SAMSUNG SPYWARE - Android Q&A, Help & Troubleshooting

I know that this forum was specific about no noobs, but I do not think a noob could answer my questions. I am new on here so please be patient if I have the wrong forum-y thing.
I bought two samsung galaxy from tmobile at the beginnning of 2021 for my wife and I.
Besides my name being nowhere on the bill or even attached to my number, everything I do "emulates" on her phone. Not only that, we cannot "hard reset" her phone to enter safe mode/recovery mode etc.
We have experienced having our calls FWD to other people and have traced 20 devices that were attaching to her phone.
There are so many apps that are system apps, which I cannot remove and some disallow disabling them.
I have found notorious spyware apps in the phone like limelight/stagefright/voicebarage and it appears the ROM is from 2008. Has an OLD dalvik version that was removed from android because of security issues.
Since these phones, I have not been able to have devices without the exact same BS being loaded on them. Which means I cannot use a computer, not to tmention I cannot afford one currently.
WHAT DO WE DO?
HEEELLP

Are they stock?
I have stock 2 N10+'s, on running on Pie and Q with no malware issues. Two malware incidents were due to downloads, one unauthorized through the Samsung browser but both were resolved in under an hour with no or minimal damage.
Almost always infections are either downloaded or installed by the user...

Related

[Q] How Do I Root A Samsung Galaxy Prevail 1 sph-m820-bst

I have, over many months, including most of today, read a lot about how to root the Boost Mobile Samsung Galaxy Prevail android smartphone.
It seems, based on various forum posts I have read, like a significant percentage of Prevail owners, ultimately, end up encountering some kind of problem(s), sometimes major and sometimes minor, after rooting.
The Samsung Galaxy Prevail is, I guess, a really old smartphone. Consequently, many of the links, especially links to files necessary for rooting, are now broken.
Can anyone tell me if it is really possible to root my Samsung Galaxy Prevail 1 without, after rooting, encountering problems that I did not have before rooting? And, if it is, from where can I download the files and read a "how to", for doing so? Judging from forum posts, it seems as if a high percentage of "rooters" end up with problem(s), after rooting.
I have read of people who have rooted their Prevail and ended up with problems such as:
gps issues
erratic phone behaviour(freezing, crashing, etc.)
camera no longer works
cant receive or send text messages
and on and on.
What I would like to do is root my Prevail(SPH-M820-BST), but, then, leave it, essentially, stock(rom, kernel, etc.). I don't want to partition my class 4, 8 GB, sd card, extend my phone's internal memory onto the sd card, or anything, for now. I don't want to install a custom rom or kernel, for now. I just want to root the phone without encountering problem(s), as a result of rooting, that reduce the phone's functionality compared to before rooting.
Again, it seems like most forum threads I have read on the subject have posts from quite a few people who have ended up with problems, after rooting.
I even happened to talk to a guy that said he would never, ever, root again, because the files he downloaded, from a forum, to do so ended up infecting his Windows XP computer so badly that he had to buy xp and reinstall. I certainly can not afford to replace a computer or my phone; after all, I was talking to this guy in the waiting room of a hospital, where I was getting treatment that I can't even afford to continue.
Currently, I rely, heavily, on Google Maps Navigation, GPS functionality, texting(mms and sms), bluetooth, usb, phone camera, and so on. I probably use the bulk of, if not all of, my Prevail's functionality on a regular basis.
Some of the reasons I would now root, if I could do so without encountering problems, include:
To use a data compression app
To Use a Firewall App
To, possibly, remove some pre-installed apps
Samsung Galaxy Prevail
Boost Mobile
model: SPH-M820-BST
android version: 2.3.6
baseband version: S:M820.07x.FA19
kernel version: 2.6.35.7
build number: Gingerbread.FA19
hardware version: M820.07
First, turn on Unknown Sources:Go to Settings > Security and scroll down select it, then download this app won't let me post link but contact me b or just Google root Samsung prevail 2 boost first one up android forums third link in it a paranoid android link Aug 15 th 2013 how to root samsung....blah blah
I've brick every phone I try to root including this one but adding replaced since I got from Wal-Mart and it was only 29 days old. Honestly it's idiot proof i couldn't believe it was so easy.
Framaroot-1.5.1.apk
Third, open the Framaroot app.Then, pick the 2nd root method (this worked for me)
I had the same issues and found this link. Works awesome just choose second option then download superuser. I can't find a recovery flash, thought i was home free oh well I can use some sweet root appsb till...
Holy sweet peaches the link above it is for a recovery mod lol. See you on the flip. I'd have never seen it if not for your post thanks bra...
Peace
Sent from my SPH-M840 using XDA Free mobile app
King root works

