Supply-Chain Tampering and Persistent Malware Risks on Android and Smartphones
Reporting highlighted supply-chain malware pre-installed on Android devices during manufacturing/distribution, enabling low-level capabilities such as data exfiltration, command execution, and persistent unauthorized access before a user ever installs apps. The reporting emphasized that this type of embedded compromise can bypass typical app-based defenses and app-store controls, making mobile devices a durable foothold into personal and corporate environments; recommended mitigations included verifying device integrity, enforcing secure boot chains, and monitoring behavior across managed mobile fleets.
Separately, academic research described a remote “fingerprinting” method to detect whether a smartphone has been altered during manufacturing by comparing its cellular radio emissions against a library of trusted device/model fingerprints using standards-compliant base-station emulation and specialized SIMs. Another write-up focused on post-install Android malware persistence techniques (e.g., BOOT_COMPLETED autostart via BroadcastReceiver, abuse of overlays to block force-stop/uninstall, and self-restart behaviors), which is related to mobile malware resilience but is not specific to supply-chain preinstallation or the cited manufacturing-tamper investigations.
Timeline
Feb 24, 2026
Researchers describe RF fingerprinting method to detect phone tampering
University of Colorado Boulder and NIST researchers described a remote technique that fingerprints smartphones using over-the-air RF emissions to identify altered or compromised devices without physical inspection. They reported testing on multiple current-generation phones with over 95% accuracy and positioned the work as a basis for future device-integrity validation.
Feb 24, 2026
Researchers report pre-installed Android supply-chain malware
An investigation found sophisticated malware embedded in Android devices during manufacturing and distribution, compromising phones before first use. The malware was described as operating at a low system level, enabling persistence, data exfiltration, command execution, and unauthorized access while evading typical app-based defenses.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Organizations
Sources
Related Stories

Surge in Android Malware and Pre-Installed Threats Targeting Mobile Users
Multiple security researchers have reported a significant escalation in Android-targeted threats, including the discovery of new malware families, pre-installed trojans, and spyware on both counterfeit and budget smartphones. The Triada trojan continues to be found pre-installed on counterfeit Android devices, granting attackers full device control and enabling credential theft, botnet enrollment, and unauthorized access to sensitive apps. In parallel, certain budget Samsung phones have reportedly shipped with an unremovable system app, AppCloud, described as spyware that collects sensitive user data and cannot be removed without voiding the warranty. These findings highlight the persistent risks associated with purchasing devices from untrusted sources and the growing sophistication of supply chain threats. The overall threat landscape for Android users has intensified in 2025, with a marked increase in malware, adware, and potentially unwanted program (PUP) detections. Attackers are shifting from nuisance apps to more covert tools capable of harvesting data, intercepting messages, and facilitating account takeovers. The rise in SMS-based attacks and the integration of advanced capabilities, such as one-time passcode theft, underscore the need for heightened vigilance and robust mobile security practices. Security experts emphasize the importance of verifying device integrity, using only official firmware, and implementing strict security policies to mitigate these evolving threats.
1 months ago
Android Mobile Device Security Research on Payment App Abuse and Chip-Level Unlock Risks
Recent reporting highlights **two separate Android security research tracks**, not a single incident. One report details how attackers can abuse the **LSPosed** framework on already-compromised Android devices to hook `SmsManager` and `TelephonyManager`, intercept registration tokens, spoof phone numbers, exfiltrate 2FA data, and remotely inject fake SMS records into the device’s sent-message database. The technique targets **mobile payment ecosystems** that rely on SIM binding, allowing bank backends to be misled about physical SIM presence and enabling account takeover and fraud when victims have first been infected through trojanized APKs. Separate coverage describes a **MediaTek secure boot chain flaw** affecting up to **875 million Android phones**, where an attacker with physical possession of a device and USB access could extract encryption-related keys before Android fully loads, decrypt storage offline, and rapidly brute-force the PIN. That issue is distinct from unrelated reporting on **Intel UEFI vulnerabilities**, which concerns local privilege-escalation flaws in PC firmware rather than Android devices. The material is **not fluff** because it contains substantive vulnerability and threat research with concrete attack paths and mitigation guidance, including stronger device integrity enforcement and backend validation for payment workflows.
1 months ago
Android Mobile Malware Campaigns Targeting SMS/OTP and Identity Data
Multiple reports highlight evolving **Android** threats that abuse SMS/telephony access and advanced evasion to enable fraud, surveillance, and account takeover. CloudSEK described a shift from repackaged apps to **runtime manipulation** using the *LSPosed* framework, where a malicious module (e.g., **Digital Lutera**) hooks `SmsManager` and `TelephonyManager` to undermine India’s **UPI SIM-binding** controls. The technique can intercept registration tokens and 2FA, spoof device identity/phone number, and exfiltrate data to **Telegram**; it also uses **Socket.IO** for real-time C2 and can remotely inject fabricated SMS entries into the device’s “Sent” database to make bank backends believe a SIM is present on a different device, enabling scalable payment fraud and account takeover. Separately, Acronis TRU (reported by Hackread) identified a **fake Red Alert** rocket-warning app distributed via SMS lures impersonating Israel’s Home Front Command; the trojanized app displays legitimate alerts to reduce suspicion while requesting extensive permissions to steal **GPS location**, **SMS/OTP**, contacts, installed-app inventory, and on-device account details, then exfiltrates data to a remote server, including via **certificate spoofing** and UI tricks to appear Play Store-installed. Zimperium reported a new Android RAT, **SurxRAT**, that can download and run **LLM modules** from third-party repositories to automate phishing and social engineering and to interact with apps/UI for credential theft and data exfiltration, reinforcing the need for behavior-based mobile detection, tighter app controls, and stronger integrity enforcement (e.g., *Play Integrity API* with `MEETS_STRONG_INTEGRITY`) where applicable.
1 months ago