Vulnerabilities / Threats
5/14/2013
02:48 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

F-Secure: Android Malware Ecosystem Resembling Windows

F-Secure Labs’ latest Mobile Threat Report records a list of firsts for Android malware, including the first non-app-related distribution, while the overall number of threats continue to rise

SAN JOSE, Calif. – May 14, 2013: The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs' latest Mobile Threat Report, Q1 saw the first Android threat distribution outside of apps via email spam, the first targeted Android attacks, and the first Android advanced fee fraud scam. Additionally, examples of increased commoditization of Android malware surfaced.

The number of new mobile threat families and variants continued to rise by 49% from the previous quarter, from 100 to 149. 136, or 91.3 percent of these were Android and 13, or 8.7 percent Symbian. Q1 2013 numbers are more than double that of a year ago in Q1 2012, when 61 new families and variants were discovered.

The new Android techniques are a cause for concern, said Sean Sullivan, Security Advisor at F-Secure Labs. "I'll put it this way: Until now, I haven't worried about my mother with her Android because she's not into apps. Now I have reason to worry because with cases like Stels, Android malware is also being distributed via spam, and my mother checks her email from her phone."

The Android trojan known as Stels began distributing via fake U.S. Internal Revenue Service-themed emails, using an Android crimeware kit to steal sensitive information from the device, and monetizing by making calls to premium numbers. This example of mobile malware commoditization "could be a game changer," according to Sullivan.

Q1 also saw the first targeted attacks in the mobile space. Tibetan human rights activists were targeted with emails that contained an Android-malware-infected attachment, and a so-called "coupon app" for a popular coffee chain steals information from phones with South Korean country codes.

Mobile is being targeted in India, as the discovery of the first Android advanced fee fraud proved. A fake "job offer" Android app in India informs that the user is being considered for a position at TATA Group, an Indian multinational company. To arrange the interview, the app asks for a refundable security deposit.

For more details on the latest mobile threats, including adware, commoditization via Perkele, and more, see the complete Mobile Threat Report Q1 2013 at http://www.f-secure.com/en/web/labs_global/whitepapers/reports.

F-Secure provides the best protection in the world for Android smartphones and tablets, effectively protecting devices from all common threats. Get F-Secure Mobile Security free for 30 days at www.f-secure.com or Google Play: http://play.google.com/store/apps/details?id=com.fsecure.ms.dc.

F-Secure Labs focuses on counting the numbers of families and variants of malware rather than the number of unique samples. To attempt to avoid detection of their malware, cybercriminals use automation that makes slight changes to malware code – resulting in new malware samples, while still being the same malware family or variant. Counting families and variants rather than samples provides a more realistic measurement of threats.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.