01:14 PM
Connect Directly

Android Malware Continues To Surge

Mobile threats increased six-fold between 2010 and 2011, says Kapersky Lab, as security experts at RSA debate whether Android or iPhone is more secure against malware attacks.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Mobile malware developers have been busy, as the quantity of malicious threats that target mobile devices increased more than six-fold between 2010 and 2011.

That's one finding from new research released this week by anti-virus software maker Kaspersky Lab, which reported that the number of distinct mobile malware families more than doubled from 2010 to 2011. Whereas 153 new mobile malware families appeared in 2010, and were collectively modified more than 1,000 times, "over the course of 2011, we recorded 5,255 new modifications of mobile threats and 178 new families," said Kaspersky Lab senior malware analyst Denis Maslennikov, in a blog post.

In other words, the amount of mobile malware continues to increase dramatically. "In December 2011 alone we uncovered more new malicious programs targeting mobile devices than over the entire 2004 to 2010 period," he said.

In 2011, 65% of new malicious mobile applications targeted the Android platform, compared with Java 2 Platform, Micro Edition, a.k.a. J2ME (27%), as well as Symbian (7%), and Windows Mobile (1%). Overall, one-third of malicious apps targeting Android were designed to steal personal data--such as contacts, call logs, text messages, and photos--from the device. Almost an equal number of malware apps were designed to take control of a user's device.

[ How big of a problem is smartphone security, really? Read Android Security Becomes FUD Fest. ]

Interestingly, from 2008 through 2010, the majority of Trojan applications designed to launch SMS attacks against mobile devices targeted J2ME devices. But in 2011, most SMS Trojans targeted Android.

Why is Android being singled out now by attackers? For starters, Android--unlike Apple iOS--is an open operating system, meaning there are few barriers to understanding exactly how it works.

Furthermore, various research firms estimate that Android now controls anywhere between 46% and 51% of the mobile operating system market, according to Harry Sverdlove, CTO of Bit9. "So it's not surprising that most malware is targeting that," he said in an interview at the RSA conference in San Francisco this week.

Although Android is undeniably popular, one security issue is that many smartphone manufacturers and cell phone carriers infrequently update customers' Android devices. As a result, many Android smartphones sport known vulnerabilities that could be exploited by attackers.

"For some reason in the Android world, because the phone manufacturers and carriers want in on the pot, we've been trained to think that the manufacturers and carriers are responsible for updating our software," said Sverdlove. "Whereas in the PC world, no one expects the PC seller to update the operating system."

The Android updating situation--as well as for J2ME, Symbian, and Windows Mobile--contrasts with Apple iOS. Notably, Apple alone pushes iOS updates, and they can be immediately applied to currently supported devices, provided users synchronize their device with iTunes and agree to install the update. (Newer iOS devices also can receive updates over the air.)

Of course, iOS isn't immune to application vulnerabilities. "There's a question of what platforms are more or less secure," said Kevin Mahaffey, CTO of Lookout Mobile Security, speaking at RSA. "Android and iPhones have a similar level of security baked into them, it just turns out that iPhone has been less targeted." For example, he said, researchers at CounterStrike demonstrated a WebKit vulnerability at RSA this week that uses a weaponized vulnerability in WebKit to track GPS data and record phone conversations. WebKit, however, is used in both Android and iOS operating systems, as well as browsers for traditional operating systems.

Not everyone, however, agrees with Mahaffey's assessment that mobile operating systems offer similar security levels. "I'd argue that iOS is at least a little more secure," said Roel Schouwenberg, a senior anti-virus researcher at Kaspersky Lab, at the RSA conference.

But he said that all mobile operating systems needed to see security improvements, such as more rigorous checks and transparent processes surrounding the detection of malware, as well as overall mobile application security. "Right now, you need to just trust Apple or Google that everything is fine," he said.

InformationWeek is conducting a survey on information security and risk management. Upon completion of our survey, you will be eligible to enter a drawing to receive an 64-GB Apple iPad 2. Take our Alternative Strategic Security Survey now. Survey ends March 9.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
3/4/2012 | 4:25:46 PM
re: Android Malware Continues To Surge
@ readers: are security concerns affecting your decision to buy (or for your business to support) a particular smartphone?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.