Feeds

Android Market free-for-all blamed for malware avalanche

Symbian VXers advance on the Droids

The Power of One eBook: Top reasons to choose HP BladeSystem

Android mobile malware samples have increased more than five-fold since July alone, according to a study by Juniper Networks.

The ability of anyone to develop and publish an application to the Android Market – in contrast to the more restrictive model applied by Apple for iOS – is at least partly to blame for the huge increase of 472 per cent in little over three months, according to Juniper. The network infrastructure firm also blames the absence of an "adequate code-review mechanism" for the rise.

A blog post by Juniper explains:

These days, it seems all you need is a developer account, that is relatively easy to anonymise, pay $25 and you can post your applications. With no upfront review process, no one checking to see that your application does what it says, just the world’s largest majority of smartphone users skimming past your application’s description page with whatever description of the application the developer chooses to include.

Applications can be removed from the Android marketplace following complaints, but by then any rogue application would have hit hundreds or perhaps thousands of victims. In addition to increased volumes of Android malware (growing exponentially, according to Juniper), the firm is also seeing a growth in the sophistication of malware sample for the smartphone platform. One increasingly popular tactic is establishing a backdoor on compromised devices that can later be used to push secondary infectors or updates onto pwned smartphones, as Juniper explains.

In the early spring, we began seeing Android malware that was capable of leveraging one of several platform vulnerabilities that allowed malware to gain root access on the device, in the background, and then install additional packages to the device to extend the functionality of the malware.

Today, just about every piece of malware that is released contains this capability, simply because the vulnerabilities remain prevalent in nearly 90 per cent of Android devices being carried around today. Attackers know this, and they’re using it to gain privilege escalation on the device in order to gain access to data and services that wouldn’t otherwise be available.

More than half (55 per cent) of known Android malware samples bundle spyware functionality. Malware strains that send text messages to premium rate numbers – netting cyber-crooks a commission fee in the process – are also commonplace. Most malicious applications target communications, location, or other personal identifying information.

Talk of exponential malware growth is alarming – and justified – but needs to be put into context: that this growth started from a low base dwarfed in volumes by the quantity of windows malware. Specialist mobile security firm Lookout, for example, estimates mobile malware instances have more than doubled to nearly 1,000 over the last four months alone. Windows malware estimates routinely exceed 5 million and above.

Juniper reckons that bad guys who used to write malware for Symbian and Windows mobile devices have moved over to Android as Google's platform has increased in popularity. Android malware instances have increased as a result. In the meantime strains of iOS malware have been limited to the infamous rickrolling worm and a similar banking Trojan a couple of years back, and limited to unlocked devices. Apple's app store polices – rather than inherent features of either smartphone platform – explain why Android malware is abundant while Apple smartphone malware is almost unheard of, according to Juniper.

The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware.

Famed researcher Charlie Miller managed to get a malicious application into Apple's App Store, so Apple is not immune to problems in this area, as Juniper acknowledges. However, in the case of Android, no such restrictions even exist. Juniper concludes:

There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught... which means Android will remain the target of mobile malware writers around the world.

Juniper's malicious mobile threats report can be downloaded here (registration required). A commentary of its main findings, alongside an infographic, can be found here.

Some security watchers have described Android as the new Windows because of the security problems that are beginning to congregate around the platform. Some operating systems attract malware writers while others are largely avoided for reasons that don't have much to do with the inherent security of an operating system. Widespread adoption, knowledge among VXers on how to write malware, documentation, and virus creation tools are more important factors.

Android ticks all of these boxes, just as Windows did before it. Unless the lessons of the past are learned, and learned quickly, we risk repeating the same pox-plagued history of Windows desktops on smartphones. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.