Mobile
1/18/2017
09:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Mobile Security Gap Threatens Enterprises

Rush to release, rapid growth in mobile malware is exacerbating the problem, two reports show.

Concerns over the security of the emerging Internet of Things (IoT) have garnered a lot of attention following the massive Mirai botnet-enabled DDoS attacks on Dyn and other major Internet companies late last year. But for many organizations, an equally pressing concern continues to be mobile security.

Two separate surveys released this week show that the growing ubiquity of mobile devices, their increasing sophistication, and the Bring Your Own Device (BYOD) phenomenon continue to cause big problems for organizations across the board.

A Ponemon Institute study - conducted on behalf of IBM Security and Arxan Technologies surveyed 600 IT and IT security practitioners - found that 84% of them are very concerned about malware threats to their mobile applications, compared to 66% who said the same about their IoT application environment.

A sobering 60%, or six out of 10 of the respondents, say their organization had been breached as the result of an insecure mobile application over the past 12 months. The survey showed that less than 30% of mobile applications are tested for vulnerabilities. Some 44% confessed to taking no measures to protect their mobile environment.

Despite the heightened awareness of risk, many organizations appear to lack a sense of urgency in addressing mobile security issues. In fact, a mere 32% of the survey respondents describe their organizations as urgently wanting to secure the mobile application environment.

The second report, from Trend Micro, is based on data collected in 2016 from monitoring systems on the networks of its customers, as well as data from third-party sources.

Trend Micro noted a sharp increase in the number of unique Android malware samples targeted at mobile users—from 10.7 million samples in 2015 to more than 19.2 million in December 2016.

On a global basis, exploits and rooting malware proved to be the biggest security scourge for mobile devices users. But for users in the US, Trend Micro’s analysis showed it was unwanted and potentially harmful applications such as adware and spyware that posed the biggest problems.

In keeping with broader trends, ransomware emerged as a major security threat for mobile device users in 2016. Ransomware families such as SLocker, FLocker, SMSLocker, and Koler contributed to a near doubling in ransomware samples detected by Trend Micro in 2016 compared to a year ago. Other major threats included mobile banking Trojans and an increase in malware such as Dirty COW, Drammer and Quadrooter, which are capable of gaining root access on mobile devices.

Unlike in 2015 when many of the disclosed vulnerabilities were related to Android’s media server process, 2016 witnessed an increase in kernel vulnerabilities, especially in products from Qualcomm, MediaTech, and Nvidia, the Trend Micro report noted.

The Ponemon report showed that as in previous years, many security problems in the mobile domain continue to result from a rush to release software, and a tendency to favor user convenience over safety.

Mandeep Khera, chief marketing officer at Arxan, says one of the biggest takeaways from this year’s survey is that organizations appear to be waiting for either a big visible hack or a regulation to happen before investing in mobile protection.

"This is a huge mistake," Khera says. "One hack could set an organization back dramatically in terms of financial losses, brand damage, recovery costs, and even drop in stock price."

The biggest surprise in the survey was that a vast majority of the respondents believe that they are likely to get hacked, yet most of them are not doing much to protect themselves, he says.

"Although the top-tier companies are doing a much better job of protecting themselves against mobile threats, most of the companies are falling behind," as the number of mobile apps have proliferated. Khera says. "Hackers are finding mobile apps a great place to attack and these apps in the wild have binary code that's vulnerable and unprotected."

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rubenscardos0
50%
50%
rubenscardos0,
User Rank: Apprentice
8/9/2017 | 5:24:26 PM
Re: Don't click on any link or website shared on groups
Hey Andre!

Whatsapp and Facebook Messenger now are infected by virus and people clicking on suspicious links. This is much dangerous!

And I agree with you when you said we dont think twice to click on a link sent by our friends. But like those old emails, we need to think about or we going to enter on website that we dont know. 
bricesap5
100%
0%
bricesap5,
User Rank: Apprentice
2/6/2017 | 10:23:51 AM
Technlogy and Amazon, Google, Groupon,...
That's true that influence of technology is very high and it getting higher and higher with all the virtual assistants from Google, Amazon, Groupon and the others
andrejones
50%
50%
andrejones,
User Rank: Apprentice
2/6/2017 | 7:33:41 AM
Don't click on any link or website shared on groups
Most of my friends who had their mobile phones infected by viruses clicked on suspicious links sent by one of their contacts. Obviously, if the link comes from a trusted person, you won't think twice before you click on it, but this is very dangerous.

Always double check if that person really had the intention to send that message.
annmariya
50%
50%
annmariya,
User Rank: Apprentice
1/18/2017 | 11:01:07 PM
Take Care
The influence of technology is very high in our daily life. Along with good impact it also provide some bad threats in our life. The chances of malware attact are very high and must take care while using. 
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Impact of a Security Breach 2017
The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.