering Vulnerabilities Machine Learning Entertainment Data Privacy YouTube IT Maintenance Microsoft Excel Private Cloud Hard Drives Data Analysis IT Assessment Star Wars Server Management Flexibility Gamification Superfish Value Business Intelligence Staff Identity Theft 5G Domains Organization Google Docs Social Networking Unified Communications Shortcuts Legislation Twitter Experience Ransmoware Error Running Cable Refrigeration Digital Security Cameras Fileless Malware Smart Devices Bitcoin Remote Working Content Google Wallet Memory Vendors Wearable Technology Social Engineering Public Speaking Lithium-ion battery Health IT Data Breach Motherboard Be Proactive Comparison Google Play Remote Computing Workforce Permissions Laptop Videos Directions Entrepreneur Electronic Health Records Assessment Windows 8 Drones Wasting Time Threats Tablet Trend Micro Workplace Strategies Specifications Security Cameras Alert Meta Fraud File Sharing Halloween Dark Data Undo Microchip Software as a Service Internet Exlporer Managed IT Username Managing Costs Amazon How To eCommerce Black Friday SSID Notifications Virtual Assistant Outsource IT Travel Scary Stories Surveillance Database Hacks Techology Virtual Machine Environment IT Technicians Google Maps Media Fun Application Reviews Proxy Server Cookies Deep Learning Cyber Monday Medical IT Transportation Small Businesses Hotspot Unified Threat Management Development Tactics Unified Threat Management Hypervisor Displays Mirgation Education IBM Shopping Optimization Nanotechnology PowerPoint Mobile Computing Employer/Employee Relationships Outsourcing Language Network Congestion Addiction PCI DSS Management User Error Chatbots Navigation Search Gig Economy Screen Reader Best Practice Workplace Distributed Denial of Service Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Computing Infrastructure Point of Sale Buisness Competition Regulations Compliance Legal Identity IT solutions Paperless Evernote Co-managed IT Tech Support Bookmark Memes Smart Tech Network Management Business Growth Net Neutrality Download SQL Server Technology Care Alerts Monitors User Financial Data History Business Communications Cortana Scams Break Fix Websites Smartwatch Browsers IT Connectivity Alt Codes Procurement Upload Azure Hybrid Work Downtime Telework Social Network SharePoint Cyber security Hosted Solution Human Resources Multi-Factor Security Tech Electronic Medical Records IP Address Cables Dark Web CES Communitications IoT Typing Supply Chain Management Trends Lenovo Writing Recovery FinTech Customer Resource management Google Drive Regulations Google Apps Google Calendar Term Virtual Reality Knowledge

Blog Archive