Categories: MalwareMobile

DeathRing, a new Pre-loaded mobile trojan in the wild

The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm.

It’s not first the time that Android handsets come preloaded with malware, but cyber security experts are warning of a worrying increase of the cases. The problem is widespread in Asia and Africa, where criminals are able to compromise the supply chain. Similar cases are frequent for a cheap, low-level devices. The AV company Dr. Web recently spotted a mobile Trojan embedded in the firmware of several low price Android devices.

Security researchers at Lookout firm have detected pre-loaded instances of the DeathRing malware for the second time in 2014, unfortunately they are not currently aware of where in the supply chain the mobile trojan is installed.

“DeathRing is a Chinese trojan that is pre-installed on a number of smartphones most popular in Asian and African countries. Detection volumes are moderate, though we consider this a concerning threat given its pre-loaded nature and the fact that we are actively seeing detections of it around the world.” reports the blog post from Lookout.

The DeathRing trojan has been detected in Vietnam, Indonesia, India, Nigeria, Taiwan, and China.

DeathRing preloaded malware 2DeathRing preloaded malware 2

The DeathRing trojan masquerades as a ringtone app, but once infected the mobile device, it is able to download malicious content from the C&C servers to use for malicious activities. The malicious app downloads SMS and WAP content from the control infrastructure as explained by the experts.

“For example, DeathRing might use SMS content to phish victim’s personal information by fake text messages requesting the desired data. It may also use WAP, or browser, content to prompt victims to download further APKs — concerning given that the malware authors could be tricking people into downloading further malware that extends the adversary’s reach into the victim’s device and data.” states the post.

Very interesting are the ways used by the malware to start malicious operation, basically it could activate itself in these cases:

  • The DeathRing malware will activate if the phone is powered down and rebooted five times.
  • The DeathRing trojan will start after the victim has been away and present at the device at least fifty times.

The DeathRing malware is loaded in the system directory of several devices mostly from third-tier handset manufacturers, which include:

  • Counterfeit Samsung GS4/Note II
  • Various TECNO devices
  • Gionee Gpad G1
  • Gionee GN708W
  • Gionee GN800
  • Polytron Rocket S2350
  • Hi-Tech Amaze Tab
  • Karbonn TA-FONE A34/A37
  • Jiayu G4S – Galaxy S4 Clone
  • Haier H7
  • No manufacturer specified i9502+ Samsung Clone

Earlier this year, the experts at Lookout detected a similar strain of pre-loaded malware called Mouabad, which affected predominantly Asian countries. The principal problem approaching pre-loaded malware is the impossibility for security vendors to remove them.

Pierluigi Paganini

(Security Affairs –  DeathRing, Lookout)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

59 minutes ago

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

8 hours ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

12 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

13 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

17 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

1 day ago