Pre-installed apps play key role in user devices getting infected with malware: report

Pre-installed apps play key role in user devices getting infected with malware: report

Pre-installed default apps play an important role in terms of user devices getting infected with malware or adware, according to a recent Kaspersky report.


The report details how user devices get infected, with a system partition infection making the malicious files undeletable.


“A system partition infection entails a high level of risk for users of infected devices, as a security solution cannot access the system directories, meaning it cannot remove the malicious files,” Kaspersky explained.


According to the report, 14.8 per cent devices targeted by malware in 2019 suffered a system partition infection, with pre-installed apps having an important role to play.


“Pre-installed default applications also play a role here: depending on the brand, the risk of undeletable applications varies from one to five per cent in low-cost devices and goes up to 27 per cent in extreme cases,” the report said.


According to the report, this type of infection is gaining popularity in terms of hackers looking to infect devices with adware. Adware is a malicious threat actor that floods user devices with intrusive ads.


“Infection can happen via two paths: the threat gains root access on a device and installs adware in the system partition, or the code for displaying ads gets into the firmware of the device, before it even ends up in the hands of the consumer,” the report read.


“In some cases, adware modules were pre-installed before the user even received their device, which could lead to potentially undesired and unplanned consequences. For instance, many smartphones have functions providing remote access to the device – if abused, such a feature could lead to a data compromise of a user’s device,” it added.


These threats include various malicious programmes, including Trojans.


Kaspersky research ..

Support the originator by clicking the read the rest link below.