Need help "preserving" an SM-G900T in a few different ways

I feel super awkward and a bit embarrassed to ask this question, but I'm asking for help from this community (see last 2 or paragraphs for ask if you want to skip the boring details) and I think I need to explain briefly why to define my ultimate goal and why I even have to ask rather than sift through searches and assemble the steps/versions I need, etc.
My 22 year old daughter died recently (unexpectedly). I obviously want to preserve everything I can of hers, but I'm not firing on all cylinders mentally. I was able take her ThinkPad and virtualize it to my ESX system and also yank and clone the physical drive for safe keeping. But even doing that took me a while (which it shouldn't, that's kind of what I do for a living - I should be able to do that in my sleep, but it took 3 days and a lot of screaming). I was able to access her google accounts, facebook accounts, etc. and preserve a ton of stuff from there.
Ultimately while I would want to do with her phone the same thing I did to her notebook - preserve it virtually so I could examine it without fear of changing/modifying anything, but I don't think the product exists that allows me to virtualize an existing Android phone with apps and everything intact into a PC environment. I think I could install a whole new Android emulator in Windows, but that's not probably what I want.
I had just given her a Samsung S5 SM-G900T running on Ting for her birthday about 2 weeks before she died. It was unlocked but unrooted, it's rare that I would do nothing to the phone prior to giving it to her - but I pretty much just turned it on and handed it over with no custom ROM or anything - mostly because I was pressed for time the day of her party and it was shipped late.
When I got it back from the police a few say ago (they held it for 2 months) and charged it and turned it on 2 days ago, it upgraded from Lollipop to Marshmallow 6.0.1 (baseband is PE1), which was apparently pending. I don't know if that complicates things. It pissed me off, though. I have copied off local photos off and videos and already took control of her Google and Facebook accounts as I mentioned.
My slightly confused brain tells me normally I might install TWRP or CWM and make a NAND backup and copy it off someplace and at least have a restorable copy of her phone. I haven't done much of this sort of thing with phones for a year or two, I don't know what's changed in the latest OS versions and beides, plus I sort of "lose it" a bit, especially going through her personal things.
I'm not an idiot, I'm just not all here, yet. I'm asking if someone can please give me steps to safely preserve an image of her phone (IE, install TWRP or CWM using specific version xxx, etc., using Odin version xxx, etc.) - If I can virtualize it, too, I'd love to know what product does that, but again, I don't think I can.
I don't know why I feel the need to do these things, I just do.
Any help would be greatly appreciated.
Bump. Somebody please help this fellow. This is too important for me to try advising him, I don't know enough.
So even though half my brain is addled, I did some more research and found out a few interesting things, should anyone care to try this. I found there are a couple of open source tools built for android forensics:
Open Source Android Forensics Toolkit
https://sourceforge.net/projects/osaftoolkit/
Santoku
https://santoku-linux.com/about-santoku/
And there are commercial products, , like NowSecureForensics, some (if not most) built on the toolkits I just mentioned. Another is the painfully ironically named (for me, anyway) Autopsy.
This interesting website verified (to me anyway) that rooting the phone and changing access is still fundamentally sound forensically:
http://freeandroidforensics.blogspot.com
And it confirmed there is no way (yet) to truly "virtualize" the phone entirely (unless you are the manufacturer and you have some proprietary software).
For a "live" example virtually, the best you can do is install an Android emulator and restore an ADB backup of an app. This obviously may or may not work if the app is very hardware dependent. But for a simple program it might work fine.
So in addition to rooting my daughter's S5, installing TWRP, and backing it up, I also got my daughter's HTC One M7 to finally power up, and I rooted it and installed TWRP for backup purposes as well. Many of the forensic tools I mentioned will then report from the standard TWRP backups, with no risk to changing the phone. Some want to look at the phone themselves, even offering to root them, which I find more risky.
I haven't found any one tool to fully provide what I need, you need a Windows PC, a Linux PC (or VM), one or more toolsets (each comprised of other toolsets) and then a lot of time/will to really piece together things. I haven't completed the examinations - even typing is harder now for some reason, but should anyone else need this sort of thing (hopefully for different reasons than mine), the above info is a good start.

Scamware? Tablet locked - should I factory reset?

