top of page

The dangers of pre-installed malware in Android devices

A widespread supply chain compromise has attracted the attention of cybercriminals exploiting vulnerabilities in the Android ecosystem. Recent reports show that a trend has emerged where millions of Android devices are being shipped with pre-installed malware, posing a significant threat to users' privacy and security.

Within the Android supply chain, original equipment manufacturers (OEMs) outsource manufacturing, including firmware production, to third-party suppliers, creating vulnerabilities for malware injection during the manufacturing process.

Attackers utilize "silent plugins" bundled with firmware and system apps to embed malware, making detection and removal challenging.

Infected devices are then distributed to users, allowing the malware to operate covertly, stealing sensitive data, controlling online accounts, and engaging in fraudulent activities like ad clicks and monetisation schemes.

The implications of pre-installed malware on Android devices are significant, putting users' personal data and privacy at risk, exposing login credentials, financial information, and private communications.

Malware-infected devices can also serve as entry points for broader cyberattacks, enabling hackers to gain unauthorised access and perpetrate identity theft or launch additional malicious activities.

Mitigating pre-installed malware poses challenges, as removing embedded malware in system apps or firmware requires specialised knowledge and access privileges.

Additionally, the abundance of affordable Android devices with pre-installed malware makes it difficult for users to effectively identify and address the risks.

As the threat landscape continues to evolve, cybercriminals are likely to exploit emerging vulnerabilities or leverage sophisticated attack vectors to compromise a wider range of devices.

It will take a significant collective effort from users, OEMs, and security researchers to collaborate on innovative security measures, and regularly update their defences to counteract the evolving nature of this threat.

Remediation & Mitigation

Pre-installed malware in Android devices poses implications for forces with BYOD policies and MDM solutions.

Devices are often used as a form of Multifactor Authentication (MFA), this increases the risk of users having compromised login credentials and potentially granting unauthorised access to systems.

To mitigate the impact, organisations with BYOD policies should strengthen and establish device security requirements, conduct regular security assessments, and enhance MDM capabilities for detecting and removing pre-installed malware.

Emphasis should be on promoting employee awareness, ensuring they are aware of the dangers of

buying mobile devices from consumer-to-consumer selling platforms, such as, Facebook Marketplace, eBay, Vinted and Etsy and provide regular training on device security.

If you're worried about malware or your business's cyber security in general, contact us for guidance. We also have various affordable services available to you, and we can put you in touch with our Cyber Essentials Partners if you require Cyber Essentials, Cyber Essentials+, tech advice or disaster recovery.



Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).



The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.


EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page