Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Voyage Technology can help. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 30 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Productivity Android Upgrade VoIP Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media AI Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Compliance IT Support Windows 10 Office Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Data Security Apps Two-factor Authentication Mobile Office Vendor Apple Networking Gmail App Managed Services BYOD Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management How To BDR WiFi Conferencing Computing Information Technology Access Control Office 365 Hacker Avoiding Downtime Marketing HIPAA Applications Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Health Computers Analytics Office Tips Augmented Reality Website Retail Storage Router Password Bring Your Own Device Firewall Windows 11 Monitoring Going Green Patch Management The Internet of Things Save Money Excel Remote Monitoring Vulnerability End of Support Social Vendor Management Cybercrime Remote Workers Telephone Physical Security Display Printer Paperless Office Cooperation Free Resource Customer Service Infrastructure Project Management Windows 7 Microsoft 365 Document Management Solutions Scam Data loss Mobile Security Processor Administration Holidays Data Storage Safety Smart Technology Supply Chain Video Conferencing Robot Managed Services Provider Settings Professional Services Saving Time Virtual Machines Printing Wireless Content Filtering Managed IT Service IT Management VPN YouTube Meetings Downloads iPhone Cryptocurrency Licensing Customer Relationship Management Computer Repair Vulnerabilities Entertainment Virtual Desktop Data Privacy Hacking Data storage LiFi Presentation Images 101 Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Machine Learning Wireless Technology Money Humor Employees Maintenance Sports Integration Word Antivirus Mouse User Tip Modem Mobile Computing Database Surveillance Virtual Assistant Outsource IT Public Speaking Tablet IT Technicians Virtual Machine Environment Search Lithium-ion battery Media Alert Cyber Monday Medical IT Entrepreneur Proxy Server Reviews Best Practice Cookies Managed IT Tactics Development Buisness File Sharing Hotspot Transportation Small Businesses Dark Data Legal IT solutions Mirgation Hypervisor Displays How To Notifications PowerPoint Undo Shopping Business Growth Nanotechnology Optimization Addiction Travel Language Employer/Employee Relationships Outsourcing Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Distributed Denial of Service Workplace Gig Economy Alt Codes Screen Reader Service Level Agreement Internet Service Provider Downtime Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Application Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Smart Tech Memes Co-managed IT Bookmark Typing Download Net Neutrality Alerts SQL Server Technology Care Network Congestion IBM Business Communications Google Drive User Error Financial Data History Knowledge Connectivity IT Break Fix Scams Browsers Smartwatch Upload Procurement Point of Sale Azure Hybrid Work 5G Multi-Factor Security Tech Human Resources Google Docs Social Network Telework Unified Communications Cyber security Experience IoT Communitications Running Cable Tech Support Dark Web Cables Competition CES Bitcoin Network Management Google Wallet Trends Supply Chain Management Monitors Google Calendar Term Google Apps Customer Resource management FinTech Regulations Star Wars IT Assessment Laptop Websites Microsoft Excel IT Maintenance Data Analysis Windows 8 Drones Gamification Flexibility Staff Value Business Intelligence User Legislation Shortcuts SharePoint Organization Social Networking Electronic Medical Records Smart Devices Halloween Ransmoware Fileless Malware Digital Security Cameras Lenovo Content Remote Working Wearable Technology Memory Vendors Writing IP Address Comparison Google Play Be Proactive Health IT Motherboard Data Breach Virtual Reality Assessment Electronic Health Records Scary Stories Private Cloud Permissions Workforce Directions Videos Hacks Server Management Recovery Superfish Identity Theft Wasting Time Threats Fun Specifications Security Cameras Workplace Strategies Hard Drives Deep Learning Trend Micro Twitter Internet Exlporer Software as a Service Error Fraud Meta Domains Microchip Username Education Managing Costs Amazon Social Engineering Black Friday SSID Refrigeration eCommerce Remote Computing

Blog Archive