My wife bought an S7+ from Amazon and it's been fine for a couple of months. She had a popup today which warned that the device would be locked because it was part of a trade in scheme and there was some sort of problem. I assumed some sort of malware but I was working so I didn't do much with it but now the device appears to have locked into a sort of "kiosk mode" where we just get 2 screens:
https://imgur.com/a/Z4N9TLy
All the blurb is plastered with "Samsung Electronics UK" but the domain the email is going to is "tradeinresponse.co.uk" which after some Googling seems to have been linked with some scam stuff in the past.
I've tried safe mode with the same locked screen, plugging the tablet into a PC results in it locking to the first screen.
I can get into recovery and I wanted to try a wipe, but the wife has some drawings on there she's done in Sketchbook that she would like to keep.
I'm a software developer by profession but I work with Windows/.NET and SaaS stuff so I've not got much experience with droid devices (a bit of java here and there in the past, but not so much XP with the OS itself)
So my questions are:
Does anyone know if this is any sort of official thing or is this malware/scam stuff as I suspect?
Is a factory reset likely to resolve the issue?
If I want to factory reset, can I pull files off the devices internal SD via ADB or some other tool before I do it?
Do I have any other options?
Kind of a wind up - I'd just have factory reset it by now to find out but like I said, I don't want to lose any of the wife's data if possible. If she gets anything back I'm going to make sure she sticks it in the cloud.
Any help would be appreciated and thanks in advance!
Always backup critical data redundantly to at least 2 hdds that are physically and electronically isolated from each other and the PC.
Or you will lose data eventually.
Factory reset but you will lose all data. If the drive is encrypted, you likely already have.
Sounds like ransomware. Contact Samsung and do some Google searches. See what you got and if there are any work arounds.
You may need to reload the OS completely if it's a rootkit and running on Android 8 or below.
This could be a nasty little bugger...
If it wasn't present on the device when purchased, your wife either downloaded or installed it. She needs to be more careful!!!
Maybe this will impress that onto her...
Thanks for the advice but I've already googled as much as I can. The domain doesn't go anywhere except a holding page though through reverse lookup it seems there are also other domains on the same host including some legitimate businesses that appear to do Samsung second life schemes for devices.
I've googled the actual lock message but no-one on the net seems to have seen it before.
The wife hasn't installed anything, she got the device a few weeks ago (from Amazon, supposedly new) and did a transfer from her old s6 (that has gone to my daughter) to the s7 using Smart Switch. Since then she's not installed any other applications.
It's not "critical data", per se, it's just drawings she'd like to keep, plus copying stuff onto physically disparate hard drives seems a bit overkill given she can just drop the files into a cloud storage account and have way more redundancy than you/I could ever reproduce by doing manual backups.
I'm posting in an s7 forum about an s7 so it's going to be running Android 10 at the minimum (given that's what the device ships with). Not sure why the comments about Android 8.
Anything she could have installed would have been from the Play store (and I don't believe she installed anything other than what automatically installed from what was on her old s6), plus her apps are from a reputable vendors (Autodesk etc). My son has a tablet and he installs all sorts of crap and hasn't had this issue because the OS prevents stuff like this from happening unless you allow side loading.
Is it possible to install a rootkit from the play store? I didn't think so ..?
So, either it was on there when we got it, it's legit or it's a vulnerability that exists in the OS and we are some of the first people to see it...
You can do what you want but any backup database that requires a password can be lost.
I have close to a dozen backup hdds, there's no way to I can lose my entire database.
At least use 2 OTG flashsticks to completely backup the data but hdds are still preferable.
NEVER encrypt data drives... and verify the backups are complete and readable.
As to how it happened you're going to have to sort that out or suffer the same fate possibly again in the future.
A factory reset seems inevitable at this point.
Afterwards change all passwords.
Malware has always existed on Playstore albeit not much or for long. She may have imported from your daughter's phone.
You got some potentially gigantic problems now.
Personally I would have already gone full nuke by now. It's simply not worth the risks.
In the future hawk the download folder daily for files you didn't authorize. Delete any unknowns without opening. Scrutinize all downloads and installs carefully, always. Scan as needed with Malwarebytes. Online Virustotal can be used to scan smaller files and apks.
There are also maliciously scripted jpegs too that can cause damage to any files in the same folder when opened. Be aware of any changes or strange behavior in the download folder. Vet all downloads before moving into your database.
Use a good brower like Brave and be careful what links you click, in the browser, emails and texts.
I can't even begin to estimate how many websites I backed out of, closed that tab or wiped the browser data over in the last year alone. Better safe than sorry. Zero malware infections in over 1.5 years and that's running on outdated Pie.
Almost all malware, rootkits etc are loaded by the user. Some will self install if the device's security isn't configured correctly or if not spotted on a timely basis. Androids, even ones with out of date OSs are generally very secure unless the user does something stupid... learn or get burned.
blackhawk said:
You can do what you want but any backup database that requires a password can be lost.
I have close to a dozen backup hdds, there's no way to I can lose my entire database.
At least use 2 OTG flashsticks to completely backup the data but hdds are still preferable.
NEVER encrypt data drives... and verify the backups are complete and readable.
As to how it happened you're going to have to sort that out or suffer the same fate possibly again in the future.
A factory reset seems inevitable at this point.
Afterwards change all passwords.
Malware has always existed on Playstore albeit not much or for long. She may have imported from your daughter's phone.
You got some potentially gigantic problems now.
Personally I would have already gone full nuke by now. It's simply not worth the risks.
In the future hawk the download folder daily for files you didn't authorize. Delete any unknowns without opening. Scrutinize all downloads and installs carefully, always. Scan as needed with Malwarebytes. Online Virustotal can be used to scan smaller files and apks.
There are also maliciously scripted jpegs too that can cause damage to any files in the same folder when opened. Be aware of any changes or strange behavior in the download folder. Vet all downloads before moving into your database.
Use a good brower like Brave and be careful what links you click, in the browser, emails and texts.
