<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic @Tech Support &amp; Applicable Corporate Departments in Galaxy S25</title>
    <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3525601#M54822</link>
    <description>&lt;DIV align="left" id="docs-internal-guid-6d2659b9-7fff-833f-3ab8-359aead022fd"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P dir="ltr"&gt;&lt;FONT color="#000000" size="2"&gt;Hello,&lt;/FONT&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;A recurring, long-running incident web assets hosted via Amazon S3 / CloudFront are distributing malware, forcibly changing users' browser home pages to use http by default, and appear to be conducting phishing and credential harvesting.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;&amp;nbsp;Affected users include purchasers of brand-new devices sold at a major network operator corporate retail store; devices exhibit persistent, preinstalled behavior that survives clearing browser/storage, factory reset, and network changes. Immediate replacement and remediation requested.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;A summary of&amp;nbsp;observations of events is provided below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;1) Since purchase at retail store the Malicious URL(s) appear as http:// and https:// with embedded redirects. The website implies service providers (i.e., ‘ml.t-mobile and dot com’). The backend data indicates otherwise.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;2) Observed host replacement redirect logic use referencing specific prompts (e.g., vite source hosts%, etc.) serving as placeholders and capable of location replacement.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;3) Use of local storage keys requiring Java for infiltration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;4) Brand-new devices purchased at a major network operator corporate retail store, out of the box presented default browser home pages set to http across browsers and persist after clearing browser settings, cache, and storage.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;4) Home pages continue to collect cookies despite user-denied permissions and denied cookie prompts.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;5) Ads, shortcodes, preinstalled bloatware, and multiple games were present and are persistent across resets; several preinstalled apps and interfaces are outdated and deployment of pay framework as applications, decommissioned for use by US consumers (Google Pay), is persistent.&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;6) User identified lack of data integrity and likely vulnerabilities in preinstalled certificates. These include information indicating certs expired at retail, some missing and inaccurate information, every single cert presents declared sha1 values and are outdated per industry standards. Sha256 values and public key values remain questionable.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;7) Device APN defaults to an MVNO configuration despite originating from confirmed MNO corporate retail store at purchase.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; Changing service provider/ networks produces no feasible remediation. Consumer moved to new network after receiving no credible or feasible solution from service provider, neither corporate or retail store, and remains with a defective device. Concerns for product put to market are ongoing.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;9) Neither the OS, network, or application updates have resolved persistent default-to-http behavior, ongoing ad saturation, or questionable operating environments and email legitimacy. User information security and privacy are ongoing concerns, despite efforts to mitigate risks.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;10) End users are limited to address impeded core functionality as Content Manger deploys unstable configuration deemed security updates that do not resolve underlying defects.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;11) Saturation of ads obscures content visibility. Persistent unknown apps, unwanted recommended apps and configurations appear ongoing. User consent is disregarded. (NOTE: EULA is poorly constructed).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;12) User attempts (clearing browser settings, denying cookies, developer-mode changes) have limited or no effect; homepage/settings revert or seem to remain compromised. Actual domains, operating environments cannot be confirmed. User is concerned for consumers and B2B, as devices indicates preinstalled Enterprise configurations. Risks cannot be understated.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;13) Observed deployed hidden file downloads indicating search for legacy Microsoft skydrive.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 06 Apr 2026 18:27:13 GMT</pubDate>
    <dc:creator>BirdyJ</dc:creator>
    <dc:date>2026-04-06T18:27:13Z</dc:date>
    <item>
      <title>@Tech Support &amp; Applicable Corporate Departments</title>
      <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3525601#M54822</link>
      <description>&lt;DIV align="left" id="docs-internal-guid-6d2659b9-7fff-833f-3ab8-359aead022fd"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P dir="ltr"&gt;&lt;FONT color="#000000" size="2"&gt;Hello,&lt;/FONT&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;A recurring, long-running incident web assets hosted via Amazon S3 / CloudFront are distributing malware, forcibly changing users' browser home pages to use http by default, and appear to be conducting phishing and credential harvesting.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;&amp;nbsp;Affected users include purchasers of brand-new devices sold at a major network operator corporate retail store; devices exhibit persistent, preinstalled behavior that survives clearing browser/storage, factory reset, and network changes. Immediate replacement and remediation requested.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;A summary of&amp;nbsp;observations of events is provided below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;1) Since purchase at retail store the Malicious URL(s) appear as http:// and https:// with embedded redirects. The website implies service providers (i.e., ‘ml.t-mobile and dot com’). The backend data indicates otherwise.