Categories: NewsSecurity

Several Dozen Cheap Android Devices Are Prone To Malware Downloaders

The Android ecosystem continues to be targeted by criminals who are looking to distribute malware. Notably cheaper Android smartphones are being targeted by this trend, which is quite troublesome. Any device that comes with customer downloading software should be avoided, or at least, have the tools removed. All these proprietary downloaders do is infect devices with various types of malware.

Malicious Android Downloaders Are A Threat

When people buy a cheaper Android device (either a smartphone or tablet) they may have noticed that these machines often come with a lot of pre-installed software. In most cases all this does is to slow down the system, but there are other aspects to take note of as well. New research indicates that this pre-installed software can be used to infect devices with malware.

Cheaper Android devices, produced by Irbis, Supra, Prestigio, and even Lenovo, often come loaded with pre-installed software–not that there’s anything wrong with that, as most tools can be removed with relative ease. Unfortunately, there is one tool in particular that stands out among the rest, and it has some very nasty habits.

Android Downloader 473.origin, as identified by Dr. Web, is always attempting to connect with a central command-and-control server. Once this connection is established, the tool will download and install a pre-programmed set of software. In most cases, various types of malware will be installed on the Android device itself.



Related Post

One of the possible types of malware that can be installed is Adware Adbox. This type of software has been causing quite a few headaches for security experts. After all, this tool displays advertisements on top of running applications, attempting to trick users into clicking on them. This is not a fun experience for any user, and can even lead to more malware being downloaded as a result.

Another type of malware discovered by Dr. Web is called Android Sprovider 7. This particular software is capable of a lot of mischief, including calling random phone numbers and installing other applications without user permission. It is also capable of visiting websites, tricking advertisers into paying for useless internet traffic.

This is not the first attack that has affected Android devices, nor will it be the last. This common mobile operating system has the largest market share, and it is a prime target for hackers and other online criminals. The fact that even two of Lenovo’s devices are affected is not a positive development by any means.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

The Calculated Collapse of $TG: How a “Utility” Token Was Engineered for a Rug Pull

In the unpredictable world of cryptocurrency, new tokens launch daily, each one a shining beacon…

1 day ago

Staked Ethereum Hits Record High as Whale Accumulation Signals Bullish Long-Term Sentiment

Once more, Ethereum is commanding the spotlight as fresh figures indicate that the amount of…

1 day ago

Arbitrum Sees Surge in Protocol Revenue and EIP-7702 Adoption Following ArbOS 40 Upgrade

The ecosystem on Arbitrum keeps flaunting its robust foundations, with a steady incline in the…

1 day ago

Ethereum Whale Accumulation Surges as Long-Term Confidence Outweighs Short-Term Volatility

Once again, major market players are focusing on Ethereum. The whale activity surrounding the second-largest…

4 days ago

Week in AI: Fartcoin Steals the Spotlight Amid Market Turmoil

It has been a tumultuous week for the artificial intelligence sector in crypto. Sharp valuation…

5 days ago

BSC Foundation Resumes Strategic Accumulation: VIXBT, CAKE, LISTA, and MOOLAH Under Spotlight

Following a brief stint of dormancy, the BSC Foundation is back in action, reestablishing its strategic…

7 days ago