I can't even begin to estimate how many websites I backed out of, closed that tab or wiped the browser data over in the last year alone. Better safe than sorry. Zero malware infections in over 1.5 years and that's running on outdated Pie.
Almost all malware, rootkits etc are loaded by the user. Some will self install if the device's security isn't configured correctly or if not spotted on a timely basis. Androids, even ones with out of date OSs are generally very secure unless the user does something stupid... learn or get burned.
Click to expand...
Click to collapse
With all due respect we aren't getting anywhere here, I don't want backup advice or malware advice, I want to know the answers to the few small questions I asked about whether this is legit and if I can access the device files or not.
You seem to be convinced it's malware, you also seem to be skim reading my posts which is fine - but I don't think your input is helping me.
I'm not going to use a different "paranoid" browser - chrome is fine, the tablet doesn't have a "security configuration" that is any different from the hundreds of thousands of other S7+ devices out there since it's a tablet and out the box it's ready to go. I'm not checking the downloads folder daily just in case some random malware has somehow "installed itself" onto my device, I'm also not keeping random flash sticks and hard drives lying about - I'll just use that geo redundant pretty solid cloud storage like most of the populace.
Yes you can put malicious content in a JPEG or a JPEG header, but it requires that there's an exploit in the OS or the app opening it (for example hiding a javascript eval in the file metadata); I don't think that's an attack vector on a tablet as far as I know given that she only browses, watches Netflix and draws using her S-pen on the device.
She's not imported "malware" from someone else's phone because if you read my post properly you'd understand that it was HER device that she transferred her data from - one that she's since given to the daughter (who has no issues). If you know how Smart Switch works you'd know that it's an unlikely vector (it just transfers data from application storage and then reinstalls the apps from the play store), plus the fact the original device doesn't have the issue...
Stop telling me to "learn or get burned". This is not a "misuse" problem. The wife is on Android 10, it's a relatively new and secure O/S and she didn't install anything she shouldn't have (she didn't actually install anything at all - it was the stock samsung application and the play store that installed the apps she ALREADY HAD on her previous device). It's not a "learn" scenario. Nothing she did should have caused this - if it is/was an OS exploit or some sort of security issue what could she have done to prevent it? Nothing.
What I have done is:
* Contacted the vendor of the device (we can still send it back if they've sent us a refurbed device instead of new as advertised)
* Sent an email to the address advertised to see what response I get (if they demand money then clearly a scam)
I've checked and the domain in the above shares a host with a company called MTR which happens to be a DCC Group company (one of the groups of companies I actually consult for) so worst case I'll speak to someone from DCC Group and see if they can shed any light.
Seems like it might be legit and quite possibly a mix up.
Do what you will... if you understand the origin of that phrase.
Anything that can't be IDed is considered malware until proven innocent
The fact that you're now completely locked out speaks volumes.
Good practices and backup are your only defenses. They apply to the future not the past... so much for flavors
Personally I think it's already too late for that device's OS load and data.
Of course I could be mistaken.
If you really want the data, take it to a data recovery specialist. They may be able to recover it.
When your at the beginning you can determine how potential data lose will end. When at the end, the outcome has already been predetermined by your actions or lack of.
You are now at the end... likely a dead end.
Been there, done that... actions have consequences.
@Charleh: if I were you, I would back up all important data and do a clean firmware flash with Odin. And a factory reset on top of that, just to be sure. Definitely sounds like you got hit by a scammer.
AnonVendetta said:
@Charleh: if I were you, I would back up all important data and do a clean firmware flash with Odin. And a factory reset on top of that, just to be sure. Definitely sounds like you got hit by a scammer.
Click to expand...
Click to collapse
Like I said there's not really any important data on there, just some drawings the wife would like to keep. Also, I can't backup anything since I can't access the device.
I'll probably just speak to DCC group and see if this company is one of theirs.
If the data is lost we are just talking some drawings the wife has done, there's nothing important on there, she just loses the layers (they are stored as multi page tiffs and sketchbook uses those as layers). She has all the images as flat renders on her cloud storage drive and on Instagram.
Think we just need to invest in some extra cloud storage as the free 15gb that Google give you isn't enough to store what she wants at the moment as the images are tens of megabytes each.
Worst case scenario I factory reset and flash it, best case I get someone at DCC telling me what's what.
The bit that gets me is that there are no ransom demands at this point so I can't be sure what's what. Usually by now with crypto ransom malware you are already being given demands...
We will see.
blackhawk said:
Do what you will... if you understand the origin of that phrase.
Anything that can't be IDed is considered malware until proven innocent
The fact that you're now completely locked out speaks volumes.
Good practices and backup are your only defenses. They apply to the future not the past... so much for flavors
Personally I think it's already too late for that device's OS load and data.
Of course I could be mistaken.
If you really want the data, take it to a data recovery specialist. They may be able to recover it.
When your at the beginning you can determine how potential data lose will end. When at the end, the outcome has already been predetermined by your actions or lack of.
You are now at the end... likely a dead end.
Been there, done that... actions have consequences.
Click to expand...
Click to collapse
It's not a big deal mate.
Stop flogging a dead horse, the most annoying thing is just that the device is unusable, regardless of me making backups or signing a pact with the devil or putting candlewax on my nips, it wouldn't have prevented this from happening..
The only reason I haven't tried a factory reset up to now is because if there's a chance I can get the drawings off the device I'd like to try it first before I nuke it.
Stop talking about my lack of actions, it's getting really boring. There's nothing I could do to forsee this happening and not my fault the wife didn't put the drawings on her cloud storage.
Go bother someone else with your multiple flash disk tinfoil hat backup routines (I bet you've got a tape drive in that routine somewhere too), stop trying to be helpful by saying "told you so" after the fact, instead try answering the questions I asked.
@Charleh: The way I see it is this:
