{"id":17386,"date":"2020-01-09T09:10:02","date_gmt":"2020-01-09T17:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/09\/news-11122\/"},"modified":"2020-01-09T09:10:02","modified_gmt":"2020-01-09T17:10:02","slug":"news-11122","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/09\/news-11122\/","title":{"rendered":"United States government-funded phones come pre-installed with unremovable malware"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Thu, 09 Jan 2020 16:00:00 +0000<\/strong><\/p>\n<p>A United States\u2013funded mobile carrier that offers phones via the Lifeline Assistance program is selling a mobile device pre-installed with not one, but two malicious applications. Assurance Wireless by Virgin Mobile offers the UMX U686CL phone as their most budget conscious option. At only $35 under the government-funded program, it\u2019s an attractive offering. However, what it comes installed with is appalling.<\/p>\n<h3>Not just malicious, but pre-installed<\/h3>\n<p>In October 2019, we saw several complaints in our support system from users with a government-issued phone reporting that some of its pre-installed apps were malicious. We purchased a UMX U686CL to better assist our customers and verify their claims.<\/p>\n<p>We informed Assurance Wireless of our findings and asked them point blank why a US-funded mobile carrier is selling a mobile device infected with pre-installed malware? After giving them adequate time to respond, we unfortunately never heard back. Here&#8217;s what we discovered.<\/p>\n<p>The first questionable app found on the UMX U686CL poses as an updater named Wireless Update. Yes, it is capable of updating the mobile device. In fact, it\u2019s the only way to update the mobile device&#8217;s operating system (OS). Conversely, it is also capable of auto-installing apps without user consent. <\/p>\n<p>Thus, we detect this app as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-pup-riskware-autoins-fota\/\">Android\/PUP.Riskware.Autoins.Fota.fbcvd<\/a>, a detection name that should sound familiar to Malwarebytes for Android customers. That&#8217;s because the app is actually a variant of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\">Adups<\/a>, a China-based company caught collecting user data, creating backdoors for mobile devices and, yes, developing auto-installers. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41596\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/1-60\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1.png\" data-orig-size=\"480,854\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1-169x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1-337x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1-337x600.png\" alt=\"\" class=\"wp-image-41596\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1-337x600.png 337w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/1.png 480w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/><\/figure>\n<\/div>\n<p>From the moment you log into the mobile device, Wireless Update starts auto-installing apps. To repeat: There is no user consent collected to do so, no buttons to click to accept the installs, it just installs apps on its own.  While the apps it installs are initially clean and free of malware, it&#8217;s important to note that these apps are added to the device with zero notification or permission required from the user. This opens the potential for malware to unknowingly be installed in a future update to any of the apps added by Wireless Update at any time.&nbsp; <\/p>\n<h3>Not just pre-installed, but unremovable<\/h3>\n<p>It\u2019s with great frustration that I must write about yet another <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within\/\">unremovable pre-installed malicious app<\/a> found on the UMX U686CL phone: the mobile device&#8217;s own <em>Settings<\/em> app functions as a heavily-obfuscated malware we detect as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-trojan-dropper\/\">Android\/Trojan.Dropper.Agent.UMX<\/a>. Because the app serves as the dashboard from which settings are changed, removing it would leave the device unusable.<\/p>\n<p>Android\/Trojan.Dropper.Agent.UMX shares characteristics with two other variants of known mobile Trojan droppers. The first characteristic is that it uses the same receiver and service names. The receiver name ends with <em>ALReceiver <\/em>and the service name ends with <em>ALAJobService. <\/em>These names alone are too generic to make a solid correlation. But, coupled with the fact that the code is almost identical, and we can confidently confirm a match.&nbsp; <\/p>\n<p>The only difference between the two codes are their variable names. The more discernible variant of this malware uses Chinese characters for variable names. Therefore, we can assume the origin of this malware is China.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41629\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/2-50\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2.png\" data-orig-size=\"488,379\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2-300x233.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2.png\" alt=\"\" class=\"wp-image-41629\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2.png 488w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/2-2-300x233.png 300w\" sizes=\"(max-width: 488px) 100vw, 488px\" \/><figcaption>Variant of malware with Chinese variable names <\/figcaption><\/figure>\n<p>The second characteristic it shares is containing an encoded string within the code. Decoding this string reveals a hidden library file named <em>com.android.google.bridge.LibImp.<\/em><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"41627\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/b64-02_edit\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit.jpg\" data-orig-size=\"443,54\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;A&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1576610508&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"b64-02_edit\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit-300x37.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit.jpg\" alt=\"\" class=\"wp-image-41627\" width=\"665\" height=\"80\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit.jpg 443w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/b64-02_edit-300x37.jpg 300w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><figcaption>Decoded string with  <br \/><em>com.android.google.bridge.LibImp<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Let&#8217;s take some time to look at how the code flows while decoding <em>com.android.google.bridge.LibImp<\/em>. It first grabs the encoded string and decodes using Base64 decoding.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41630\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/flow1-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1.png\" data-orig-size=\"915,136\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flow1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1-300x45.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1-600x89.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1-600x89.png\" alt=\"\" class=\"wp-image-41630\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1-600x89.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1-300x45.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow1.png 915w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Encoded string <\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41631\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/flow2-13\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2.png\" data-orig-size=\"406,52\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flow2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2-300x38.