Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Voyage Technology can help. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Phishing Workplace Tips IT Services Hosted Solutions Collaboration Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Microsoft Backup Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Android Managed Service VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Social Media Productivity Browser Windows Microsoft Office Managed IT Services AI Current Events Tech Term Remote Network Internet of Things Automation Artificial Intelligence Facebook Holiday Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Information Remote Work Miscellaneous Outsourced IT Compliance Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Business Technology IT Support Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Information Technology Conferencing Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week HIPAA How To WiFi BDR Applications Computing Risk Management Virtual Private Network Computers Healthcare Health Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Operating System Help Desk Customer Service Display Printer Remote Workers Paperless Office Infrastructure Telephone Document Management Cooperation Free Resource Project Management Windows 7 Firewall Microsoft 365 Scam Data loss Solutions The Internet of Things Social Going Green Patch Management Save Money Windows 11 Remote Monitoring End of Support Vulnerability 2FA Monitoring Vendor Management Cybercrime Excel Physical Security Virtual Machines Professional Services Cryptocurrency Saving Time Hacking Presentation Computer Repair Managed IT Service Virtual Desktop Downloads Data storage LiFi Wireless Technology iPhone Licensing Outlook Vulnerabilities Entertainment Machine Learning Data Privacy Money Humor Word Images 101 Mobility Maintenance Telephone System Multi-Factor Authentication Sports Cost Management Antivirus Mouse Safety Administration Employees Integration Modem User Tip Processor Robot Mobile Security Holidays Settings Wireless Printing Data Storage Content Filtering Smart Technology Supply Chain IT Management Customer Relationship Management YouTube Meetings Video Conferencing VPN Managed Services Provider Screen Reader Distributed Denial of Service Workplace Gig Economy Point of Sale Service Level Agreement Internet Service Provider 5G Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Docs Unified Communications Regulations Compliance Experience Identity Smart Tech Memes Co-managed IT Bitcoin Network Management Bookmark Running Cable Tech Support User Download Net Neutrality Monitors Alerts SQL Server Technology Care Google Wallet Business Communications Financial Data History Connectivity IT Break Fix Scams Windows 8 IP Address Browsers Smartwatch Laptop Websites Upload Procurement Azure Hybrid Work Drones Multi-Factor Security Tech Human Resources SharePoint Social Network Telework Electronic Medical Records Cyber security Recovery IoT Communitications Dark Web Cables CES Halloween Hard Drives Trends Supply Chain Management Writing Lenovo Google Calendar Term Google Apps Domains Customer Resource management FinTech Virtual Reality Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Hacks Server Management Data Analysis Scary Stories Private Cloud Superfish Identity Theft Refrigeration Gamification Flexibility Fun Staff Value Business Intelligence Legislation Shortcuts Deep Learning Public Speaking Organization Twitter Social Networking Fileless Malware Digital Security Cameras Error Smart Devices Ransmoware Lithium-ion battery Education Content Remote Working Social Engineering Entrepreneur Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Health IT Remote Computing Directions Videos Assessment Electronic Health Records Permissions Workforce Mobile Computing Tablet Undo Search Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Best Practice Alert Microchip Buisness File Sharing Internet Exlporer Software as a Service Dark Data Fraud Meta Managed IT Legal IT solutions Username How To Managing Costs Amazon eCommerce Black Friday SSID Business Growth Notifications Travel Application Database Surveillance Virtual Assistant Outsource IT Media Techology Google Maps Cortana IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Alt Codes IBM Proxy Server Reviews Downtime Unified Threat Management Tactics Development Hotspot Transportation Small Businesses Unified Threat Management Hosted Solution Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Typing Shopping Addiction Network Congestion Language Employer/Employee Relationships Outsourcing Navigation Google Drive User Error Competition Management PCI DSS Knowledge Chatbots

Blog Archive