The device's data partition/internal storage (where the drawings are stored) are encrypted by default, by Samsung. So, unless you can manage to use a MTP USB connection or ADB to make copies of them, then you're locked out and there's nothing you can do to recover them. Since they're located in an encrypted area, I highly doubt that even a professional data recovery business would be able to get them back. There are certain encryptions out there that even the US govt (NSA/CIA/FBI) can't break.
I'm assuming that you're not a l33t hax0r with uber skills, so unless you can successfully boot into Android again, your recovery chances are almost zero.
Or, maybe this company can help you out. It's worth a shot. But if I were a gambling man, I'd wager a lot of money that you will end up having to clean flash/reset, without being able to recover anything.
In the future, think about making copies of this stuff before bad things occur. As the saying goes, anything that can go wrong, will go wrong, sooner or later. I rarely lose access to my data because I'm frequently backing it up.
Good luck!
AnonVendetta said:
@Charleh: The way I see it is this:
The device's data partition/internal storage (where the drawings are stored) are encrypted by default, by Samsung. So, unless you can manage to use a MTP USB connection or ADB to make copies of them, then you're locked out and there's nothing you can do to recover them. Since they're located in an encrypted area, I highly doubt that even a professional data recovery business would be able to get them back. There are certain encryptions out there that even the US govt (NSA/CIA/FBI) can't break.
I'm assuming that you're not a l33t hax0r with uber skills, so unless you can successfully boot into Android again, your recovery chances are almost zero.
Or, maybe this company can help you out. It's worth a shot. But if I were a gambling man, I'd wager a lot of money that you will end up having to clean flash/reset, without being able to recover anything.
In the future, think about making copies of this stuff before bad things occur. As the saying goes, anything that can go wrong, will go wrong, sooner or later. I rarely lose access to my data because I'm frequently backing it up.
Good luck!
Click to expand...
Click to collapse
Thanks - that was a helpful answer. I suspected that droid encrypted the data - I was looking at making an ADB connection using Android tools. Might as well give it a try before I nuke.
I can't use MTP as the device auto locks when I plug in a USB cable.
Like I've said a few times it's not a massive issue if I lose the data - I work in IT, I know the importance of backing up important data. I've seen a client lose months worth of data to crypto-ransomware (they cancelled their backup solution a few months before saying they were moving to Azure soon so they didn't need it).
I've explained though, it's not my device and it's up to the wife to put her stuff on her cloud storage if she wants to keep it. She uses Google Drive for her docs etc.
Worst case scenario I complain to Amazon, wife is saying she doesn't remember the screen having a protector/film on it when she opened it and we still have time to return/exchange it since I have a Prime account.
@Charleh: AFAIK, Amazon has a 30 day no questions asked return policy for almost everything. If you're still within that return window, then I guess you just have to decide whether the loss of drawings is worth returning it, assuming all recovery efforts fail. I bought my Tab S7+ new direct from Samsung, I haven't encountered like what you describe. And your edge case is the first one I've seen.
I think it's possible that you bought a refurbished device that was preowned but sold as new. The original buyer didn't finish paying it off, returned it, it's sold to you, you get this message. It's either legitimately locked, or someone has remotely locked it and intends to scam you. Contact that company ASAP.
Another option is to find a local techie/shop that can remove this lock for a fee, preferably without data loss. They make want to see proof of purchase, if they're legit. This would at least give you the ability to use the device again. People used to bring me locked phones/tabs all the time, this is pretty much what I did for side cash. As long as they didn't outright admit they were stolen, I didn't care.
Ok speaking to Samsung support and it's legit - what's happened is that someone's returned the device to the supplier after doing a trade in with it and receiving a new device from Samsung Trade In.
Supplier has refunded us and told us to keep the device until the issue is resolved with Samsung.
Now fighting with Samsung themselves about it. Absolute pisstake.
Basically I have a brick and although Samsung have the capability to unlock the device through Knox they won't do it until a resolution is found with the supplier.
Fun-times. Sent a complaint email to Samsung as they are essentially holding the wife's artwork to ransom because of an issue they have created with the rules of their trade-in program.
I've already received the refund too - sounds like the Amazon reseller is trying to wash their hands of it.
@Charleh: So, they refunded you AND they're going to let you keep the tablet? I'd be quite happy with that.
AnonVendetta said:
@Charleh: So, they refunded you AND they're going to let you keep the tablet? I'd be quite happy with that.
Click to expand...
Click to collapse
Depends if the tablet is ever going to be functional again...
Fingers crossed!
Time to reflash, ODIN or do whatever and see if you can and up with his + hers new(sort of) tablets.
Hello, some solution?
Charleh said:
Depends if the tablet is ever going to be functional again...
Fingers crossed!
Click to expand...
Click to collapse
How did this end?
corb06 said:
How did this end?
Click to expand...
Click to collapse
still ongoing - Amazon is trying to get hold of the original supplier but they've gone dark; I complained to Samsung and they are looking into it, just waiting for a reply.
They took almost a month to get back to me - only did so when I started complaining publicly on all social media platforms (Twitter, Instagram etc) - they don't like it when you do that.
Will update when I know more.
Charleh said:
still ongoing - Amazon is trying to get hold of the original supplier but they've gone dark; I complained to Samsung and they are looking into it, just waiting for a reply.
They took almost a month to get back to me - only did so when I started complaining publicly on all social media platforms (Twitter, Instagram etc) - they don't like it when you do that.
Will update when I know more.
Click to expand...
Click to collapse
Sorry to hear it's taking so long. I'd be super pissed. Next time, buy direct from Samsung, you wouldnt have to deal with this ****. Because they wouldnt sell you a used/refurbished device unless it's clearly marked as such, and i'm pretty sure they only sell new devices anyway.
Can you post a link to the seller's Amazon page? They could be a fly-by-night op.
If you cant get your money back or an exchange, just contact your bank/card issuer and do a chargeback. This is a last resort ootion, if nothing else works. Explain the whole situation to them. Chances are, they would force the seller or someone else responsible, to give your money back. The only caveat is that if you wait too long, it might not work. i've inititated chargebacks against sellers who dont respond to support requests, it usually worked in my favor.
Edit: If you go the chargeback route and Amazon is forced to refund your money, they may retaliate by banning your account. it recently happened to a friend. Just so you know.....

