According to a company blog post last week, the pre-installed malware was detected in 36 Android devices, including Samsung(samsung.com)
Galaxy Notecellular phone made by Samsung2,
SamsungTechnology companyGalaxy Note 3,
SamsungTechnology companyGalaxy Note 4, Samsung Galaxy Note 5, Samsung Galaxy S4, Samsung Galaxy S7, Samsung Galaxy A5, ZTE x500, Asus ZenFone 2, Lenovo(lenovo.com) S90,
LenovoTechnology companyA850, and LG(lg.com) G4.
Israel-based cyber-security firm Check Point has detected a malware that is not downloaded due to users` use but is already present in Android device.
"The malicious applications were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain," the company told.
The malware added to the devices` ROM could not be removed by the users, therefore, the devices had to be re-flashed.
The research team at Check Point found that one of the pre-installed malwares was Slocker, a mobile ransomware, that uses the Advanced Encryption Standard (AES)
encryptionEncryption is the conversion of electronic data into another formalgorithm to encrypt all files on the device and demand ransom in return for their decryption key.
"The most notable rough adnet which targeted the devices is the Loki Malware.This complex malware operates by using several different components; each has its own functionality and role in achieving the malware`s malicious goal," the cyber-security firm said.
Pre-installed malwares steal data from the devices and are installed to system, taking full control of the device.
The cyber-security firm suggested users to protect themselves from regular and pre-installed malware by implementing advanced security measures capable of identifying and blocking any abnormality in the device`s behaviour.