Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Android Gingerbread Is Taster’s Choice for Mobile Attacks: Kaspersky Lab

While mobile malware remains small next to the amount affecting PCs, it is still growing, and new reports from Kaspersky Lab and F-Secure show where attackers are focusing their attention. 

A new report by Kaspersky Lab found that 28 percent of all mobile devices attacked by malware in the third quarter of 2012 were running “Gingerbread” – aka Android OS version 2.3.6.

While mobile malware remains small next to the amount affecting PCs, it is still growing, and new reports from Kaspersky Lab and F-Secure show where attackers are focusing their attention. 

A new report by Kaspersky Lab found that 28 percent of all mobile devices attacked by malware in the third quarter of 2012 were running “Gingerbread” – aka Android OS version 2.3.6.

According to Kaspersky, 91 percent of all Android malware detected in the last 14 days of September occurred on mobile devices running either Gingerbread or “Ice Cream Sandwich”, Android version 4.04.

“It is obvious that the devices with the later versions of operating systems installed on them are better suited to actively working online,” blogged Yury Namestnikov, senior malware analyst at Kaspersky Lab. “Unfortunately, more active web surfing often leads users to sites hosting malicious content. “

“More than one half of all malware detected on user smartphones turned out to be SMS Trojans, i.e. malicious programs that steal money from victims’ mobile accounts by sending SMS messages to premium rate numbers,” he continued. “The OpFake family has become the most widespread (38.3 percent of all the malicious programs for Android detected) among all the mobile malware families. All the programs in this family disguise themselves as Opera Mini. Third place in the ranking was taken by the FakeInst family, whose members pretend to be installers for popular programs (17 percent).”

“These two types of malware are mostly distributed via so-called alternative app stores created by cybercriminals,” he added.

Google has taken a number of steps to address security, for example developing a mechanism known as Bouncer to police the Google Play marketplace for Android apps. Android also included anti-exploit features to Jelly Bean (4.1) and implemented address space layout randomization more extensively, and has reportedly developed a real-time app scanner for Jelly Bean 4.2 to detect malicious applications. 

Advertisement. Scroll to continue reading.

The threat landscape for mobile devices has more on it than Android malware however. In its report, F-Secure noted that the third quarter saw a new variant of Zitmo (mobile version of the Zeus malware) targeting Blackberry devices. The new variant is now using COD file format and targets mobile Transaction Authentication Numbers (mTANs) sent by banks to their customers to authenticate transactions attempts. 

Besides Zitmo for Blackberry, the FinSpy trojan was the other notable discovery in the third quarter of 2012, F-Secure said. The Trojan is available on multiple mobile platforms – Android, Symbian, iOS, and Windows Mobile, and can take screenshots of an infected device, record keyboard strokes, intercept Skype communications, track device location, and monitor SMS and call activities on the device.

Researchers at F-Secure also identified 21 new families and variants affecting Symbian devices in the third quarter, representing a 17 percent increase compared to the second quarter.

“Most of the Symbian malware originates in China and are distributed for the purpose of making a profit,” according to the report. “Most of these (for example, Fakepatch.A and Foliur.A) are involved in SMS-sending activities. The SMS messages are usually sent to premium rate numbers or those associated with SMS-based services. Malware authors and distributers can easily turn an infection into profit by taking advantage of a ‘built-in’ billing mechanism for these SMS services; the malware simply sends out SMS messages that silently sign up the device owner for a premium subscription service, incurring charges the user’s account.”

The F-Secure report can be downloaded here.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Cybercrime

A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.