Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Android Gingerbread Is Taster’s Choice for Mobile Attacks: Kaspersky Lab

While mobile malware remains small next to the amount affecting PCs, it is still growing, and new reports from Kaspersky Lab and F-Secure show where attackers are focusing their attention. 

A new report by Kaspersky Lab found that 28 percent of all mobile devices attacked by malware in the third quarter of 2012 were running “Gingerbread” – aka Android OS version 2.3.6.

While mobile malware remains small next to the amount affecting PCs, it is still growing, and new reports from Kaspersky Lab and F-Secure show where attackers are focusing their attention. 

A new report by Kaspersky Lab found that 28 percent of all mobile devices attacked by malware in the third quarter of 2012 were running “Gingerbread” – aka Android OS version 2.3.6.

According to Kaspersky, 91 percent of all Android malware detected in the last 14 days of September occurred on mobile devices running either Gingerbread or “Ice Cream Sandwich”, Android version 4.04.

“It is obvious that the devices with the later versions of operating systems installed on them are better suited to actively working online,” blogged Yury Namestnikov, senior malware analyst at Kaspersky Lab. “Unfortunately, more active web surfing often leads users to sites hosting malicious content. “

“More than one half of all malware detected on user smartphones turned out to be SMS Trojans, i.e. malicious programs that steal money from victims’ mobile accounts by sending SMS messages to premium rate numbers,” he continued. “The OpFake family has become the most widespread (38.3 percent of all the malicious programs for Android detected) among all the mobile malware families. All the programs in this family disguise themselves as Opera Mini. Third place in the ranking was taken by the FakeInst family, whose members pretend to be installers for popular programs (17 percent).”

“These two types of malware are mostly distributed via so-called alternative app stores created by cybercriminals,” he added.

Google has taken a number of steps to address security, for example developing a mechanism known as Bouncer to police the Google Play marketplace for Android apps. Android also included anti-exploit features to Jelly Bean (4.1) and implemented address space layout randomization more extensively, and has reportedly developed a real-time app scanner for Jelly Bean 4.2 to detect malicious applications. 

The threat landscape for mobile devices has more on it than Android malware however. In its report, F-Secure noted that the third quarter saw a new variant of Zitmo (mobile version of the Zeus malware) targeting Blackberry devices. The new variant is now using COD file format and targets mobile Transaction Authentication Numbers (mTANs) sent by banks to their customers to authenticate transactions attempts. 

Advertisement. Scroll to continue reading.

Besides Zitmo for Blackberry, the FinSpy trojan was the other notable discovery in the third quarter of 2012, F-Secure said. The Trojan is available on multiple mobile platforms – Android, Symbian, iOS, and Windows Mobile, and can take screenshots of an infected device, record keyboard strokes, intercept Skype communications, track device location, and monitor SMS and call activities on the device.

Researchers at F-Secure also identified 21 new families and variants affecting Symbian devices in the third quarter, representing a 17 percent increase compared to the second quarter.

“Most of the Symbian malware originates in China and are distributed for the purpose of making a profit,” according to the report. “Most of these (for example, Fakepatch.A and Foliur.A) are involved in SMS-sending activities. The SMS messages are usually sent to premium rate numbers or those associated with SMS-based services. Malware authors and distributers can easily turn an infection into profit by taking advantage of a ‘built-in’ billing mechanism for these SMS services; the malware simply sends out SMS messages that silently sign up the device owner for a premium subscription service, incurring charges the user’s account.”

The F-Secure report can be downloaded here.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.