Mobile

5/25/2018
02:40 PM
100%
0%

Android Malware Comes Baked into Some New Tablets, Phones

Ad-loading malware is being built into the firmware and operating system of some new tablets and phones from three major manufacturers.

Malware could be one of the features of your fancy new Android tablet. According to researchers at Avast, this malware isn't just pre-loaded: it's fully baked in.

Some phones and tablets from ZTE, Archos, and myPhone are coming with malware called Cosiloon pre-installed. It's an ad loader, and while it loads ads rather than steals information, it's also impossible to fully eradicate since it's built into the firmware of the infected devices.

There are two "dropper" apps that load ads over Web pages or games. One of the droppers is built into the firmware of the devices while the other is completely integrated into the operating system. Once active, they download ad presentation software that is highly sophisticated and thoroughly obfuscated, making the entire operation impossible to eradicate and very difficult to mitigate.

Avast found the malware on more than 18,000 devices in more than 100 countries. Most of the devices affected are not certified by Google, which is looking into remedies. Google said that as long as the malware is built into the firmware, there's really very little it can do.

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ebyjeeby
50%
50%
ebyjeeby,
User Rank: Strategist
5/30/2018 | 7:18:15 PM
Google can't do anything about it?
stop licensing the OS to them
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:09:26 PM
18K devices
Avast found the malware on more than 18,000 devices in more than 100 countries. It does no seems that many devices. But too many countries obviously.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:07:50 PM
dropper
There are two "dropper" apps that load ads over Web pages or games. One of the droppers is built into the firmware of the devices while the other is completely integrated into the operating system Maybe Android should nor this much open, obviously they can do whatever they want in the OS level.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:04:34 PM
Re: Recall/Return
So much so that if a recall hasn't been offered I would look towards returning the device Good advice. No need to deal with firmware problems, there are tons of good devices.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:02:23 PM
Re: Recall/Return
As an Android user I would be extremely perturbed at baking this into the firmware. Agree. Firmware is hard to deal with. Why dont we go with Google devices, pixcel seems great.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 7:00:22 PM
ZTE?
ZTE again. We keep hearing this name a lot these days. :))
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/29/2018 | 9:07:02 AM
Recall/Return
As an Android user I would be extremely perturbed at baking this into the firmware. So much so that if a recall hasn't been offered I would look towards returning the device. It's unacceptable.
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12557
PUBLISHED: 2018-06-19
An issue was discovered in Zuul 3.x before 3.1.0. If nodes become offline during the build, the no_log attribute of a task is ignored. If the unreachable error occurred in a task used with a loop variable (e.g., with_items), the contents of the loop items would be printed in the console. This could ...
CVE-2018-12559
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The mount target path check in mounter.cpp `mpOk()` is insufficient. A regular user can consequently mount a CIFS filesystem anywhere (e.g., outside of the /home directory tree) by passing directory traversal sequ...
CVE-2018-12560
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. Arbitrary unmounts can be performed by regular users via directory traversal sequences such as a home/../sys/kernel substring.
CVE-2018-12561
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.
CVE-2018-12562
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The wrapper script 'mount.cifs.wrapper' uses the shell to forward the arguments to the actual mount.cifs binary. The shell evaluates wildcards (such as in an injected string:/home/../tmp/* string).