Mobile Malware Threats are Rising

Discussion in 'Articles & Tutorials' started by Nill Smith, Dec 31, 2013.

  1. Nill Smith

    Nill Smith
    uix_expand uix_collapse

    Dec 7, 2010
    Likes Received:
    We can say that Mobile Security and Mobile ubiquity are likewise growing globally. Mobile evolution has increased human interactions and global internet access and growing mobile applications has peaked mobile evolution on a high peak. Mobile has merged personal and corporate needs and usage. However, with the increase of mobile usage has made a chance for cyber criminals to make profit by mobile malware. Cyber criminal got succeed due to behavioral pattern of mobile users and lack of security knowledge. Such ignorance makes users victim of data loss, malicious application, fraud and other mobile threats. The facts are shown in this article is cited by Blue coat report and NQmobile report.

    Blue Coat Report: According to Blue Coat report, some of the interesting findings are given in case of mobile malware.

    • Mobile threats are still trouble ware in large position used for stealing personal information.
    • Most successful mobile malware includes Scams, phishing, spam, malicious apps that threatened the mobile threat landscape.
    • 40% of mobile malware is originated from malnets. In previous year of 2012, two third of web based attacks were originated through malnets.
    • Extending security for mobile is compulsory for business for the protection of their assets and employees.
    • On an average, a user spends 72 minutes after internet browsing per day. Out of which 11 minutes are being spend after searching the content related to computer or internet and the rest 61 minutes is being spend for social networking, shopping, economy, entertainment, News, etc.
    • Adult site content is a major weakness of mobile users and the chance of malware spread is nearly three times higher than any other sites.

    View attachment 1985

    If we closely observe the above image, we can easily perceive that mobile has replaced desktop and mostly users spend their time in browsing different activities on their smartphones. This exposure provides a handsome opportunity to hackers to spread malware in user’s mobile. As many mobile users also have no security app or antivirus app on their smartphones, and they blindly surf internet and download app without awareness of hacker’s intentions.

    Mobile Malware Strategy: According to report, how behavioral pattern of mobile users invites different malware including

    • Percentage of request made from mobile device for malicious content and
    • Percentage of malicious sites that targeting mobile users.
    View attachment 1986
    • Mobile devices reported for 1.34% of all phishing requests; so far, only 0.77% of all phishing sites are targeting mobile users.
    • From all suspicious requests, mobile devices reported 1.52% requests; so far, only 0.98% of all suspicious sites are targeting mobile users.
    • Adult requests made from mobile devices reported 2.23% while 3.8% of all adult sites are targeting mobile users.

    NQmobile Report: Another report called NQ mobile midyear report has showed a sharp increase in malware infections in china, Ukraine, Saudi Arabia. The report made by 250 mobile security professionals, and developers by inspecting327 million registered user accounts and 111 million active user accounts to get real time data on mobile malware.

    Top Countries with Mobile malware Infections:

    • Being on top in spreading mobile malware china has showed 43% increase in mobile malware infections with a 6.7 million devices found infected in Q1 2013.
    • Ukraine and Russia showed 20% increase in mobile malware infection.
    • India and USA however showed reduction of 88% and 63% respectively in mobile malware infection.

    View attachment 1987

    Other Mobile Malware Facts: Beside the above chart and finding NQ mobile report also produced some interesting and shocking findings in case of mobile malware infections.

    • Around 21 million devices found infected in the first half of 2013.
    • There are 51,084 threats identified in the first half of 2013.
    • 32% malware designed to collect personal information of clients.
    • 23% malware designed to stop user’s device functioning.

    Top Techniques for Mobile Malware: The report also identified three major tactics for inserting malware in mobile devices.

    • App Repackaging: In this method, hackers add lines into app, restore it on third party platform for download, and install. It changes user’s setting, collects data and send messages by controlling the device.
    • Malicious URLs: Hackers take advantage of hidden URL on mobile web, redirect users on clone website, and steal their personal information during browsing the website. After that, hackers grab username, password, and mobile no. and send a malicious URL link.
    • Smishing: In this method, an SMS send to user mobile to induce users, and when users click on malicious link, malicious software will be downloaded into mobile device to steal information of user. Smishing uses social engineering tactics.


    • Mobile malware infection is drastically increasing globally and there should be some strong security to protect the user’s information.
    • Providing education about malware can drop down the ration of mobile malware infection.
    • Apply antivirus protection in your mobile with updated patches can bring down the malware rate.
    • Use a strong password to lock your device.
    • Review app before downloading and understand what data the app can trace from your device.
    • Check the shopping or banking site for security purpose before doing any transactions.
    • If you are not sure, then do not respond to any fraudulent mail, text, or voicemail.
  2. bmwillsmith

    uix_expand uix_collapse

    Jan 23, 2014
    Likes Received:
    Malware is very dangerous it will corrupt our system files, it will collects most important information and files from our computer or smart phones. These days very dangerous malwares are coming in mobile apps, so please confirm before you download any android app. Then only we can be secure our smart phones or tablets.

Share This Page