Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Computer Efficiency Workplace Tips Google Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Ransomware Hardware Gmail Network Security Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Operating System Facebook The Internet of Things Social Media Networking Data storage Quick Tips Data Windows Experience Firewall Content Filtering Smartphones Cybercrime Mobile Device Management Money Website Network Managed Service Provider Outlook Employer-Employee Relationship Two-factor Authentication Wireless Technology History Android Small Business Apple Phishing App Mobile Computing Best Practice Big Data communications Safety Alert Unified Threat Management Music IP Address Virtualization Displays Cryptocurrency Laptop Government Augmented Reality Keyboard IBM End of Support Google Docs Search Education User Cleaning Hard Drives Holiday Black Market Remote Computing YouTube Shortcut Processors Staffing Writing Office Tips DDoS LiFi BYOD Heating/Cooling Downtime Word Passwords Streaming Media Help Desk Disaster Micrsooft Visible Light Communication Business Management Business Growth Data Management Recovery Retail Robot Advertising Competition Society Presentation Sports Entrepreneur Google Wallet Domains Spam Running Cable Managed IT services Information Technology Windows 8 Hacker Internet of Things Hosted Solution Windows XP IT Services Documents Bluetooth Artificial Intelligence Application Tech Support Customer Service Compliance Automation Drones Memory Social Printer Browser Router Deep Learning Office 365 Virtual Desktop Wireless Securty BDR Unified Communications Document Management Analytics Encryption Saving Money intranet Vendor Management Law Enforcement Lithium-ion battery SaaS VoIP Proactive IT Cortana Social Networking Monitors Network Congestion Public Speaking Save Money
QR-Code