crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Integrated Business Technologies can help. To learn more, reach out to us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hackers Backup Hosted Solutions Malware Email Mobile Devices IT Support Business Software Small Business Hardware Network Communication Server Smartphones Data Upgrade Business Continuity Windows Mobile Device Management VoIP Efficiency Microsoft Office Disaster Recovery Computer Google Virtualization Miscellaneous Mobile Office Vendor Management Social Media Innovation Holiday Gadgets Android Quick Tips Smartphone Passwords BYOD Outsourced IT User Tips Mobile Computing WiFi Data Backup Windows 10 Browser Ransomware Bring Your Own Device Spam Remote Monitoring Internet of Things The Internet of Things Network Security Best Practice Users Remote Computing Wireless Technology Alert Data Management Managed IT services Trending Operating System Apple Content Filtering Data Recovery Artificial Intelligence History Going Green Firewall App Unified Threat Management Gmail Managed IT Printer Big Data Tech Support Office Analytics IT Solutions Lithium-ion Battery Save Money Information Technology Current Events IT Consultant Maintenance Hard Drives Customer Relationship Management Windows 8 Router Humor Saving Time Facebook Encryption Avoiding Downtime Cloud Computing Tech Term Antivirus Phishing Fax Server Applications Document Management Outlook IT service Mobile Device Health Digital Payment VPN Business Growth Risk Management Managed IT Services Marketing Excel Employer-Employee Relationship Website Customer Service Hacking Computers Phone System Collaboration Cybersecurity Two-factor Authentication Apps Application Virus Automation Office Tips Retail Money User Error Bandwidth Running Cable Social Co-Managed IT Net Neutrality Licensing Chrome Infrastructure Paperless Office PowerPoint Social Networking Wi-Fi Tablet Inbound Marketing Office 365 Project Management iPhone Password Government Administration Augmented Reality Presentation Data Security Budget Training Compliance Computer Repair Proactive IT Regulations Recovery Mouse Twitter Analyitcs Education Safety Specifications Settings Flexibility Hosted Solution IBM Cost Management Wireless Data storage Cybercrime File Sharing Save Time Vulnerability Wearable Technology Robot Unified Communications Hiring/Firing HIPAA Alerts Productivity Printing Display End of Support LiFi Redundancy Scam Computing Statistics Data loss Intranet Competition Business Intelligence Internet Exlporer Network Congestion Smart Technology Downtime Mobile Security Search Files Virtual Desktop USB Piracy Mobility Business Owner Sports Hacker User Point of Sale Programming Tip of the week Help Desk Healthcare Gaming Console Software Tips Dark Web IP Address Google Drive Company Culture How To Server Management Cooperation IT Consulting Motherboard Public Cloud Refrigeration Cryptocurrency Disaster Touchscreen Hard Drive Data Warehousing Google Docs Staff Data Breach Modem Sync Software as a Service Bitcoin Digital Signature Memory Cache Microsoft Excel Laptop communications Operations Cookies Adminstration Mobile Device Managment Technology Tips Hacks Documents Conferencing 3D IT Support Blockchain Halloween Technology Laws Entrepreneur Virtual Private Network Nanotechnology PC Care Comparison Undo PDF Value People Permissions 5G Scary Stories Virtual Reality Unified Threat Management eBay IT Technicians Remote Support Screen Reader Leadership Travel Black Friday Skype Streaming Media New Additions Fraud Monitors Scheduling SaaS Access Control Deep Learning Print Server Text Messaging Mirgation Work Station Smart Tech BDR Cyber Monday Domains Google Wallet LinkedIn Congratulations Assessment Fun Writing SharePoint Word Law Firm IT Video Surveillance Business Technology Storage Recycling Connectivity Identity Theft Public Speaking Drones Windows 8.1 Update Best Available eWaste Buisness IT Management Cortana Social Engineering Telephony Downloads Identities Networking Migration IoT Distributed Denial of Service Backups Environment CIO Network Management Hotspot Knowledge Multi-Factor Security Solid State Drive Bluetooth Chatbots Samsung Star Wars Managed IT Service Legal Online Currency Troubleshooting Debate Windows 10 Language Macro Experience Machine Learning Google Calendar Heating/Cooling Alt Codes Computer Accessories Techology Identity Crowdfunding Utility Computing Break Fix Consumers YouTube Computing Infrastructure Disaster Resistance Private Cloud Legislation Typing

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...