Feeds

Mobile app malware menace grows

Android users at front line of attack

Using blade systems to cut costs and sharpen efficiencies

The number of apps on mobile marketplaces contaminated with malware grew from 80 to 400 during the first half of 2011, according to a study by Lookout Mobile Security.

Android users are particularly at risk of downloading contaminated apps from markets and download sites. Two of the most commonplace threats, DroidDream and GGTracker, were regularly hidden into repackaged gaming apps or utilities and uploaded to Android app marketplaces.

Because of this surge in malicious apps, users are 2.5 times more likely to encounter malware today than at the start of the year, according to Lookout.

Based on data culled from its mobile threat network, Lookout reckons between a half million and a million users were exposed mobile malware in the first six months of 2011.

Threats include malware strains that send text messages from compromised phones. These types of attacks mainly affected Android users in China, Russia and Eastern Europe but arrived in the US last month with a threat called GGTracker.

Web-based threats mean that security risks exist for mobile users outside the Symbian and Android families, the two mobile platforms most commonly targeted by virus writers. Lookout reckons VXers are increasingly looking to redirect surfers to malicious sites contaminated with malware that triggers a download as an alternative to tricking them into opening malicious (Trojanised) applications directly. Update attacks, where an attacker first publishes a legitimate application with no malware – it is only updated with malware components once it has a large user base – have also begun to appear.

"As mobile devices grow in popularity, so do the incentives for attackers," says Kevin Mahaffey, CTO and co-founder of Lookout Mobile Security. "We've seen the prevalence and the level of sophistication of mobile malware attacks evolve significantly in the first six months of 2011. We expect this trend to continue as more and more people adopt mobile devices."

A closer look at the malware security landscape, together with safety tips for users, can be found in Lookout's report here. ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.