Mobile Device Security Company Adds Detector for ADUPS Chinese Espionage Threat

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
If you've been following our news feed, then you already know about the data theft issue that a security contractor found earlier this month on more than 120.000 BLU Products smartphones.

The backdoor that allowed these devices to send private data to Chinese servers has been patched by the US-based company, but we don't have any idea of how many other smartphones could be affected by the issue.

Bu fret not, as security company Trustlook has just released an ADUPS, the name given to the backdoor, vulnerability detector for Android devices. The new mobile security application is supposed to identify possible Chinese government espionage on your phone.

If you already have Trustlook Mobile Security app installed on your phone, the new feature will be available after the latest update, so you will be able to identify the presence of rogue firmware from Shanghai ADUPS Technology Co.

For those unaware, this particular firmware comes pre-installed on some Android phones and can monitor text messages, phone call histories, and details of how the phone is being used without the user’s permission. All the information is then sent to Chinese servers without user's permission.

Since identifying this threat required quite a bit of knowledge about mobile security, Trustlook has decided to make it easier for Android users to make sure their smartphones aren't affected by the issue by adding a single-click ADUPS Vulnerability detector within the Trustlook Mobile Security app.

If we are to believe the Chinese company that created the firmware, the code runs on more than 700 million phones, cars and other smart devices, not just on those 120,000 BLU Products phones.

The Trustlook Mobile Security app is available to download for free from Google Play. According to developers, the application should be able to identify all known versions of the ADUPS system apps that conduct aggressive data collection, with more being added as they are discovered.

 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
That is good news, but this story of the backdoor should be pursued at criminal level because it is not only a technical/security problem!! :eek:
 

Entreri

Level 7
Verified
May 25, 2015
342
I wanted to buy my mother a Motorola phone, until I found out that it was bought by Lenovo recently...who installed spyware on their PC platform (Chinese company of course).

It is essentially down to Apple.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Backdoor something it cannot break easily ,cause even legitimate ones are engage in that matter to gather information whether deny or admit it.

The purpose of the tools nowadays is to lessen the threat but open for massive reproduction.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top