Is it possible to root and install custom ROM on ATT SM-G965U

Hi Friends,
I have a carrier SIM unlocked ATT Samsung S9+ (SM-G965U). I have switched to a different carrier and new SIM works just fine.
My phone currently runs Android 10; OneUI 2.5; SPL Aug 1, 2021.
I want to root my device and install custom ROM. Is it possible with my US AT&T phone?
Found this article, is it worth pursuing?
List of Custom ROMs for Samsung Galaxy S9+ SM-G965U star2qltesq - Download & Install Guide - TweakDroid
Here is the available Custom ROMs list for your Samsung Galaxy S9+ SM-G965U star2qltesq & Custom ROM Installation Guide for Samsung Galaxy S9+ SM-G965U star2qltesq.
tweakdroid.com
Thank you.
Hello, and yes, it is possible to root your device and install custom firmware. I'm getting ready to do the same thing, and I have the exact same model and model number as you; Galaxy S9+, SM-G956U (T-Mobile, though)
I unfortunately don't have any links to reputable custom firmware on XDA Developers or other known websites, as I am on a mission to install stock firmware (I have a malware I need to get rid of on my device), but it looks like you've got the sourcing part figured out already.
You're welcome, and I hope I helped.
Rotting Brain said:
Hello, and yes, it is possible to root your device and install custom firmware. I'm getting ready to do the same thing, and I have the exact same model and model number as you; Galaxy S9+, SM-G956U (T-Mobile, though)
I unfortunately don't have any links to reputable custom firmware on XDA Developers or other known websites, as I am on a mission to install stock firmware (I have a malware I need to get rid of on my device), but it looks like you've got the sourcing part figured out already.
You're welcome, and I hope I helped.
Click to expand...
Click to collapse
What OS version are you running?
blackhawk said:
What OS version are you running?
Click to expand...
Click to collapse
The OS I'm running is Android 10.
Rotting Brain said:
The OS I'm running is Android 10.
Click to expand...
Click to collapse
Simply do a factory reset to purge any malware if you're unable to otherwise. There aren't any known trojans that can worm into other partitions from the user partition. Pre Pie versions are vulnerable to worms like X-helper though. Any OS version from Pie up are pretty secure.
Just be careful what you install and download, don't reinfect it!
blackhawk said:
Simply do a factory reset to purge any malware if you're unable to otherwise. There aren't any known trojans that can worm into other partitions from the user partition. Pre Pie versions are vulnerable to worms like X-helper though. Any OS version from Pie up are pretty secure.
Just be careful what you install and download, don't reinfect it!
Click to expand...
Click to collapse
That's what I've read; that anything above Android 8 can just be factory reset to kill malware and viruses, but it didn't work for me. It's been ingrained into the system of my devices and first appears on the initial set up after a factory reset has been done. They're system applications now (disguised as a legitimate System Update), and infect my other applications by updates through the Galaxy Store. At least, that's what I've noticed...
Rotting Brain said:
That's what I've read; that anything above Android 8 can just be factory reset to kill malware and viruses, but it didn't work for me. It's been ingrained into the system of my devices and first appears on the initial set up after a factory reset has been done. They're system applications now (disguised as a legitimate System Update), and infect my other applications by updates through the Galaxy Store. At least, that's what I've noticed...
Click to expand...
Click to collapse
Verify by scanning suspect apps with online Virustotal. See what you got. Unless someone had physical access to the device or the flashed rom was dirty that should be impossible.
The /system partition is isolated from the /data partition in normal operation. It should be untouchable.
Untouchable but not incorruptible; a single event upset could corrupt one critical bit of data by flipping its value. This is a rare occurrence and unlikely to do what you're describing.
A hardware failure could also cause corruption; flash memory is generally long lived but it eventually wears out or could fail prematurely. I have dozens of flash drives some almost 2 decades old. Only one has failed and it was buggy at the get go. A more likely scenario is damage by impact either direct contact, pcb flexing or excessive G loading ie dropping the phone especially with no case.
blackhawk said:
Verify by scanning suspect apps with online Virustotal. See what you got. Unless someone had physical access to the device or the flashed rom was dirty that should be impossible.
The /system partition is isolated from the /data partition in normal operation. It should be untouchable.
Untouchable but not incorruptible; a single event upset could corrupt one critical bit of data by flipping its value. This is a rare occurrence and unlikely to do what you're describing.