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2.png\" alt=\"\" class=\"wp-image-41631\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2.png 406w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2-300x38.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow2-400x52.png 400w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><figcaption>Base64 decoding<\/figcaption><\/figure>\n<p>It then loads the decoded library into memory using <em>DexClassLoader<\/em>.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41632\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/flow3-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3.png\" data-orig-size=\"460,170\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flow3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3-300x111.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3.png\" alt=\"\" class=\"wp-image-41632\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3.png 460w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/flow3-300x111.png 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><figcaption><em>DexClassLoader <\/em>loading decoded string <\/figcaption><\/figure>\n<p>After the library is loaded into memory, it then drops another piece of malware known as <a href=\"Android\/Trojan.HiddenAds\">Android\/Trojan.HiddenAds<\/a>.<\/p>\n<p>Although we have yet to reproduce the dropping of additional malware ourselves, our users have reported that indeed a variant of HiddenAds suddenly installs on their UMX mobile device.<\/p>\n<h3>The malware origin<\/h3>\n<p>In addition to the malware being of Chinese origin, it&#8217;s noteworthy to mention that this UMX mobile device is made by a Chinese company as well. This could simply be a coincidence rather than explicit malcontent\u2014we cannot confirm if the makers of the device are aware there is Chinese malware pre-installed.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41754\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/attachment\/umx_made-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1.jpg\" data-orig-size=\"3792,1866\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;1.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Pixel 2&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1577696142&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;4.442&quot;,&quot;iso&quot;:&quot;246&quot;,&quot;shutter_speed&quot;:&quot;0.020005&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"UMX_Made\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1-300x148.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1-600x295.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1-600x295.jpg\" alt=\"\" class=\"wp-image-41754\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1-600x295.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Made-1-300x148.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<h3>No current resolution<\/h3>\n<p>Although we do have a way to <a href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-removal-instructions-for-adups\/\">uninstall pre-installed apps for current Malwarebytes users<\/a>, doing so on the UMX has consequences. Uninstall Wireless Update, and you could be missing out on critical updates for the OS. We think that\u2019s worth the tradeoff, and suggest doing so.&nbsp; <\/p>\n<p>But uninstall the <em>Settings<\/em> app, and you just made yourself a pricey paper weight. We do offer an attempt to remediate such pre-installed malware in our blog: <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within\/\">The new landscape of pre-installed mobile malware: malicious code within<\/a>. See section: <em>Attempting to remediate.<\/em><\/p>\n<h3>Pre-installed malware getting worse, as foreshadowed<\/h3>\n<p>As I have highlighted in this blog and blogs past, pre-installed malware continues to be a scourge for users of mobile devices. But now that there&#8217;s a mobile device available for purchase through a US government-funded program, this henceforth raises (or lowers, however you view it) the bar on bad behavior by app development companies.<\/p>\n<p>Budget should not dictate whether a user can remain safe on his or her mobile device. Shell out thousands for an iPhone, and escape pre-installed maliciousness. But use government-assisted funding to purchase a device and pay the price in malware? That&#8217;s not the type of malware-free existence we envision at Malwarebytes.<\/p>\n<h3>Final words on UMX U686CL<\/h3>\n<p>Having an actual UMX U686CL in my hands, I can tell you it is not a bad phone. It feels solid in hand and runs smoothly. Sure, it\u2019s not the fastest mobile device, but it\u2019s a fully capable smart phone. In general, without the malware, this device is a good option for anyone on a budget.&nbsp; <\/p>\n<p>It\u2019s important to realize that UMX isn\u2019t alone. There are many reports of budget manufactures coming pre-installed with malware, and these reports are increasing in number. Although I don\u2019t have the answer to this widespread issue, I can say that US citizens using the Lifeline Assistance Program and many others on a tight budget deserve more. Stay safe out there.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\">United States government-funded phones come pre-installed with unremovable malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Thu, 09 Jan 2020 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/' title='United States government-funded phones come pre-installed with unremovable malware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/UMX_Featured_Image_resize.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A US-funded government assistance program is selling budget-friendly mobile phones that come pre-installed with unremovable malicious apps. Malwarebytes Labs investigates the malware&#8217;s origins.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/android\/\" rel=\"category tag\">Android<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-malware\/\" rel=\"tag\">android malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-trojan-dropper-agent-umx\/\" rel=\"tag\">Android\/Trojan.Dropper.Agent.UMX<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-trojan-hiddenads\/\" rel=\"tag\">Android\/Trojan.HiddenAds<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china\/\" rel=\"tag\">china<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-malware\/\" rel=\"tag\">mobile malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pre-installed-mobile-malware\/\" rel=\"tag\">pre-installed mobile malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pre-installed-software\/\" rel=\"tag\">pre-installed software<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/' title='United States government-funded phones come pre-installed with unremovable malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\">United States government-funded phones come pre-installed with unremovable malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,11254,23877,23878,402,10554,11255,23879,22438,10833],"class_list":["post-17386","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-android-malware","tag-android-trojan-dropper-agent-umx","tag-android-trojan-hiddenads","tag-china","tag-mobile","tag-mobile-malware","tag-pre-installed-mobile-malware","tag-pre-installed-software","tag-trojan"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17386"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17386\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17386"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}