ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Data Recovery Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Managed Service Windows 10 Apps IT Support Browser Cloud Computing Miscellaneous Outsourced IT Remote Work Data Management Internet of Things Managed Service Provider Government Saving Money Operating System Networking Workplace Strategy Windows Gadgets Artificial Intelligence Managed IT services Mobile Device Management Business Technology Remote Blockchain App Virtualization Spam Server Information Bandwidth WiFi Encryption Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 History Budget Big Data Conferencing Access Control Health Data Security Analytics Cybercrime Wi-Fi BDR IT Management Help Desk Training Hacking Cost Management Employer-Employee Relationship Voice over Internet Protocol Document Management Hacker Patch Management Save Money Vendor Remote Computing Remote Monitoring Compliance Website Computing Vendor Management Hard Drive Data loss Search... Best Practice Legal Retail Mobile Office Data storage Alert Money Managed Services Applications Customer Service Hiring/Firing Unified Threat Management Firewall Outlook Project Management Password Vulnerabilities Augmented Reality Word BYOD IBM Router Mobile Computing Google Maps Scam The Internet of Things Marketing YouTube Twitter Running Cable Windows 11 VPN Law Enforcement Laptop End of Support Storage Update Printer Remote Workers Windows 7 Data Breach Free Resource Paperless Office Antivirus Sports Travel Social User SaaS DDoS Virtual Reality Social Engineering How To Maintenance Cryptocurrency Black Market Monitoring iPhone Cleaning Education Cortana Chrome Robot Healthcare Websites Content Filtering Meetings Mobility Avoiding Downtime Software as a Service Solid State Drive Administration Data Protection Computers Processors Bitcoin Presentation Holidays Telephone Specifications Drones Chromebook IT Consultant Cooperation Automobile Video Conferencing Customer Relationship Management Excel Co-Managed IT Virtual Machines How To Entertainment Computer Repair Tech Terms Wireless Technology Microchip Flexibility eWaste Professional Services Managed IT Virtual Assistant Digital Downtime Hack Safety Identity Theft Taxes Managed Services Provider Notifications Unified Communications Virtual Private Network Virtual Desktop Google Docs HIPAA Processor Experience Bluetooth Current Events Distributed Denial of Service Physical Security Office Tips Solutions Private Cloud Memory Disaster Integration Multi-factor Authentication Images 101 Display Start Menu Politics Computer Care Downloads Machine Learning Settings Lithium-ion battery Vulnerability Saving Time PowerPoint Employees Error Tablets Videos Business Intelligence Surveillance Hosted Solution Managing Costs Bookmark Business Metrics Electronic Payment Securty Books Supercomputer Piracy Google Calendar Term SSID Download Employer/Employee Relationships Virus HTML Domains Language Media Society Development Phone System Virtual Machine Browsers Nanotechnology Motion Sickness Reading Software License Monitors Reviews Visible Light Communication Optimization Comparison Google Play Smart Technology Google Drive Upload Teamwork Social Network 2FA Windows 8 Data Storage Hypervisor Knowledge Data Analysis Corporate Profile Screen Reader Relocation Employer Employee Relationship Mobile Technology Public Speaking Displays Shopping Advertising Television Security Cameras Medical IT Telephony Trends SQL Server Customer Resource management Streaming Media Cabling Devices Work/Life Balance Paperless Tech Support Computer Accessories Keyboard PCI DSS Licensing Fileless Malware Tablet G Suite Tip of the week VoIP Gamification Tracking Company Culture Hard Drives Gig Economy Humor Mouse Supply Chain Internet Service Provider Azure Telephone System In Internet of Things Regulations Business Communications intranet Web Server Shortcut Network Congestion Regulations Compliance Managed IT Service Directions Backup and Disaster Recovery Wireless Hacks Workplace Content Reliable Computing Digital Payment Desktop Heating/Cooling Writing Environment Memes SharePoint Net Neutrality Electronic Medical Records Windows XP Worker Accountants Human Resources Social Networking Financial Data Access Database Scams Time Management Scalability Public Cloud Troubleshooting Risk Management IT Health IT Administrator Equifax Text Messaging Google Apps Proactive IT Hard Drive Disposal Telework Audit Spyware Tactics Bring Your Own Device Microsoft 365 Cables Username File Sharing Smartwatch Communitications Procurement Redundancy Startup Freedom of Information Music Staffing email scam FinTech Navigation Cache Addiction Point of Sale Unified Threat Management Workers Mobile Security IP Address Business Owner CES IT Assessment Supply Chain Management Value User Tip Botnet Legislation News Rental Service CCTV Micrsooft Organization Cyber security Printing Evernote Shortcuts Network Management Touchscreen Flash Smart Devices Business Growth Remote Working Emergency Proxy Server Emails Telephone Systems Computer Malfunction Fake News Recovery Computing Infrastructure Competition AI Trend Micro Be Proactive Vendor Mangement Service Level Agreement Transportation Management Samsung Device security Inbound Marketing Digital Security Cameras Electronic Health Records Entrepreneur Google Wallet Wasting Time LiFi Uninterrupted Power Supply Wireless Headphones Banking Webcam Microsoft Excel Documents Messenger Business Cards Application Deep Learning eCommerce Tech Modem Workplace Strategies Business Mangement Going Green

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?