A hardware failure could also cause corruption; flash memory is generally long lived but it eventually wears out or could fail prematurely. I have dozens of flash drives some almost 2 decades old. Only one has failed and it was buggy at the get go. A more likely scenario is damage by impact either direct contact, pcb flexing or excessive G loading ie dropping the phone especially with no case.
Click to expand...
Click to collapse
Thank you again for your help, I tried both the VirusTotal website and the VirusTotal Mobile application on the Play Store. I'm not sure why, but after scanning an application, it states that its scan date was a different date. I'll attach a screenshot of an app scanned today and one scanned in May down below.
I have never altered my firmware (besides the standard ways), and it's possible that someone else had physical access to my phone, but I don't know for sure. I just remember that my WiFi usage and more applications started running in the background around the same time I had stayed and partied with a friend for 2 weeks. Impaired inhibitions and focusing on other tasks, like partying, surely made me lose track of how long my phone was misplaced or away from me. But it could be anything else.
I may not need to flash stock ROM this device (Samsung Galaxy S9+, SM-G956U), because all signs are pointing to "the malware is gone, and you're just paranoid," but I likely have to flash my 2 other phones, depending on what their OS version are.
Uninstall Brave, and install a known good version. Package disable Briefing, bloatware.
Samsung are notorious for sucking up bandwidth and battery if not optimized. That's just the way they roll. Once optimized they run well. Probably about 80 apks that you should package disable either with Package Disabler or by adb edits.
Unless you install or inadvertently download it, it's pretty hard to get malware on a Android running on Pie or higher. However never leave the phone out of your sight unless secured; physical possession is the only real security.
Thank you, I'll look into disabling those applications.
Here an example. This is what I have disabled in addition to settings changes I also modified.
Global power management is never used... it will cause erratic behavior and may increase battery consumption.
I don't use wifi so it is disabled.
My list is customized to my preferences, as should yours. It takes a while. Blindly disabling apks will have unpredictable results. Dependencies; disabling some apps will screw up others.
<string>com.samsung.attvvm</string>
<string>com.matchboxmobile.wisp</string>
<string>com.microsoft.appmanager</string>
<string>com.sec.android.app.ve.vebgm</string>
<string>com.drivemode</string>
<string>com.asurion.android.protech.att</string>
<string>com.samsung.android.app.social</string>
<string>com.sec.android.desktopcommunity</string>
<string>com.sec.android.app.safetyassurance</string>
<string>com.samsung.android.kidsinstaller</string>
<string>com.wsomacp</string>
<string>com.samsung.android.app.edgetouch</string>
<string>com.wb.goog.got.conquest</string>
<string>com.samsung.android.app.settings.bixby</string>
<string>com.sec.android.app.desktoplauncher</string>
<string>com.sec.android.daemonapp</string>
<string>com.android.vending</string>
<string>com.dti.att</string>
<string>com.samsung.systemui.bixby2</string>
<string>com.microsoft.skydrive</string>
<string>net.aetherpal.device</string>
<string>com.att.mobilesecurity</string>
<string>com.samsung.android.bixby.service</string>
<string>com.samsung.android.app.tips</string>
<string>com.samsung.android.bixby.agent</string>
<string>com.att.thanks</string>
<string>com.att.callprotect</string>
<string>com.att.myWireless</string>
<string>com.samsung.android.game.gametools</string>
<string>com.samsung.desktopsystemui</string>
<string>com.samsung.android.da.daagent</string>
<string>com.sec.android.desktopmode.uiservice</string>
<string>com.amazon.appmanager</string>
<string>com.samsung.android.app.routines</string>
<string>com.sec.android.app.dexonpc</string>
<string>com.sec.android.app.cmas</string>
<string>flipboard.boxer.app</string>
<string>com.samsung.android.wellbeing</string>
<string>com.att.iqi</string>
<string>com.samsung.android.bixbyvision.framework</string>
<string>com.sec.android.service.health</string>
<string>com.samsung.safetyinformation</string>
<string>com.att.dh</string>
<string>com.att.tv</string>
<string>com.facebook.katana</string>
<string>com.samsung.android.game.gos</string>
<string>com.att.android.attsmartwifi</string>
<string>com.samsung.android.app.camera.sticker.facearavatar.preload</string>
<string>com.facebook.system</string>
<string>com.ws.dm</string>
<string>com.samsung.android.bixby.wakeup</string>
<string>eu.thedarken.sdm</string>
<string>com.samsung.android.lool</string>
<string>com.samsung.android.app.spage</string>
<string>com.samsung.android.mateagent</string>
<string>com.enhance.gameservice</string>
<string>com.android.emergency</string>
<string>com.att.dtv.shaderemote</string>
<string>com.att.csoiam.mobilekey</string>
<string>com.att.personalcloud</string>
<string>com.facebook.appmanager</string>
<string>com.samsung.android.bixby.agent.dummy</string>
God, I hate Bixby too! Thank you for sharing this!
Anyone did it?
StealthyNeo said:
Anyone did it?
Click to expand...
Click to collapse
I ended up not needing to start the process out, but I did use Disabler Package Pro to disable some system apps. Did you try it out yet?

