Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Voyage Technology can help. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Data Recovery Disaster Recovery AI Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Automation Miscellaneous Artificial Intelligence Information Holiday Training Gadgets Covid-19 Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Virtualization Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Vendor Data Security Mobile Office Gmail WiFi Tip of the week Managed Services Voice over Internet Protocol Chrome Employer-Employee Relationship Budget Networking Apple App BYOD Mobile Device Management Computing Conferencing Access Control Information Technology Office 365 How To HIPAA Hacker BDR Applications Avoiding Downtime Marketing Risk Management Health Big Data Analytics 2FA Office Tips Healthcare Retail Augmented Reality Storage Password Managed IT Services Computers Bring Your Own Device Router Website Help Desk Operating System Virtual Private Network Printer Paperless Office Infrastructure The Internet of Things Telephone Document Management Windows 11 Social Remote Workers Cooperation Excel Scam Data loss Customer Service Free Resource Project Management Windows 7 Microsoft 365 Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Going Green Vendor Management Monitoring Physical Security Firewall Display Cybercrime Holidays Saving Time Computer Repair YouTube Safety Cryptocurrency Data Storage Managed IT Service Video Conferencing Downloads Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage Licensing Machine Learning LiFi Entertainment Outlook Supply Chain iPhone Maintenance Money Antivirus Humor Customer Relationship Management Telephone System Vulnerabilities Cost Management Hacking Sports Presentation Mouse Images 101 Mobility Multi-Factor Authentication Wireless Technology Administration Robot User Tip Modem Data Privacy Mobile Security Processor Employees Word Integration IT Management VPN Meetings Settings Wireless Printing Smart Technology Content Filtering Entrepreneur Medical IT Screen Reader Reviews Workforce Distributed Denial of Service Google Drive Threats Computing Infrastructure Tech Support Development Knowledge Transportation Service Level Agreement Network Management Identity Workplace Strategies Monitors Hypervisor Optimization 5G PowerPoint Bookmark Smart Tech Shopping Meta Undo Google Docs Amazon Alerts Websites Unified Communications Experience Employer/Employee Relationships Download Navigation Bitcoin PCI DSS Running Cable Browsers SharePoint Connectivity Google Wallet Gig Economy Outsource IT Break Fix Electronic Medical Records Environment Internet Service Provider Media Teamwork Upload Evernote Social Network Lenovo Windows 8 Regulations Compliance Multi-Factor Security Application Writing Laptop Virtual Reality Memes IoT Drones Small Businesses Dark Web Server Management Displays IBM Private Cloud Net Neutrality SQL Server Trends Customer Resource management Superfish Regulations Identity Theft Financial Data Google Calendar Halloween History Twitter IT Data Analysis Star Wars Smartwatch Outsourcing Microsoft Excel Staff Error Procurement Azure Gamification Tech Social Networking Hacks Telework Workplace Legislation Social Engineering Scary Stories Cyber security Competition Remote Computing Communitications Fun Fileless Malware CES Hiring/Firing Wearable Technology Deep Learning Supply Chain Management Paperless Content Term Health IT Motherboard Tablet FinTech Co-managed IT Comparison Alert Education IT Assessment Directions Assessment Technology Care Permissions Managed IT File Sharing Flexibility Business Communications User Dark Data Value Mobile Computing Organization Scams Specifications How To Hybrid Work Fraud Notifications Smart Devices Search Microchip Internet Exlporer Digital Security Cameras Username IP Address Travel Best Practice Remote Working Human Resources Memory Google Play Techology Google Maps Cables Black Friday Buisness Data Breach IT solutions Electronic Health Records Database Legal Videos IT Technicians Unified Threat Management Business Growth Google Apps Recovery Wasting Time Security Cameras Proxy Server Unified Threat Management Cookies IT Maintenance Cyber Monday Hard Drives Trend Micro Business Intelligence Hotspot Domains Software as a Service Cortana Tactics Mirgation Alt Codes Shortcuts Network Congestion Managing Costs SSID User Error Nanotechnology Ransmoware Refrigeration Downtime eCommerce Vendors Language Public Speaking Hosted Solution Surveillance Virtual Assistant Addiction Management Chatbots Lithium-ion battery Point of Sale Typing Be Proactive Virtual Machine

Blog Archive