• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

RottenSys: Some smartphones are coming with malware already installed

September 17, 2018 by Manogna Alahari 4 Comments

The team of security researchers discovered there are millions Android brand new smartphone have been pre-installed malware, call “RottenSys”, somewhere along the supply chain. This looks like Android systems are more vulnerable to malware and other attacks. Android systems should consider running a pre-installation security check to be part of their OS, This will help detect any malware or unwanted software to be part of their Operating System. Also, comparative studies with other OS like MAC OS will help them understand why Android ‘s are more vulnerable to insecure software.

Because of the way Google Play works, Android has a “bad app” problem. Google lets any developer upload an app to the Play Store, regardless of if it works, how it looks, or whether or not it can harm users. Malware scanning happens primarily after apps are uploaded, and though Google has recently taken steps to safeguard users with its Play Protect program, you don’t have to depend on them.

Below are the few tips to prevent malware attacks in Android systems :

Tip 1: Don’t Depend on Google Play Protect

“Google Bouncer” will help identify malware in the apps within the play store

Tip 2: Review App Permissions

By minimizing app access, protect yourself from hackers obtaining an unnecessary amount of information about you. This practice also protects you from malicious agents (such as hackers) who might compromise the app to attack your device.

Tip 3: switch Off Unknown Sources

disabling “Unknown sources” won’t deactivate the third-party apps. Instead, it will prevent unauthorized installation of non-Play Store apps from outside threats scheming to attack your device.

https://blog.avira.com/rottensys-preinstalled-malware/

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Ruby(Qianru) Yang says

    September 17, 2018 at 4:26 pm

    Hi Manogna,

    Very interesting article, and thanks for tips to prevent malware attacks in Android systems :
    Tip 1: Don’t Depend on Google Play Protect
    Tip 2: Review App Permissions
    Tip 3: switch Off Unknown Sources

    Log in to Reply
  2. Xinteng Chen says

    September 17, 2018 at 6:14 pm

    Hi Manogna, thanks for sharing this important information. It is important to protect the smartphone, because users usually store a lot of personal information on their smartphone, such as photos, friends’ numbers. It is a serious problem if the malware steal the information and unauthorized disclose them. The three tips are useful to lower the impacts of malware.

    Log in to Reply
  3. Yingyan Wang says

    September 19, 2018 at 3:25 pm

    Hi Manogna,

    Smartphone security is important for our daily life. Smartphone stored a lot of information about its user and once hacked, or controlled to steal personal information about user, it calls information security into questions. The tips giving in the article are good to know and useful. We should pay attention to our daily information security.

    Log in to Reply
  4. Brock Donnelly says

    September 22, 2018 at 7:55 am

    lets not forget that Android, Google Play store, and google phones in general are an answer to Apple’s iPhone. It’s a catch up game. Apple designed their entire store platform on an extensive set of checks an balances. Google on the race to catch up, launched a phone, launched a store and to “compete” chose to take a less secure path to vetting 3rd party developers on the google play store.

    Don’t get me wrong, I thing google is such a titan that this will no likely hurt them in the long run BUT if they wish to catch up to Apple’s reputation… they still have a ways to go.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in