Vulnerabilities / Threats
5/14/2013
02:48 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

F-Secure: Android Malware Ecosystem Resembling Windows

F-Secure Labs’ latest Mobile Threat Report records a list of firsts for Android malware, including the first non-app-related distribution, while the overall number of threats continue to rise

SAN JOSE, Calif. – May 14, 2013: The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs' latest Mobile Threat Report, Q1 saw the first Android threat distribution outside of apps via email spam, the first targeted Android attacks, and the first Android advanced fee fraud scam. Additionally, examples of increased commoditization of Android malware surfaced.

The number of new mobile threat families and variants continued to rise by 49% from the previous quarter, from 100 to 149. 136, or 91.3 percent of these were Android and 13, or 8.7 percent Symbian. Q1 2013 numbers are more than double that of a year ago in Q1 2012, when 61 new families and variants were discovered.

The new Android techniques are a cause for concern, said Sean Sullivan, Security Advisor at F-Secure Labs. "I'll put it this way: Until now, I haven't worried about my mother with her Android because she's not into apps. Now I have reason to worry because with cases like Stels, Android malware is also being distributed via spam, and my mother checks her email from her phone."

The Android trojan known as Stels began distributing via fake U.S. Internal Revenue Service-themed emails, using an Android crimeware kit to steal sensitive information from the device, and monetizing by making calls to premium numbers. This example of mobile malware commoditization "could be a game changer," according to Sullivan.

Q1 also saw the first targeted attacks in the mobile space. Tibetan human rights activists were targeted with emails that contained an Android-malware-infected attachment, and a so-called "coupon app" for a popular coffee chain steals information from phones with South Korean country codes.

Mobile is being targeted in India, as the discovery of the first Android advanced fee fraud proved. A fake "job offer" Android app in India informs that the user is being considered for a position at TATA Group, an Indian multinational company. To arrange the interview, the app asks for a refundable security deposit.

For more details on the latest mobile threats, including adware, commoditization via Perkele, and more, see the complete Mobile Threat Report Q1 2013 at http://www.f-secure.com/en/web/labs_global/whitepapers/reports.

F-Secure provides the best protection in the world for Android smartphones and tablets, effectively protecting devices from all common threats. Get F-Secure Mobile Security free for 30 days at www.f-secure.com or Google Play: http://play.google.com/store/apps/details?id=com.fsecure.ms.dc.

F-Secure Labs focuses on counting the numbers of families and variants of malware rather than the number of unique samples. To attempt to avoid detection of their malware, cybercriminals use automation that makes slight changes to malware code – resulting in new malware samples, while still being the same malware family or variant. Counting families and variants rather than samples provides a more realistic measurement of threats.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?