Originally Posted by cirrob
This just happened to me, and it is driving me nuts. I think I tracked it down to a program called DTIgnite. Somehow, a sight I visited or a link I clicked installed this program which essentially gives the controller a backdoor to install anything they want. I dont recall it being in the file directory before, but its there now and it survives a factory reset. Mine started doing it yesterday and I have done about 2 dozen factory resets trying to narrow down the problem I was able to determine that it only downloads these programs (the same thee mentioned) when the sim card is inserted. Without the sim card, and with an active wifi connection, it does not do it. The moment it gets a carrier signal, it begins downloading those three apps in the background. I went to tomobile and got a new sim card, and it still does it, but not if I put the sim card in a different phone. So it lies within my note 4 not my account or the sim card. Furthermore, if you factory reset without the simcard, DTIgnite does not appear in the file directory. Once it is inserted, DTIGnite downloads itself and then these three programs. This leads me to believe that what ever site I visited or clicked on, rooted my phone. Because, how else would it survive a reset unless it was in the root directory?
Now DTIgnite is an app developed by a firm that tries to market its capabilities to carriers in order to give them backdoor access to phones. I think its possible someone licensed the software and repurposed it to install bloat ware of their own for third party companies for profit.
In anycase, because of my work, I cannot have a compromised phone and must replace it now. Thinking about contacting a lawyer and seeing what can be done to the company that makes DTIgnite
---------- Post added at 11:01 PM ---------- Previous post was at 10:22 PM ----------
IDIgnite is indeed the problem. I reformated without the Sim, and then without logging into any account I checked the app manager. Within, is DTIgnite, but once it is "turned off" you can insert the sim card and it will not resinstall those three programs. However, this app is not preinstalled which means each one of us clicked on a link that silently downloaded it. Furthermore, I suspect it has been placed in a safe partition on the device or on the ROOT directory itself because it survives a factory reset.
I dont know how to check if my device is rooted, but when I boot in recovery mode it lists me in # manual mode# and I seem to remember the # symbol was significant in the root determination discussion. Again, I am no expert on the matter; so, I can be completly off base here. I recomend you research my findings on your device to see if they are compromised as well.
Now, I just contacted Mandelay Digital, the publically traded company that authors DT Ignite, and let them know that on monday I will consult an attourney regarding there neglegent distribution of their software and have requested they provide steps to uninstall. after my discussion with an attourney, I may come back here to post information regarding a class action if it is feasible.
It's really not a big deal.
For starters, a random piece of adware did NOT root your device. In order to root, you would need to run commands and codes into your device using a program called ODIN, and unless your phone rebooted, showed a red system menu, then rebooted itself again, it was not rooted. You would also have a root access application like SuperSU or SuperUser.
There's 2 ways to go about fixing the adware...
1. Factory Reset, THEN ODIN back to factory stock, the files (from root accessed files and normal files alike) will be entirely resetted to how the stock .img was created.
2. (Easier way) Root, use Titanium and uninstall the adware application causing the problem. Seeing as I've never had adware on my device, I feel this way would only be a temporary fix.
Needless to say, fix #1 is preffered.
If this is an issue for you (novice problems might I add), use an antivirus designed for your device. There are multiple options in the Play Store.
And a side note for ya, this will not stand up in court, this wouldn't even make it to court; in any way possible. If a lawyer had a nickel for anyone who has ever had adware on their devices that was trying to take a company to court to get some kind of settlement or resolution, lawyers would be very rich people.
You visited a site that infected your device with adware. (Probably pornographic). You'll be wasting your time and money. Based on the fact that you went to the extent to call them and threaten them is even worse, almost childish. They don't care, they probably get calls like that all day, every day.
This is not some random anomaly, it's a virus that was installed into your device due to your Internet browsing / downloading habits.
When you see **** on the ground, rather than yelling at it and rolling around in it, just pick it up and be done.