Mobile

12/4/2014
05:46 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

'DeathRing' Malware Found Pre-Installed On Smartphones

Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.

For the second time this year, a security vendor has issued a warning about brand-new mobile phones that come pre-loaded with malicious software. And like last time, the threat appears mostly restricted to low-cost and counterfeit handsets manufactured by vendors in Asia and Africa.

The implications, though, could be much broader because it suggests that criminals have shifted to distributing mobile malware via the supply chain, mobile security vendor Lookout Research said in a report released today.

The malware is a Chinese Trojan program that Lookout has dubbed DeathRing, which the mobile security firm found pre-installed on several popular smartphones sold in Asia and Africa. The Trojan is disguised as a ringtone application and is loaded in the phone's system directory from where it is impossible to remove by security vendors.

It gets activated when the phone is powered down and rebooted five times, or when the user has been away and returns to the phone a minimum of 50 times, researchers found.

Once activated, DeathRing is programmed to fetch SMS and wireless application protocol (WAP) content from a command and control server, which it then uses in several malicious ways. "For example, DeathRing might use SMS content to phish victim's personal information by fake text messages requesting the desired data," according to the report. "It may also use WAP, or browser, content to prompt victims to download further [malware]."

The command and control server appears to be offline so DeathRing no longer poses an immediate threat to users with infected handsets, says Jeremy Linden, a security researcher at Lookout.

All of the infected devices are from second and third-tier manufactures and are Android-powered brands unfamiliar in the US such as TECNO, Gionee, Polytron Rocket, Karbonn TA-FONE and a couple of Samsung knockoffs.

A large number of handsets in countries like Indonesia, Kenya and Nigeria appear to have shipped with the malware preinstalled on the devices, Linden says. In Nigeria, DeathRing is the No. 1 threat encountered by users running Lookout's mobile security software, he said.

Lookout has been unable to determine where exactly in the supply chain -- or how -- the malware was installed. "These phones pass through quite a few hands," before reaching the consumer, he says. So it is very hard to determine where in the distribution chain the compromise might have occurred.

DeathRing marks the second time this year that Lookout has spotted malware pre-installed on mobile devices. In April, the company discovered another malware program called Mouabad similarly installed on low-cost handsets in Asia. In that case, however, Lookout also saw evidence of the malware on some phones sold in Spain as well.

The chances of something similar happening in the US are significantly lower because of the much tighter suppler chain controls, says Tyler Shields, an analyst with Forrester Research.

But that doesn't mean it can never happen, he says. In fact, there are several instances where software and hardware products have been backdoored or had malware similarly preinstalled on them right out of the box.

Back in 2009, Shields, then a researcher with Veracode, gave a presentation at a Black Hat Europe on how researchers can detect malware and backdoors on what he described as "certified pre-owned" hardware and software.

Some examples he used during the presentation included a Samsung digital photo frame, an Asus 80GB hard drive, Sony BMG CDs, and a Walmart promo CD, all of which contained malware in form or the other.

"This has been a concern not just with mobile devices," he says. "This is about the security of the supply chain. It is a matter of who has the tightest controls over the vendors in the supply chain."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/12/2014 | 8:49:32 PM
Re: Pre-loaded malware is a lawsuit waiting to happen.
Yeah, but if products from Walmart, Sony, Samsung, and Asus are carrying this stuff in the US, it could be a big disaster waiting to happen.
CMILTON4529
50%
50%
CMILTON4529,
User Rank: Apprentice
12/10/2014 | 7:51:43 AM
Pre-loaded malware ; can it jump the gap and make it to the US
The big question is, can this systemic malware jump to the US for the many uncovered versions of Android ?
ODA155
50%
50%
ODA155,
User Rank: Ninja
12/8/2014 | 12:06:51 PM
Re: Pre-loaded malware is a lawsuit waiting to happen.
From everything I've read unless you live in Africa or some Asian contry and you're using a cheap or "knock-off" of a more popular phone you have nothing to worry about.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/7/2014 | 9:47:18 PM
Pre-loaded malware is a lawsuit waiting to happen.
I'd love to be the attorney on that deceptive trade practices class action!
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17282
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
CVE-2018-14592
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
CVE-2018-15832
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
CVE-2018-16282
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.
CVE-2018-16752
PUBLISHED: 2018-09-20
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.