Feeds

Researchers warn of preloaded spyware in Android handsets

That off-brand Chinese smartphone you bought on eBay might not be secure

Beginner's guide to SSL certificates

Security firm G-Data is warning users about their discovery of malware shipping preinstalled on some Chinese mobile phones.

The German researchers said that they followed up on customer tips to study the Star N9500 mobile phone. The handsets, sold on eBay and many other online retail sites, are said to primarily be shipped out of China, and can be loosely described as a clone of the Samsung Galaxy S4.

While G-Data said that it has been unable to track down the company behind the N9500, the security firm believes that one or more organizations are selling the handsets new with malware bundled in.

The company said in its report that researchers have spotted a spyware bundle on handsets being offered for sale in Europe at costs ranging from €130 to €165. The Android handsets were found to contain a fake copy of the Google Play app and the Uupay.D Android trojan installed directly in the handset's firmware.

Researchers believe that the malware performs a number of basic spyware functions such as listening in on phone and SMS conversations, reading email messages, and collecting mobile browsing information and account data.

G-Data reported that the infected handset it studied was uploading user information to a server in China, though the location of the person(s) actually extracting the data was not known.

The report comes as Android malware continues to rise. Apple boss Tim Cook recently gloated over a mobile security situation for Android he called a "hellstew" of malware.

Last week, researchers with Kaspersky noted that malware writers in Russia have been repackaging their ransomware trojans to target mobile phone users in the US.

China, which has long had a strong market for domestically produced "clone" hardware and devices, has also seen an underground market for attack tools and services arise in recent years. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.