US-Subsidized Program Sold Virus Infected Android Phones

American government is running a subsidized program under which Android phones are being distributed, and such phones are discovered to be infected by a malware. This malware is very hard to be detected and it’s embedded deep inside phone settings feature.

In some regions, people often use to buy low cost phones from retailers, telecom operators or subsidized programs. In certain conditions, some people even remain with last option which allows them to participate in some program and buy a phone at reasonable price. Such a subsidized program is also noticed in US, under which low cost Android phones sponsored by Lifeline Assistance Program, are found containing malware codes. These infected devices are sponsored by US FCC and the Assurance Wireless carrier that is operated by Virgin Mobile.

Reportedly, the virus has been discovered in the smart device named ANS UI40. Currently, it’s not yet known that this specific version is actually being sold in subsidized program, however a copy of instructions on the related website is noticed. According to security experts, they have tracked down the malware in Settings feature of Android operating system, also the malware is found in Wireless Update as well which is integrated in the Settings section of the device.

Further, the conducted researches by experts clears that the malware found on such phones are Trojan horse infection, and is installed on a very deep level, so it’s very hard enough to remove it. In the current situation, the malware is found inactive, which probably means the two things which are here discussed:

  • Test Infection: The virus might be injected to prove that a virus can be installed on devices which are distributed be end users.
  • Inactive Use: The infected devices may be currently not overseen by malicious actors, and they can activate the built in trojan anytime when required to accomplish their purposes.

The trojan infections if installed on a targeted devices, not only just hijack devices to take control of it, but also it steal user and system related information. Since the devices found infected have no pre-installed SIM card, might also be a reason why the installed trojan is inactive inside as the malware often needs a data connection to work in order to help its creators to meet their intentions.

Currently, there’s no information about which hacker’s group are responsible for such intrusion of malware codes on android devices. Even the term intrusion is still unknown, means it’s not yet known whether the malware come built-in from manufacturers or some third party is involved in the malware distribution process.