A woman near a Xiaomi service center in Beijing on August 05, 2015. (Greg Baker / AFP / Getty Images)
Malware (malicious software) that can hear calls, follow the track users and online shopping are preinstalled on smartphones Chinese companies, including Lenovo, Huawei and Xiaomi.
The latest findings of the German cyber security company G Data, a growing list of similar spy software found in smartphones add Chinese companies.
“This is happening in a lot of phones,” said Andy Hayter, impeller G DATA Security in a telephone interview.
In March, researchers with BlueBox like malware found in the Xiaomi Mi 4 LTE, which obtained during a trip to China.
Before that, in June 2014, G Data found malware pre-installed on the Chinese Star N9500 . In July 2014, a researcher at the IMA Mobile forum in Hong Kong found spyware installed on the Xiaomi Redmi Note.
Spyware found in all of these devices is similar, since it was preinstalled on devices before reaching consumers. According to Hayter, malware found by G Data has a unique feature:. Can not be removed
“You can not draw,” Hayter said, noting that if someone finds malware on your phone, your only option is to buy a new one.
This not only speaks of the complexity of malware, but also the amount of work behind him. The group or the individual behind the spyware need to unlock each phone, install the malware and then lock each phone again.
Researchers have not been able to find at what stage of the supply chain is installing malware. Hayter said he has the signs of being a big operation. Said, “There is a growing number of phones that are seeing.”
Along with the phones Huawei, Lenovo and Xiaomi, researchers at G Data found software like spy phones Alps Concorde, DJC, SESONN and Xido. In a report on their findings, they named 26 phone models with malware.
All the phones are made in China, except Concorde, according to the website news Softpedia technology.
G Data contacted the company to let them know about malware, and only two responded. Huawei said the security flaws must have taken place somewhere else further down the supply chain outside the manufacturing process. Lenovo said it would review.
Hayter suspect that malware is being installed by a dealer, somewhere between manufacturers and phone shops.
The researchers were not able to give information about each infected phone was obtained. Hayter said details about infections come from users who installed the mobile software G Data security on their smartphones.
The phones could come from manufacturers, or they may have been purchased at Amazon or phone store on the street.
Of course, the state can not be ruled espionage. The Chinese regime has a record for using similar smart phone malware in order to spy on people.
Lacoon Mobile Security researchers discovered a spy campaign aimed at pro-democracy demonstrators in Hong Kong 30 September 2014. The software would give hackers full control of the phone.
Michael Shaulov, executive director of Lacoon Mobile Security, told The Epoch Times that when it comes to smartphones, that can track user locations, and often hear calls have passwords for users, “the purpose of spying is probably the perfect tool.”
However, in recent cases, two factors suggest that this is the work of cybercriminals and no government spies.
First, if infected devices sold in stores, it is unlikely that they are being directed to individual users. For the Chinese authorities, this would be an unnecessary step, because they have domestic spying programs broad to track down dissidents.
In addition, as Hayter points out, the malware is aimed at “less sophisticated customers they are looking for a phone in the corner of the street. “He believes the malware by telephone distributors, who are using it to cybercrime is being installed.
But what the findings point is to poor safety standards for Chinese smartphones, which are often marketed as cheaper alternatives to the biggest brands.
Hayter noted that while the installation of this type of malware “is not a trivial operation “when there is money involved will be hovering near the crime and” it seems that this is the path that criminals are taking “.
No comments:
Post a Comment