01:14 PM

Android Malware Continues To Surge

Mobile threats increased six-fold between 2010 and 2011, says Kapersky Lab, as security experts at RSA debate whether Android or iPhone is more secure against malware attacks.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Mobile malware developers have been busy, as the quantity of malicious threats that target mobile devices increased more than six-fold between 2010 and 2011.

That's one finding from new research released this week by anti-virus software maker Kaspersky Lab, which reported that the number of distinct mobile malware families more than doubled from 2010 to 2011. Whereas 153 new mobile malware families appeared in 2010, and were collectively modified more than 1,000 times, "over the course of 2011, we recorded 5,255 new modifications of mobile threats and 178 new families," said Kaspersky Lab senior malware analyst Denis Maslennikov, in a blog post.

In other words, the amount of mobile malware continues to increase dramatically. "In December 2011 alone we uncovered more new malicious programs targeting mobile devices than over the entire 2004 to 2010 period," he said.

In 2011, 65% of new malicious mobile applications targeted the Android platform, compared with Java 2 Platform, Micro Edition, a.k.a. J2ME (27%), as well as Symbian (7%), and Windows Mobile (1%). Overall, one-third of malicious apps targeting Android were designed to steal personal data--such as contacts, call logs, text messages, and photos--from the device. Almost an equal number of malware apps were designed to take control of a user's device.

[ How big of a problem is smartphone security, really? Read Android Security Becomes FUD Fest. ]

Interestingly, from 2008 through 2010, the majority of Trojan applications designed to launch SMS attacks against mobile devices targeted J2ME devices. But in 2011, most SMS Trojans targeted Android.

Why is Android being singled out now by attackers? For starters, Android--unlike Apple iOS--is an open operating system, meaning there are few barriers to understanding exactly how it works.

Furthermore, various research firms estimate that Android now controls anywhere between 46% and 51% of the mobile operating system market, according to Harry Sverdlove, CTO of Bit9. "So it's not surprising that most malware is targeting that," he said in an interview at the RSA conference in San Francisco this week.

Although Android is undeniably popular, one security issue is that many smartphone manufacturers and cell phone carriers infrequently update customers' Android devices. As a result, many Android smartphones sport known vulnerabilities that could be exploited by attackers.

"For some reason in the Android world, because the phone manufacturers and carriers want in on the pot, we've been trained to think that the manufacturers and carriers are responsible for updating our software," said Sverdlove. "Whereas in the PC world, no one expects the PC seller to update the operating system."

The Android updating situation--as well as for J2ME, Symbian, and Windows Mobile--contrasts with Apple iOS. Notably, Apple alone pushes iOS updates, and they can be immediately applied to currently supported devices, provided users synchronize their device with iTunes and agree to install the update. (Newer iOS devices also can receive updates over the air.)

Of course, iOS isn't immune to application vulnerabilities. "There's a question of what platforms are more or less secure," said Kevin Mahaffey, CTO of Lookout Mobile Security, speaking at RSA. "Android and iPhones have a similar level of security baked into them, it just turns out that iPhone has been less targeted." For example, he said, researchers at CounterStrike demonstrated a WebKit vulnerability at RSA this week that uses a weaponized vulnerability in WebKit to track GPS data and record phone conversations. WebKit, however, is used in both Android and iOS operating systems, as well as browsers for traditional operating systems.

Not everyone, however, agrees with Mahaffey's assessment that mobile operating systems offer similar security levels. "I'd argue that iOS is at least a little more secure," said Roel Schouwenberg, a senior anti-virus researcher at Kaspersky Lab, at the RSA conference.

But he said that all mobile operating systems needed to see security improvements, such as more rigorous checks and transparent processes surrounding the detection of malware, as well as overall mobile application security. "Right now, you need to just trust Apple or Google that everything is fine," he said.

InformationWeek is conducting a survey on information security and risk management. Upon completion of our survey, you will be eligible to enter a drawing to receive an 64-GB Apple iPad 2. Take our Alternative Strategic Security Survey now. Survey ends March 9.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
3/4/2012 | 4:25:46 PM
re: Android Malware Continues To Surge
@ readers: are security concerns affecting your decision to buy (or for your business to support) a particular smartphone?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.