Sample Header Ad - 728x90

What are the chances of a malware being persistent if I dd to write system.img and userdata.img from twrp

1 vote
0 answers
70 views
If I had a malware on my phone, say malware like xhelper, or strandhogg or something even critical than that, what are the chances of it being persistent even after using dd to write the **system.img** and **userdata.img** to the phone for eg dd if=system.img of=/dev/block/platform/mtk-msdc.0/by-name/system to write system as brand new. Is it possible that the malware could snoop into /cache or /nvdata to attain persistence. Is it feasible to use dd to flash those partitions as well? Which places would a malware use to hide itself to maintain persistence even after stock image flashing?
Asked by silly goose (31 rep)
Sep 21, 2020, 08:18 PM