The good folks at the Juniper Mobile Threat Center (MTC) are on the job 24/7/365, looking at and analyzing individual instances of mobile malware. Hence, they have an unusual catbird seat on what the bad guys are up to, and to put it mildly, “no good” is on the rise. In fact, the company is out with its third annual Mobile Threats Report, which looks at attacker activity from March 2012 to March 2013, and it is really getting ugly out there. It is based on analysis of more than 1.85 million mobile applications and vulnerabilities, up more than 133 percent from the last report released in February 2012.
The headline findings alone are enough to give all of us pause:
It gets even more nightmarish, especially if you are the owner of an Android device. Like bank robbers who go where the money is, because of the increasing popularity of Android (67.7 global market share according to analyst firm Canalys), 92 percent of all MTC detected threats were aimed at devices running Android devices. To make matters worse, attackers are leveraging loosely regulated third-party app marketplaces to distribute malware and more quickly get threats on the market.
The devils are in the MTC report details
The MTC report uncovered several mobile malware trends that demonstrate increased business savvy by attackers including:
One graphic from the report unfortunately paints the stark realities of bad actors increasing the frequency, sophistication and expanded reach of their attacks.
Click on image to enlarge
Source: Juniper Networks Third Annual Mobile Threats Report
In commenting on the report, Michael Callahan, vice president of global product marketing for the Security Business, Juniper Networks, stated, “With mobile malware on the rise and attackers becoming increasingly clever, we need better protection for mobile users and corporations. While on one hand the OEMs, carriers and software vendors must collaborate to develop platforms that mitigate large threats, enterprises and government organizations need to take a comprehensive look at protecting their data and networks by adopting a holistic approach to mobile security.”
Troy Vennon, director of the Mobile Threat Center, Juniper Networks, noted: “There’s no doubt mobility will continue to be a pervasive and disruptive force across every industry. We have found that it has created an easy business opportunity for malware developers who are becoming savvy in their approach to quickly turn profits in a rapidly growing market. We anticipate that similar to the evolution of PC-based threats, mobile attacks will continue to increase and become more sophisticated in the coming years.”
TechZone360 had an opportunity to discuss the report with Vennon, and he had several cogent observations about the findings. First, Vennon said, “There is a perfect storm creating opportunities for those with malicious intent to profit from the increasingly rich number of targets.” He explained that “the combination of explosive device growth, the availability of malware infected apps from third-party app stores, and industry fragmentation, notably in the Android ecosystem where Google has done a good job of providing defense against attackers but where roughly only 4 percent of users are running the latest version of Android which has protections, invites attacks.”
Reality is the attacks can be simple but lethal. The two most common are SMS Trojans and Fake Installers. The trojans infect what seem to be normal apps with the ability to send SMS text messages to premium services where charges are then automatically applied to an unsuspecting user’s mobile bill. Fake installers as the name implies accomplish basically the same feat.
“Android is the perfect target,” Vennon continued. “Not only is it increasing in market share, but it has an open development environment and the fragmentation of the industry where updates to the OS are not pushed out by service providers or device manufactures is why so few people are current in their protection.”
Vennon also noted that there are over 500 third-party app stores hosting mobile malware, and their enticements are beguiling. “Russia and China account for three out of five of the places hosting mobile malware,” he explained. “In addition, given the average attack can net about $10, the incentive to continue to exploit the low hanging fruit is irresistible. It really pays. There is little or no review of the apps in these stores and the shelf-life of the apps is long.”
The entire report is worth a good read. A big reason is because of findings that, as a result of BYOD’s growing presence in enterprises, the bad guys are now turning their attention to compromising high-value data on corporate networks and devices. Indeed, it notes that current e-mail “NotCompatible” attacks on an unprotected device could allow an attacker access to the organizations internal network. The report even provides a section on precisely how “NotCompatible” works.
Another graphic highlights the issue. Free apps come with consequences.
Click on image to enlarge
Finally, the report has a series of recommendation as to how to better secure your environment based on a holistic approach. These include:
As Vennon stated, “A holistic approach is necessary, the industry needs to do a better job to decrease fragmentation, and focus must be paid on really securing the endpoints.” The solutions are out there and, as the report shows, the urgency for implementing them is high.
James Cham, partner at seed fund Bloomberg BETA, was at Cisco Collaboration Summit today talking about the importance of models to the future of machi…
The retail value chain is in for a blockchain-enabled overhaul, with smarter relationships, delivering enhanced transparency across an environment of …
With GDPR on the horizon, Zuckerberg in Congress testifying and Facebook users questioning loyalty, change is coming. What that change will look like,…
Organizations amass profuse amounts of data these days, ranging from website traffic metrics to online customer surveys. Collectively, AI, IoT and eve…
Hollywood has programmed society into believing satellite imaging as a magic, all-seeing tool, but the real trick is in analysis. Numerous firms are f…