Tuesday, April 29, 2014

Android target of attacks (infographic) - Telix.pl

class=”tiny”
 Author: Kan 2014-04-29 12:13 | Market | f-secure | Report | Trojan | infographic | Android | WP8
Kan
Sledzik Digg Google Print Share

A new report by mobile threats F-Secure shows that more than 99 percent. new threats on portable devices detected by laboratories in the first quarter of 2014 related to the users of the Android platform. Among detected during this period 277 new families and variants until 275 was imposed in the Google operating system. This is a significant increase compared with the same period last year, when we launched 149 new threats, of which 91 per cent. was associated with Android.

In the first quarter of this year has been observed quite a few new threats to Android. This shows that malicious programs for mobile furnishing are becoming more advanced and complex. Was the first malware used for the extraction kryptowalut such as Bitcoin or Litecoin. We also observed the first bootkit, which is a virus that attacks the device during the earliest stages of its launch, making it extremely difficult to detect and remove. There is also the first Trojan uses an anonymous network Tor and trojan banking on Windows who moves well on Android.


Click

by our recently detected malware shows in which direction the creators of malware aimed ‘u – Mikko Hypponen says, head of F-Secure Labs. It is very likely that such malicious programs appear more in the coming months. For example, cybercriminals will increasingly use the computing power of smartphones for extracting kryptowaluty.

According to F-Secure in the first quarter of 2014 United Kingdom experienced the largest number of attacks of malicious code on mobile devices. 10 thousand. Members foiled average between 15 and 20 attacks. In Germany, F-Secure blocked from 5 to 10 malicious programs on the 10 thousand. users. Poland in this respect remains as a safe country and reported here for two attacks on 10 thousand. users.

evil intentions

What do mobile malicious programs after they infect the device? The report shows that 83% of Trojan sends SMS messages to premium numbers or services based on SMS subscriptions – by far the most common behavior of malicious code.

Here is a list of the most common malicious activities performed by mobile Trojans:

  • Send SMS messages to numbers with increased charges
  • Downloading and installing unwanted files and applications on the device
  • Tracking device location, sound or image, in order to monitor user
  • Opening Web pages in the background in order to increase their viewership statistics
  • Monitoring and forwarding of SMS messages associated with online banking in order to scam
  • Theft of personal data, such as files, contacts, photos and other
  • charging for use, upgrade or installation of the application, which is in fact free.

Source: F-Secure

Kan

Tags: | f-secure | Report | Trojan | infographic | Android | WP8 Sledzik Digg Google Print Share
Comments: 0 | Leave a comment | View all comments in forum >>

No comments:

Post a Comment