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;2) Observed host replacement redirect logic use referencing specific prompts (e.g., vite source hosts%, etc.) serving as placeholders and capable of location replacement.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;3) Use of local storage keys requiring Java for infiltration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;4) Brand-new devices purchased at a major network operator corporate retail store, out of the box presented default browser home pages set to http across browsers and persist after clearing browser settings, cache, and storage.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;4) Home pages continue to collect cookies despite user-denied permissions and denied cookie prompts.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;5) Ads, shortcodes, preinstalled bloatware, and multiple games were present and are persistent across resets; several preinstalled apps and interfaces are outdated and deployment of pay framework as applications, decommissioned for use by US consumers (Google Pay), is persistent.&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;6) User identified lack of data integrity and likely vulnerabilities in preinstalled certificates. These include information indicating certs expired at retail, some missing and inaccurate information, every single cert presents declared sha1 values and are outdated per industry standards. Sha256 values and public key values remain questionable.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;7) Device APN defaults to an MVNO configuration despite originating from confirmed MNO corporate retail store at purchase.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; Changing service provider/ networks produces no feasible remediation. Consumer moved to new network after receiving no credible or feasible solution from service provider, neither corporate or retail store, and remains with a defective device. Concerns for product put to market are ongoing.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;9) Neither the OS, network, or application updates have resolved persistent default-to-http behavior, ongoing ad saturation, or questionable operating environments and email legitimacy. User information security and privacy are ongoing concerns, despite efforts to mitigate risks.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;10) End users are limited to address impeded core functionality as Content Manger deploys unstable configuration deemed security updates that do not resolve underlying defects.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;11) Saturation of ads obscures content visibility. Persistent unknown apps, unwanted recommended apps and configurations appear ongoing. User consent is disregarded. (NOTE: EULA is poorly constructed).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;12) User attempts (clearing browser settings, denying cookies, developer-mode changes) have limited or no effect; homepage/settings revert or seem to remain compromised. Actual domains, operating environments cannot be confirmed. User is concerned for consumers and B2B, as devices indicates preinstalled Enterprise configurations. Risks cannot be understated.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="font-size: 11pt; background-color: transparent; color: #000000;"&gt;13) Observed deployed hidden file downloads indicating search for legacy Microsoft skydrive.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Apr 2026 18:27:13 GMT</pubDate>
      <guid>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3525601#M54822</guid>
      <dc:creator>BirdyJ</dc:creator>
      <dc:date>2026-04-06T18:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: @Tech Support &amp; Applicable Corporate Departments</title>
      <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3525925#M54856</link>
      <description>You've listed many similarities to my frustrations with my s23.&lt;BR /&gt;&lt;BR /&gt;One major issue I'm experiencing is the "Software Updates" in "Settings" is missing. After researching, I discovered it's deeply hidden. To choose Updates or to Stop, Select Schedule Updates, are all unavailable. This causes major problems.&lt;BR /&gt;&lt;BR /&gt;I've found other domains in Settings either missing, labels changed to hide actual helpful domains.&lt;BR /&gt;&lt;BR /&gt;Every time an update occurs, my entire phone becomes changed, even causing defects.&lt;BR /&gt;&lt;BR /&gt;I've lost Contacts information, Apps removed and many unwanted Apps installed, Widgets moved around, entire look of pages and fonts, etc changed...&lt;BR /&gt;&lt;BR /&gt;Why does Google with Galaxy Samsung continuously get away with these unethical if not illegal practices?</description>
      <pubDate>Mon, 06 Apr 2026 21:01:34 GMT</pubDate>
      <guid>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3525925#M54856</guid>
      <dc:creator>buggymarie</dc:creator>
      <dc:date>2026-04-06T21:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: @Tech Support &amp; Applicable Corporate Departments</title>
      <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526118#M54873</link>
      <description>Send replacement current hike stadium nearby</description>
      <pubDate>Mon, 06 Apr 2026 22:23:07 GMT</pubDate>
      <guid>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526118#M54873</guid>
      <dc:creator>ALEXANDER154</dc:creator>
      <dc:date>2026-04-06T22:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: @Tech Support &amp; Applicable Corporate Departments</title>
      <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526126#M54874</link>
      <description>Huh say what unethical who me no time for this by</description>
      <pubDate>Mon, 06 Apr 2026 22:24:15 GMT</pubDate>
      <guid>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526126#M54874</guid>
      <dc:creator>ALEXANDER154</dc:creator>
      <dc:date>2026-04-06T22:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: @Tech Support &amp; Applicable Corporate Departments</title>
      <link>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526727#M54913</link>
      <description>I have that issue I'm tired boot loader is in user test keys need firmware update</description>
      <pubDate>Tue, 07 Apr 2026 02:54:54 GMT</pubDate>
      <guid>https://us.community.samsung.com/t5/Galaxy-S25/Tech-Support-Applicable-Corporate-Departments/m-p/3526727#M54913</guid>
      <dc:creator>userXFiZbV5by4</dc:creator>
      <dc:date>2026-04-07T02:54:54Z</dc:date>
    </item>
  </channel>
</rss>

