Israel-based cyber security firm
According to a company blog post last week, the
"The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain," the company said.
The malware added to the devices' ROM could not be removed by the users, therefore, the devices had to be re-flashed.
The research team at Check Point found that one of the pre-installed malwares was
"The most notable rough adnet which targeted the devices is the Loki Malware. This complex malware operates by using several different components; each has its own functionality and role in achieving the malware's malicious goal," the cyber security firm said.
Pre-installed malwares steal data from the devices and are installed to system, taking full control of the device.
The cyber security firm suggested users to protect themselves from regular and pre-installed malware by implementing advanced security measures capable of identifying and blocking any abnormality in the device's behaviour.
0 comments:
Post a Comment