Vulnerabilities / Threats
5/14/2013
02:48 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

F-Secure: Android Malware Ecosystem Resembling Windows

F-Secure Labs’ latest Mobile Threat Report records a list of firsts for Android malware, including the first non-app-related distribution, while the overall number of threats continue to rise

SAN JOSE, Calif. – May 14, 2013: The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs' latest Mobile Threat Report, Q1 saw the first Android threat distribution outside of apps via email spam, the first targeted Android attacks, and the first Android advanced fee fraud scam. Additionally, examples of increased commoditization of Android malware surfaced.

The number of new mobile threat families and variants continued to rise by 49% from the previous quarter, from 100 to 149. 136, or 91.3 percent of these were Android and 13, or 8.7 percent Symbian. Q1 2013 numbers are more than double that of a year ago in Q1 2012, when 61 new families and variants were discovered.

The new Android techniques are a cause for concern, said Sean Sullivan, Security Advisor at F-Secure Labs. "I'll put it this way: Until now, I haven't worried about my mother with her Android because she's not into apps. Now I have reason to worry because with cases like Stels, Android malware is also being distributed via spam, and my mother checks her email from her phone."

The Android trojan known as Stels began distributing via fake U.S. Internal Revenue Service-themed emails, using an Android crimeware kit to steal sensitive information from the device, and monetizing by making calls to premium numbers. This example of mobile malware commoditization "could be a game changer," according to Sullivan.

Q1 also saw the first targeted attacks in the mobile space. Tibetan human rights activists were targeted with emails that contained an Android-malware-infected attachment, and a so-called "coupon app" for a popular coffee chain steals information from phones with South Korean country codes.

Mobile is being targeted in India, as the discovery of the first Android advanced fee fraud proved. A fake "job offer" Android app in India informs that the user is being considered for a position at TATA Group, an Indian multinational company. To arrange the interview, the app asks for a refundable security deposit.

For more details on the latest mobile threats, including adware, commoditization via Perkele, and more, see the complete Mobile Threat Report Q1 2013 at http://www.f-secure.com/en/web/labs_global/whitepapers/reports.

F-Secure provides the best protection in the world for Android smartphones and tablets, effectively protecting devices from all common threats. Get F-Secure Mobile Security free for 30 days at www.f-secure.com or Google Play: http://play.google.com/store/apps/details?id=com.fsecure.ms.dc.

F-Secure Labs focuses on counting the numbers of families and variants of malware rather than the number of unique samples. To attempt to avoid detection of their malware, cybercriminals use automation that makes slight changes to malware code – resulting in new malware samples, while still being the same malware family or variant. Counting families and variants rather than samples provides a more realistic measurement of threats.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.