Categories: MalwareSecurity

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure  security firm has recently published the “Mobile threat report Q3/2012” related the past quarter that presents the mobile threat landscape, a scenario that has been characterized by Android’s dominance.

The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the famous OS,  during the third quarter were detected 51,447 unique samples, it is a worrying increase if we consider that Google has tried to secure it’s OS with the introduction of an additional security layer, named Bouncer, on the Android Play Store.  The Bouncer operates scanning of the existing application and for developer communities to identify malicious code but security experts have demonstrated that Bouncer protection could be eluded and probably this has also caused the explosion of infections.

Meanwhile in Q2 the malware found where maily of “drive by malware” type in Q3, between May and June, the majority of the new Android agents detected has been designed to achieve frauds based of SMS use.

A rilevant factor to consider in the analyis is the geographic distribution of malware, the large diffusion in China and Russia of such malicious code is a natural consequence of the continued high growth in Android smartphone adoption in those regions.

“In Q2, China officially surpassed the United States as the largest market for smartphones, with Android handsets accounting 81% of that market.”

At the same time in these areas has increased the ability to use apps made by third parties that are not certified and that are used as the main vehicle of infection.

 

Despite Android platforms is the principal target of new malware, we cannot ignore the malicious code that hit also other platforms less famous in this moment such as Symbian. Just Symbian OS has been hit by 21 new families and instances of malware in the past quarter with an increase of 17% respect previous quarter. The reason for a so sensible increase for Symbian malware is the presence of exploitable flaws in the object-capability model used in the OS.

The report highlight the similarities between the set of capabilities required by a legitimate application and the ones related to malicious software able to download and install new software from the Internet. A malware in this way is able to install and execute malicious code on a Symbian devices without  generate any alert.

Once again the privileged origin for new wave of malware is China but principal purpose is not cyber espionage but making a profit sending SMS messages to premium rate numbers or those associated with SMS-based services.

Malware sends out SMS messages that silently sign up the device owner for a premium subscription service, incurring charges the user’s account.”

Others malware use a different fraud schema enabling WAP services on user’s mobile device to automatically access to billed services such as an on-line games.

The quarter has been also characterized by the discovery of a new variant of the famous Zeus malware for mobile environments, it is named Zitmo and targeted mobile devices. As the ancestor Zeus, Zitmo has the primary purpose to steal banking credentials in particular to capture the mobile Transaction Authentication Number (mTAN) sent by banks to their customers via SMS message and used to validate an online transaction.

Analyzing mobile threat detected in Q3 by type it is possible discover that trojan dominate the scenario with a percentage of 71,5% followed by Riskware at 7,5%, relevant are also the menaces posed by monitoring Tool, Trojan-Spy and Spyware.

Very worrying in may opinion is the raise of multiplatform malware, in particular cyber espionage tools developed to infect any kind of platforms, a valid example is the FinSpy trojan detected in the wild that is able to monitor every activities of the victims. These malware are not products of cybercrime but are designed by specialized companies that create them to support law enforcement investigations.

FinSpy is the mobile version of FinFisher, a trojan commercially marketed by Gamma International, software firm based in the United Kingdom. How is it possible that these agents are retrieved all the round the world without apparently motivation? There is a great business based on surveillance software and data proposed in the report confirms it.

Let me propose again few useful suggestions for the use of mobile devices:

  • Use applications to increase the safety of the device. The principal antivirus companies are producing applications that allow even inexperienced users to avoid nasty surprises.
  • Be careful visiting third party app stores. These are the favorites places for malware writers because usually every control on the quality of the apps is absent.The likelihood of you encountering malware on an alternative app store is really high.
  • Avoid to downloading utility and porn applications from unverified sources because these types of apps are most likely to have malware hidden inside.
  • Be careful clicking on a shortened URL in an SMS message or on a social networking site. Social network platform are preferential place for malware spreading.
  • Pay attention to all interactions required by our mobile applications, make sure to authorize only necessary transactions.
  • Be careful clicking on in-app advertisements. When clicking on ads, you need to confident that the ad directs to where you expect to be directed.
In order to avoid the spread of malware in mobile environment it is necessary that:
  • the level of awareness related to the threat for mobile users must be increased. It should avoid creating ideal conditions for the spread of malware.
  • manufacturers, OS providers, carriers and app developers must work together defining best practices to follow to reach an acceptable level of security.

Pierluigi Paganini

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

59 mins ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

1 hour ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

4 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

6 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

16 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

23 hours ago

This website uses cookies.