Question Help me reverse engineer this mod? How do i get my phone back to stock rom, and regain full control over it? Unroot?

I have a A52 5g and a tab S7+ wifi, that are both remotely controled and monitored, and serve as gateway to my home network and basicaly every device connected to it. I noticed it at first and mew NOTHING related to this, didnt even know what open source was. Since then i have come to understand that, somehow, my phone seems to run a custom version of android, my guess is, built from AOSP and designed to disguise itself as oem samsung ui, but in background enables remote access and total takeover of every function. I have discovered, using total commander, that storage has been partitioned in 2 separate locations, and that one folder in there is called root system file, and filled with data/apk/installkits/etc.. this has me asking for help in 2 specific questions:
Am i holding a rooted device or is there another possibility that creates this situation? I was convinced its rooted untill i read here that root prevents from using samsung pass, secure folder etc.. and those seem to work on mine(or is it a version of those apps?) If its indeed rooted, will it wype everything if i flash it with the stock rom? And should i trust a small cell repair store to do that or learn how to do it myself?
2: i have bought 3 brand new phones since august, and made sure not to use my usual accounts, no use backups, not even set it up near my home wifi, and it almost instantly started self installing harmful software in background. I see no other way for it to link itself to be owned by me at initial setup, but for the sim card, new of course, but with my usual phone number and service transfered to it. Is that enough to make a breach and compromise a new device? If so, what would be different after fpashing the stock rom, if everything reinstalls itself? Do i need to change my number? Change cellular service provider even? I know its an unusual request but im a fast learner, i have compiled lots of technical info on specific apps, ip's, servers, build id numbers etc.. that i know would make more sense to anyone more qualified than me, and i am about ready to try and wype/flash the thing myself, i just would feel better with a little help since i have gone this far pretty much alone, since no service provider or manifacturer actualy feels like this is their problem to solve....
Here you can download firmware for your phone and flash with Odin, which you can also download at the bottom of the page, there are instructions on how to do it also.
Make sure to download correct firmware for exact device you have. There are few different A52 5G models.. SM-A526B, SM-A526U, SM-A5260, SM-A526U1, SM-A526W.
You will lose all data after flashing new firmware. After this your phone will be like brand new from Samsung..
If your device is rooted then that means your warranty is void and manufacturers and carriers are under no obligation to help you.
I'm trying to understand your situation but its so conflicting I don't know where to begin.
For example, you say your device runs a custom AOSP with a Samsung UI. Thats exactly how it actually works. Samsung take the AOSP, customise it with their own functionality, then overlay their own skin as the UI. Theres absolutely nothing unusual about that.
I'm conflicted as to whether your rooted or not. If the manufacturer or carrier has physically seen the device and won't repair it then that would suggest your definitely rooted. If you spoke to them virtually and told them your rooted then they will use it as an excuse whether you're truly rooted or not. The partitions you mention could be the internal storage and an sd card which can be seen non-rooted. I dont know what you mean when you mention a "root system file". Is it an actual folder called "root" or is the app you're using just telling you that you've reached the "root" of the filesystem? I can't quite work out what you mean. You also say Knox-powered apps still work which just adds to the confusion.
You stated you have had 3 new devices and they all self-installed harmful software. To get one device compromised is possible. To get three compromised means your either a high profile government target (which I doubt because they wouldn't be so sloppy as this) or your doing something to compromise your own devices such as continuously visiting dodgy websites.
Flashing will fix things but so would having a new device. The only common denominator is you so either you're doing something wrong or you truly are a government target in which case I wish you good luck!
First let me appologise for the long silence, i cut off most online activity for a while and just read your answers. To clarify, i have not solved my prolem yet. But ill try to explain better what you ask about my situation:
About de os version arobase40 got it right. I Asked google play help reps. And a stock samsung version of android would not trigger googles warning about running a custom version of android. So that point to a modified after-the-fact more than to the fact samsung has their propierary version installed.
About beeing rooted or not, ylwhat you are asking is what im not totaly certajn of, also. I know partition can happen without rooting, its seems to have created a "virtual sd card" since its named as such when sd card slot is actualy empty. About the root files folder, i cant say for sure, all i can say is that its holding a large amount of Gigs that dont get taken into account when looking at storage capacity and usage, and accessing that folder gives me a message that root files cant be access from this device. Does it mean my device had root acess privileges revoked to prevent viewing files that hide what is given control of the software remotely, so i dont find out or have the capacity to remove or alter those files?
What is absolutely sure is that if it is rooted, it wasnt done by me. As for the chance the devices were not factory brand new, 1 of them was not, got it opend box from amazon, a saudi arabia version, but my prkblems had started months before getting it, did not keep it more than 2 months, and all others before and since are 100% pure factory new, some directly from my cellular service provider, as financed device came with 2 year agreement of service,(actualy 2 of them i got this way) and the last one is my tab s7+ i got online directly from samsung canada website, on preorder, delivered on release day.
And lastly the fact i cant seem to shake those persistent leeches, is not from having reckless habbits online, but from having careless and uneducated habbits before that all started, usual older lazy dude stuff, like not changing my wifi password after a ruff breakup with bipolar psycho ex gf, or having only a few passwords reused on most my accounts. I have stopped doing those things long ago now that i know better, but i suspect that i could have been unaware something gettnng installed and staying dormant for a while, maybe? The ex had way more opportunities than needed to do something like this and is more than psycho enough to realy do it also. For having the skills to do it, lets say she has "assets" that can easily get her guys willing to help about that. It may also be coming from somwhere else, but as you say im not a super spy or a high ranking gov. Official. Im not even that interesting, and have absolutely no usable id for fraud or anything, my credit history would raise more red flags then there is in all china. So after so long struggling with this still very active, i cant even think of a rational reason to do so much effort into this, theres nothing to gain, i only can imagine that maybe a twisted mind seeking revege, or with a sick way of amusing themselves could see the point to all that, but i dont realy care. I only want to get rid of it.
As for the way it manages to be so much persistent, i can only see one option left i didnt remove from the process, and its through my phone number/account on the sim card, even a new sim on a new phone, still is linked to my cell service. I did initial setup with only that new sim card, accounts freshely created during setup, with no info or anythink linkable to my previous accounts, and even did it sitting outside, far from any building that could get me in range of a wifi network. And it still was no more effective at staying secure.
Thats why i did not yet try to flash a stock rom myself on my device, because it would, at best, become exactly like it was when brand new, and i know that this is not enough to keep it secure, and that means theres still something im missing in the whole picture.

Categories

Resources