Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile scenarios. For those who develop viruses and similar mobile platforms are a favorite target. The main causes are:
According to the data on the world wide distribution of the OSs, it is Android for mobile devices that has made it to the master.
But around Android are gathering light and shadow. Recently the Pentagon has approved a version of Android running on Dell hardware to be used by DoD officials. The approval has been motivated with the assertion that Android is an Open OS and give easly the possibility to develope DoD custom security applications.
Official Android Market host many Malware Games, that is the news we have regulary read during the last months.
F-Secure researchers have several time found malware deployed in the Android Market disguised as free versions of popular games such as Cut the Rope and Assassin’s Creed. Criminals are using to scam users of Google’s Android Market app store overnight so more malware appeared in Google’s official app repository.
It isn’t difficult to predict a rosy future for the proliferation of malware in the mobile sector, but what are the main motivations behind the development of malware, especially in the scenario we are examining?
There are two main categories:
To the first category belong all those viruses / trojans developed for investigative purposes or as a cyber weapons (eg Stuxnet, Duqu).
Easy knows to expect an innovative point of view they can be more dangerous variants being developed by teams of experts hired by governments. The “Tilded platform” is a good example of innovation.
Not to be outdone, however, diffusion capacity and infection of malware of the second category developed by crime for profit. The crime has infact realized there are enormous profits and risk all in all content in the malware development.
Several methods are known to the monetization with malware development, here you are a list of the principals:
When using the mobile device there are a number of simple rules of behavior that should be shared as: