US Government-funded phones found pre-installed with Chinese malware

Nathan Collier, a senior malware intelligence analyst at Malwarebytes published a blog detailing the firm’s findings on US government-funded smartphones

Malware is perhaps the most common way for hackers to compromise devices, leading to untold repercussions. They could be benign, simply triggering popup ads, but more often than not they’re a lot more sinister, harvesting your data, tracking your location, or invading your personal privacy. Malwarebytes has announced a startling discovery – they found US government-funded smartphones carrying pre-installed malicious applications.

The device itself is offered by a US-funded carrier that offers cellphones through the Lifeline Assistance Program, an FCC (Federal Communications Commission) backed initiative which lowers the monthly cost of smartphones and internet through government subsidies, making them affordable for low-income consumers.

In the blog, Collier reports on two malicious applications which, worryingly, come pre-installed on the UMX U686CL, a low-cost Android smartphone.

Malicious, pre-installed and unremovable

The first malicious application found by the American internet security firm acts under the guise of an operating system updater, named Wireless Update. It is the only way that the smartphone’s device can be updated and was found to be able to auto-install apps without user consent.

Collier said that Malwarebytes for Android customers would be acutely aware of the Wireless Update app. The previous iteration, developed by Chinese firm Adups, was last year caught transmitting location, SMS, call and app data to a server in China. The company is behind other auto-installer apps, spyware and malicious software, discovered on a range of Android devices from over 40 manufacturers.


READ MORE: Addressing the IoT Security Challenge


“From the moment you log into the mobile device, Wireless Update starts auto-installing apps,” Nathan Collier said. “There is no user consent collected to do so, no buttons to click to accept the installs, it just installs apps on its own.”

Collier points out that this updater opens the potential for surreptitious installations of malware in future updates, effectively leaving a backdoor open to the user’s device and, as a result, their personal and private data.

The second malicious application found on the UMX U686CL was the operating system’s very own Settings app, which “functions as a heavily-obfuscated malware”. The removal of the Settings app would leave the device effectively unusable. 

The UMX U686CL, manufactured in China, was found to carry two pre-installed malicious apps / Credit: Malwarebytes

Over the Great Firewall and into your pocket?

In the blog, Malwarebytes conclude that the malware is of Chinese origin, also noting that the device itself is manufactured by a company in China. They do stress, however, that this could merely be a coincidence, and that they could not confirm whether or not the device manufacturer is aware of the pre-installed malicious applications. 

AV-TEST, an independent IT security institute, examine and classify the growing number of malicious programs. Since 2011, the number of malicious programs has risen dramatically from 65 million to over 1 billion, a sizeable chunk of which is thought to have originated behind the Great Firewall.

As malicious software proliferates, reported findings from companies like Malwarebytes become more important, and solutions to catch and remove any unwanted applications or programs become necessary and valuable tools to ensure the safeguarding of one’s personal data. The affordability of such programs is also key to ensure the adoption of privacy measures, a sentiment echoed by Malwarebytes.

“Budget should not dictate whether a user can remain safe on his or her mobile device,” Nathan Collier said. “Shell out thousands for an iPhone, and escape pre-installed maliciousness. But use government-assisted funding to purchase a device and pay the price in the malware? That’s not the type of malware-free existence we envision at Malwarebytes.”


Malwarebytes made their findings clear to Assurance Wireless, one of the Lifeline Assistance Program’s cellphone service providers and asked for comment. They have not yet received a response.

Luke Conrad

Technology & Marketing Enthusiast

Six ways to maintain compliance and remain secure

Patrick Spencer VP at Kiteworks • 16th September 2024

With approximately 3.4 billion malicious emails circulating daily, it is crucial for organisations to implement strong safeguards to protect against phishing and business email compromise (BEC) attacks. It is a problem that is not going to go away. In fact, email phishing scams continue to rise, with news of Screwfix customers being targeted breaking at...

Enriching the Edge-Cloud Continuum with eLxr

Jeff Reser • 12th September 2024

At the global Debian conference this summer, the eLxr Project was launched, delivering the first release of a Debian derivative that inherits the intelligent edge capabilities of Debian, with plans to expand these for a streamlined edge-to-cloud deployment approach. eLxr is an open source, enterprise-grade Linux distribution that addresses the unique challenges of near-edge networks...

Embracing digital AI recruitment without rocking the boat

Katherine Loranger • 11th September 2024

Artificial intelligence (AI) is set to become indispensable in business operations. For global enterprises, AI offers significant benefits by simplifying complexity and enabling confident decisions—when used in the right way. Those HR recruitment teams that seamlessly integrate AI technologies will optimise their recruitment practices and will have the opportunity to better realise their commitment to...

Why a data strategy underpins a successful AI strategy

Jim Liddle • 05th September 2024

AI and machine learning offer exciting innovation capabilities for businesses, from next-level predictive analytics to human-like conversational interfaces for functions such as customer service. But despite these tools’ undeniable potential many enterprises today are unprepared to fully leverage AI’s capabilities because they lack a prioritised data strategy. Bringing siloed and far-flung unstructured data repositories into...
The Digital Transformation Expo is coming to London on October 2-3. Register now!