Monday, June 9, 2014

Android, and more than 7 million malware – PC Format

In the period from 1 to 31 May was exactly 7,005,453 registered security threats. This result is very similar to the data from April 2014. Similarly as in the previous months, the most common applications were detected advertising modules distributed by cybercriminals strictly commercial purposes. In approximately 10 percent. cases for mobile devices, applications found in the family Adware.Leadbolt, in second place (9 percent. cases) were applications from families Adware.Airpush, on the third (7 percent.) – Adware.Revmob.

Bot SMS – Android.SmsBot.120.origin was the most frequently detected malware in May – was detected at 235.383 devices with Android operating system. 189.847 infected smartphones and tablets backdoor Android.Backdoor.69.origin took second place in the ranking, third and Android.SmsBot.105.origin (132 403 infected machines). The list of “Top 10″ most popular type of Android Trojans detected using Dr.Web anti-virus software in May is as follows:

1 Android.SmsBot.120.origin – 3.36 percent.

2 Android.Backdoor.69.origin – 2.71 percent.

3 Android.SmsBot.105.origin – 1.89 percent.

4 Android.SmsSend.685.origin – 1.37 percent.

5 Android.SmsBot.122.origin – 1.21 percent.

6 Android.SmsSend.1215.origin – 0.96 percent.

7 Android.SmsSend.315.origin – 0.91 percent.

8 Android.Spy.83.origin – 0.91 percent.

9 Android.SmsSend.859.origin – 0.88 percent.

10 Android.SmsSend.991.origin – 0.86 percent.

The largest number of malicious and potentially dangerous programs (292 336) Dr.Web for Android detected on May 17, the least incidents (189 878) was recorded May 8, 2014 year. By the end of May 2014 due to component Dr.Web Security Auditor has identified 995 966 ??vulnerabilities, which can be used by criminals to carry attacks on Android devices.

Susceptibility Master Key allows you to install unsigned applications (introduction of viruses) of packages contain files with the same names. Two other vulnerabilities – Extra Field Name Length Field may allow attackers to incorporate the modified apk Trojan, which successfully pass the automatic verification during installation of a package. This carries the potential danger from malware penetrating the infected machine without detection of threats is not carried by the operating system. The frequency of detection of these vulnerabilities in mobile devices during the period 1 to 31 May 2014 shows the following diagram:

According to statistics, in 81 per cent. Android users settings allow the installation of applications from unknown sources, through which the device can penetrate potentially dangerous software, while in 19 per cent. users enabled debug mode is danger of leakage of all data stored on the device. The data also shows that nearly 4 percent. owners of mobile devices using the operating system with administrator rights (ie phones with root) – it also can infect a smartphone or tablet, and also significantly impedes the removal of malware.

Normal 0 21 false false false EN X-NONE X-NONE

No comments:

Post a Comment