{"id":32727,"date":"2020-01-09T21:51:07","date_gmt":"2020-01-09T21:51:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/"},"modified":"2020-01-09T21:51:07","modified_gmt":"2020-01-09T21:51:07","slug":"google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/","title":{"rendered":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/01\/09\/shutterstock_1424733560.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Updated<\/strong> On Wednesday, more than 50 advocacy groups accused Google of exploiting <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/politicsofpoverty.oxfamamerica.org\/2015\/01\/poor-versus-low-income-what-term-should-we-use\/\">poor people<\/a> by failing to police misbehaving Android apps on cheap phones.<\/p>\n<p>The advocacy groups, including the American Civil Liberties Union, Amnesty International, the Electronic Frontier Foundation, and Privacy International, to name a few, published an <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/privacyinternational.org\/advocacy\/3320\/open-letter-google\">open letter to Google<\/a> (and Alphabet) CEO Sundar Pichai asking him &#8220;to take action against exploitative pre-installed software on Android devices.&#8221;<\/p>\n<p>Their concern is that almost all (91 per cent) Android apps installed on devices by Google&#8217;s Android partners prior to sale do not face the same security scrutiny as Android apps distributed to device users through Google Play. These pre-installed apps cannot be deleted and may collect user user data without consent or perform other undesired functions. And they play by a different set of rules than Google Play apps.<\/p>\n<p>&#8220;These pre-installed apps can have privileged custom permissions that let them operate outside the Android security model,&#8221; the letter says. &#8220;This means permissions can be defined by the app \u2013 including access to the microphone, camera and location \u2013 without triggering the standard Android security prompts. Users are therefore completely in the dark about these serious intrusions.&#8221;<\/p>\n<p>The groups are particularly concerned about &#8220;the exploitative business practices of cheap smartphone manufacturers.&#8221; They argue that lack of income should not mean Android users lose their privacy rights.<\/p>\n<p>They want Google to provide a way to uninstall pre-installed apps and related background services permanently, to apply the same security review that Play-submitted apps receive, to support an update mechanism for these apps without a user account, and to actually refuse to certify partner devices if they contain exploitative software.<\/p>\n<h3 class=\"crosshead\"><span>Smoking gun<\/span><\/h3>\n<p>Underscoring these concerns, security vendor Malwarebytes said that Assurance Wireless by Virgin Mobile, supported by the US government&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.fcc.gov\/general\/lifeline-program-low-income-consumers\">Lifeline Assistance<\/a> program, distributes the $35 UMX U686CL phone with two pre-installed apps that appear to be malicious.<\/p>\n<p>The first is an updater named Wireless Update that shows up in Malwarebytes&#8217; threat database as as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.malwarebytes.com\/detections\/android-pup-riskware-autoins-fota\/\">Android\/PUP.Riskware.Autoins.Fota.fbcvd<\/a>. The app is &#8220;a variant of <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\">Adups<\/a>, a China-based company caught collecting user data, creating backdoors for mobile devices and, yes, developing auto-installers,&#8221; said senior malware intelligence analyst Nathan Collier in a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\">blog post<\/a>.<\/p>\n<p>The second is the phone&#8217;s Settings app, which incorporates obfuscated malware that the security biz identifies as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.malwarebytes.com\/detections\/android-trojan-dropper\/\">Android\/Trojan.Dropper.Agent.UMX<\/a>. The dubious code shares similarities with other known Trojan droppers; in this instance, according to Collier, it installs malware called Android\/Trojan.HiddenAds.<\/p>\n<p>Attempting to remove this software can pose problems. Without Wireless Update, the phone no longer gets updates automatically. Removing the Settings app, however, may cripple the device. Collier offers <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within\/\">remediation guidance<\/a>, but it involves command line fiddling that demands some technical sophistication and may not work.<\/p>\n<p>Collier reaches the same conclusion as the civic groups haranguing Google&#8217;s CEO: &#8220;Budget should not dictate whether a user can remain safe on his or her mobile device.&#8221;<\/p>\n<p>Virgin Mobile did not immediately respond to a request for comment and Assurance Wireless&#8217;s website returned an error at the time this story was filed, possibly due to the unexpected public attention following from the Malwarebytes report.<\/p>\n<p>Google also did not immediately respond to a request for comment.<\/p>\n<p>Incidentally, in March, the search biz will offer Android customers in the European Economic Area (which includes Britain) a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.android.com\/choicescreen\/\">limited menu of default search providers<\/a> on new devices as a result of European Commission antitrust action last year.<\/p>\n<p>The Chocolate Factory on Thursday published its <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.android.com\/choicescreen-winners\/\">list of rivals<\/a> \u2013 determined by periodic auctions, with proceeds paid to Google \u2013 that will be featured (through June) in the search choice menu presented in each EEA country. Android users, when setting up their devices, will be able to use the menu to select a default search engine other than Google, if they wish. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Updated to add<\/span><\/h3>\n<p>In a statement emailed after this story was filed, a Virgin Mobile representative disputed Malwarebytes\u2019 claim. \u201cWe are aware of this issue and are in touch with the device manufacturer Unimax to understand the root cause, however, after our initial testing we do not believe the applications described in the media are malware,\u201d the Virgin spokesperson said.<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/09\/google_poor_privacy_android\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To make matters worse, uninstalling it could cause even more pain Updated\u00a0 On Wednesday, more than 50 advocacy groups accused Google of exploiting poor people by failing to police misbehaving Android apps on cheap phones.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-09T21:51:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans\",\"datePublished\":\"2020-01-09T21:51:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/\"},\"wordCount\":728,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/\",\"name\":\"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg\",\"datePublished\":\"2020-01-09T21:51:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg\",\"width\":648,\"height\":448},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/","og_locale":"en_US","og_type":"article","og_title":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-09T21:51:07+00:00","og_image":[{"width":648,"height":448,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans","datePublished":"2020-01-09T21:51:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/"},"wordCount":728,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/","url":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/","name":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg","datePublished":"2020-01-09T21:51:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans.jpg","width":648,"height":448},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-scolded-for-depriving-the-poor-of-privacy-as-chinese-malware-bundled-on-phones-for-hard-up-americans\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google scolded for depriving the poor of privacy as Chinese malware bundled on phones for hard-up Americans"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32727"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32728"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}