Android Apps Huge Malware Target

Friday, April 20, 2012 @ 03:04 PM gHale

There have been 5,000 malicious Android apps discovered this year alone, with one-click billing fraud schemes and fake applications that hide malicious elements being the most prevalent.

“One big reason for the popularity of apps is their ease of use,” said Trend Micro Senior Threat Researcher Robert McArdle. Browsing the net on your mobile phone is not the same experience as doing it on a laptop. The key thing to remember is to think before you give an app access to your data. If you have any doubts about giving oversensitive information, just don’t do it,”

Popular App Means Malware’s Brewing
Malware Strikes Android Apps
Android OS: No Permissions Required
More Flaws Found in Mobile Devices

Trend Micro released its quarterly report for the first part of 2012 and it shows so far this year cyber criminals focused their efforts mostly on attacks that target mobile device owners, particularly Android users.

Advanced persistent threats (APTs) have also left their mark on the first quarter. In these types of attacks, cyber criminals take their time to go deep into the targeted network and cause damage.

Two campaigns stood out: the LuckyCat campaign, active since June 2011, and the LURID/Enfal campaign which relied on emails mostly related to the topic of Tibet.

Hoaxes and scams that circulate via email and social networking sites are also part of the mix. The large number of people using Facebook, Twitter, and more recently, Pinterest, are all targets for cyber criminals that use the data from social media sites to launch social engineering attacks.

Vulnerabilities that expose computing systems are also worth mentioning, one of the more significant ones being the flaw in the Remote Desktop Protocol used by Windows systems.

When it comes to pieces of malware, ransomware leads the pack, with the countries most affected by the phenomenon being the U.S., Germany, France, Italy, Russia, Taiwan, Australia and Hungary.

Leave a Reply

You must be logged in to post a comment.