crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Integrated Business Technologies can help. To learn more, reach out to us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 14 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions Business IT Support Network Malware Mobile Devices Hardware Small Business Email Software Smartphones Data Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Innovation Holiday Social Media WiFi BYOD Windows 10 User Tips Mobile Computing Bring Your Own Device Passwords Remote Monitoring Browser Smartphone Best Practice Apple Spam Wireless Technology Android Trending Users Operating System Content Filtering Remote Computing History Alert Internet of Things Outsourced IT Going Green Managed IT services The Internet of Things Firewall Office Data Management Unified Threat Management Printer Information Technology Current Events IT Solutions Save Money Lithium-ion Battery Network Security IT Consultant Big Data Customer Relationship Management Managed IT Windows 8 Artificial Intelligence Ransomware Tech Support Data Backup Humor Saving Time Gmail Analytics Avoiding Downtime Facebook Maintenance Hard Drives App Outlook Antivirus Health Collaboration Digital Payment Marketing Excel Office Tips Retail Risk Management Phishing IT service Business Growth Apps Application Phone System Virus Employer-Employee Relationship Customer Service Hacking Computers Fax Server Mouse Two-factor Authentication Presentation Social Budget Mobile Device Automation Router VPN PowerPoint Recovery Inbound Marketing Money Tablet Running Cable iPhone Training Administration Office 365 User Error Password Data Recovery Proactive IT Co-Managed IT Computer Repair Point of Sale Downtime Hosted Solution Search Document Management Data storage Virtual Desktop USB Net Neutrality Cybersecurity IBM Business Owner Project Management Robot Mobility Printing Hacker File Sharing Programming End of Support User LiFi Government Social Networking Computing Analyitcs Education Display Safety Specifications Licensing Settings Files Wireless Chrome Save Time Intranet Cybercrime Applications Business Intelligence Hiring/Firing Augmented Reality Encryption Website Tip of the week Piracy Help Desk Statistics Sports Competition Network Congestion Productivity Cryptocurrency Public Speaking Black Friday Virtual Private Network Google Docs Cortana eWaste Company Culture Access Control Twitter Flexibility Travel Bitcoin Cyber Monday Redundancy Adminstration Touchscreen Knowledge Environment communications SharePoint 3D Hacks Samsung Debate Experience Troubleshooting Unified Communications Heating/Cooling Downloads SaaS Consumers Crowdfunding Wearable Technology Networking Scam Multi-Factor Security Conferencing Software Tips Scheduling IP Address Smart Technology Data Security Alerts Monitors PC Care Deep Learning Refrigeration Disaster Google Calendar Value Telephony eBay Google Wallet Distributed Denial of Service Techology Remote Support Writing Leadership Cost Management Digital Signature Skype Legislation Streaming Media New Additions IT Support Text Messaging Drones Memory Managed IT Service Print Server Disaster Resistance Work Station Social Engineering Laptop Buisness Identities LinkedIn Private Cloud Congratulations Managed IT Services Video Surveillance Backups Wi-Fi Documents Break Fix Law Firm IT Windows 8.1 Update IT Consulting Recycling Halloween CIO Entrepreneur Solid State Drive Undo Best Available Software as a Service Public Cloud Macro Data loss Legal 5G PDF People Dark Web Data Breach Compliance Scary Stories Alt Codes Technology Tips Sync Microsoft Excel Bluetooth Online Currency Technology Laws Gaming Console Regulations YouTube Typing Domains Comparison Mobile Device Managment Computer Accessories Google Drive Fun Word Unified Threat Management How To Bandwidth

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...