Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

7/18/2017
02:19 PM
0%
100%

Apple iOS Malware Growth Outpaces that of Android

Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

iPhones and other devices running Apple's iOS have seen a jump in malicious apps attacking them while Android malware infections have remained largely stable, according to a report released today by mobile security company Skycure.

Enterprise iOS devices scanned by Skycure found 0.65% had "high-severity" malicious apps running on them in the first quarter, up from 0.21% in the third quarter last year, according to Skycure's Mobile Threat Intelligence report. Android, however, remained flat during this time period, Skycure noted.

"iOS is used on one of the more popular devices and that is where hackers are focusing and that is where the money is. A more affluent community tends to use the iPhone," says Varun Kohli, Skycure's vice president of marketing. An increase in sophistication of iOS exploits is also a contributor too, Kohli notes.

Source: Skycure

iOS vulnerabilities, meanwhile, have surged dramatically this year, reaching 192 exploitable flaws – far exceeding the 161 vulnerabilities discovered during all of 2016, the report notes. And iOS vulnerabilities are expected to hit 643 this year, a four-fold increase over the previous year, Skycure projects. Android, in comparison, is expected to post a slight dip to 500 from 523.

The report is based on results found from mobile devices Skycure scans from its enterprise customers and also consumers who download its free app. Symantec will soon be able to leverage this capability, given the industry titan recently revealed plans to snap up Skycure.

iOS users overwhelmingly are attentive in updating their software compared to Android users. Nearly 91.4% of iOS users have migrated to iOS 10, compared to the roughly 20.8% of Android users running Android 7, according to the report.

But the proactive OS updates are not preventing the rise in malware and other problems for iOS users.

"Even if it is more patched than Android, malware is only part of the problem," Kohli says. He pointed to three other threats mobile devices face, including physical loss of the device, WiFi network attacks, and vulnerability exploits.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

 

Some of the threats Skycure has run across that exploit iOS include the XcodeGhost campaign via the App Store, AceDeceiver malicious app that uses an Apple-approved certificate, and the Yispecter campaign that uses an app loaded from a third-party app store.

Related Content:

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
nirmalkant
50%
50%
nirmalkant,
User Rank: Apprentice
8/21/2017 | 1:41:48 PM
RE
This result is shocking because what I have read about frequent attacks on both platforms are that iOS is much more safer than Andrdod as mentioned in this security blog...www.gotowebsecurity.com/enterprise-android-vs-ios-secure/. But the stats here is really a matter of concern because the number of Apple users are increasing very rapidly. 
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5102
PUBLISHED: 2019-11-18
An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by per...
CVE-2019-5688
PUBLISHED: 2019-11-18
NVIDIA NVFlash, NVUFlash Tool prior to v5.588.0 and GPUModeSwitch Tool prior to 2019-11, NVIDIA kernel mode driver (nvflash.sys, nvflsh32.sys, and nvflsh64.sys) contains a vulnerability in which authenticated users with administrative privileges can gain access to device memory and registers of othe...
CVE-2011-5330
PUBLISHED: 2019-11-18
Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls.
CVE-2011-5331
PUBLISHED: 2019-11-18
Distributed Ruby (aka DRuby) 1.8 mishandles instance_eval.
CVE-2019-5101
PUBLISHED: 2019-11-18
An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by per...