Xiaomi Mi 4 smartphone with preinstalled malware and much more

The security firm Bluebox discovered a preinstalled malware, many malicious apps, and a series of security holes on the Xiaomi Mi 4 smartphone.

After the episode of Lenovo pre-installed malware, another case is worrying the IT community. This time, security firm Bluebox has discovered pre-installed malware and other security issues with a Xiaomi Mi 4 mobile device.

The situation is quite different from the Lenovo case, when the company was aware of the presence of the spyware, because the mobile device seems to have been tampered with by an unidentified third party.

Bluebox has tried to contact the giant Xiaomi without receiving any response so it decided to publish a report on Thursday.

“Xiaomi is fixing their response process and the device we tested appears to have been tampered in the distribution/retail  process by an unknown 3rd party which we’re researching.  We’re still working with Xiaomi to gain clarification on some findings.” states the update provided in the report.

When the security firms received the researchers first received the Xiaomi mobile device they doubted that is was a legitimate phone from the company, to verify its authenticity they used Xiaomi’s “Mi Identification” app.

Upon further analysis, the experts discovered many other malicious applications preloaded onto the Xiaomi smartphone, including a trojan that allow an attacker to gain complete control of the device, an adware that disguises itself as a verified Google application and many other malicious applications.

“One particularly nefarious app was Yt Service. Yt Service embeds an adware service called DarthPusher that delivers ads to the device among other things.” reports the post. “Other risky apps of note included PhoneGuardService (com.egame.tonyCore.feicheng) classified as a Trojan, AppStats classified (org.zxl.appstats) as riskware and SMSreg classified as malware”

Furthermore, the experts discovered many other disconcerting issues, Xiaomi device resulted vulnerable to every vulnerability the experts scan for (except for Heartbleed), but it was also rooted and had USB debugging mode enabled.

“The USB debugging is especially troublesome because the device says it ships with Android 4.4.4, which should enforce the Android device to manually authorize an unknown connecting computer.” states the post.

“Additionally, we noticed that the device comes rooted. The “su” application does require a security provider to be used on the device (com.lbe.security.miui.su), so the usage of “su” is restricted in some sense, however it shouldn’t exist in a production released build of Android, as it’s a gateway for apps that can access it to do potentially bad things.”

Andrew Blaich from Bluebox explained that the version of Android OS running in the Xiaomi Mi 4 his team analyzed is a non-certified version of the popular Google OS, and it was affected by a number of flaws.

It was curious that that many security flaw the experts discovered were specific to old versions of Android, a circumstance that lead researchers to believe that the OS was resulting from a mix of the last KitKat 4.4.4. and older releases of Android.

By analysis of the signatures of the apps, the experts suspected that the device may have been tampered, because the signatures appear to differ from the manufacturer’s signing key.

On Friday, the experts at Bluebox finally obtained a response from Xiaomi, the company confirmed that it is investigating on the incident.

“We are certain the device that Bluebox tested is not using a standard MIUI ROM, as our factory ROM and OTA ROM builds are never rooted and we don’t pre-install services such as YT Service, PhoneGuardService, AppStats etc. Bluebox could have purchased a phone that has been tampered with, as they bought it via a physical retailer in China. Xiaomi does not sell phones via third-party retailers in China, only via our official online channels and selected carrier stores.” — Hugo Barra, VP International

Barra invites customers to purchase Xiaomi products only from Mi.com and verified stores.

Pierluigi Paganini

(Security Affairs –  Xiaomi, malware )

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

2 hours ago

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

8 hours ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

11 hours ago

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…

13 hours ago

Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025

Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…

1 day ago

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

1 day ago