• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

Prepaid U.S. Carrier Android Phones Sold with Risky Bloatware

August 11, 2023 By Heinrich Long — 1 Comment
Prepaid US Carrier Phones Sold with Risky Bloatware

Many Android devices that U.S. carriers offer their subscribers contain dangerous bloatware that introduces severe risks to the privacy and security of the users.

Mobile security firm Quokka has conducted a study by examining 21 Android devices from Tracfone, AT&T, Verizon, T-Mobile, Boost Mobile, and Visible, and concluded that most of them can be traced, tracked, and remotely compromised, if a determined attacker exploits the vulnerabilities in the bloatware that comes pre-installed with the phones.

To make matters even worse, users cannot uninstall these apps nor turn off their background activity, so they constitute a permanent risk for as long as they keep using the devices.

The tested phones include popular models such as the Samsung Galaxy A13 5G and A03S, the Nokia C100 and C200, and the Motorola Moto G Pure and G Power. It is essential to clarify that these phones are perfectly safe to use in their factory state, as their manufacturers and also Google strive hard to offer secure, vetted software and firmware that incorporate multiple data-safety mechanisms that prevent easy abuse.

The problem is introduced on the carrier level when these companies decide to add their apps to the phones and also include tools from their vendors, marketing partners, hardware and software testing utilities for their service departments, etc.

These tools are often given the highest privileges on the device, exposing users to unauthorized personal data access without them even knowing about the risk. The reason for this ignorance is that the user knowingly grants risky permissions while installing a new app, but pre-installed apps have secured those permissions without involving the device owner.

“In other cases we observed, pre-loaded software obtains sensitive data and makes it accessible, using one mechanism or another, to co-located apps without performing the requisite access control checks. This creates a leakage of sensitive data where malicious apps can monitor and harvest this sensitive data if they are aware of where to obtain it.”

Quokka

Stealing data from pre-loaded apps

First, Quokka estimated the risk of the pre-loaded carrier apps it found on the examined devices and discovered that most of them are susceptible to persistent user and geolocational tracking. Other problems include arbitrary file access (data breach), forcing factory reset (data loss), command injection, and arbitrary command execution with high privileges. 

These vulnerabilities are present on the devices due to the improper implementation of Android’s “Intents,” an internal messaging system used between apps and Android system components to exchange data as needed. Vulnerabilities in the apps and the implementation of the intents component allow third-party apps to potentially intercept their communications with Android’s system and gain access to data that should otherwise be out of reach for them.

Such malicious apps could be anything, appearing totally legitimate, and not requiring to have secured risky or extensive permissions in order to snatch the sensitive data from the carrier apps, so the user would have no way to realize the interception that takes place in the background.

For example, in eighteen out of the twenty-one tested devices, the pre-installed software obtains a non-resettable device identifier that a malicious third-party app can grab without any permissions and then use it as a persistent tracking number.

More worryingly, in 17 of the examined devices, powered by a MediaTek chipset, a pre-installed binary opens a TCP port 7000 and transmits the GPS coordinates to any clients connected to the debug port. A malware app on the same device could easily take advantage of this to infer the device’s location every time the user enables the GPS module.

Protect from carrier bloatware

The general idea for users looking to protect their data while enjoying the advanced capabilities of smartphones would be to use as clean operating systems as possible that do not come pre-loaded with apps and tools, which, in most cases, cannot be deleted. The fewer intermediaries between the device manufacturer and the customer, the less bloatware there generally is on the device.

Mainstream examples include Google’s Pixel line and Apple’s iPhones, but there are also Android distributions that can be installed on any device which feature advanced privacy systems, like GrapheneOS.

Finally, consumers should consider the Murena Fairphone 4, that has recently entered the U.S. market, and which runs a de-Googled and privacy-enhanced Android OS named ‘/e/OS.’

Related articles:

  • Any of 1M Sites Could Have Exposed Cleartext User Passwords
  • SpyNote Android Malware Infections Are Spiking in Europe
  • Trojanized Psiphon App Infects Android Phones with Ransomware
  • VPNs for Android
  • Fairphone Review

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. UserPlus

    August 14, 2023

    Interestingly, Canada which has the highest cell phone plans in the western (developed world) got rid of carrier “locked” phones many years ago to make it in-line with world providers.

    Oddly, the US is the only country in the world that still has carrier locked phones. Carrier locked phones always had bloatware. Even OEM unlocked phones do, like from Samsung. Many of the apps can’t be uninstalled, only disabled. They still consumer resources and are waiting to be “woken” up.

    The latest iPhone iteration is the only phone in the world that is eSIM only with no physical SIM slot. Everywhere outside North American having two mobile numbers is common, whether it’s for voice only, voice/data, or another line for data only.

    It will be interesting to see given the limitations around QR codes (eSIM) et al. will play out in the next few years.

    But anyway, if the US didn’t have locked phones this bloatware would never be a problem.”

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP