Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/5/2011
09:00 AM
Ed Hansberry
Ed Hansberry
Commentary
50%
50%

Android Malware On The Rise

The unvetted Android app marketplace is a major cause of the escalating attacks on the platform.

All platforms, mobile or otherwise, are subject to malware. The bigger platforms, though, are the juicer target for criminals simply because the numbers are larger. After all, why go after a platform with 1% share?

Windows is the top desktop platform and a target-rich environment for criminals. It doesn't necessarily mean the operating system is any less secure than the competition. It's just getting attacked in far greater quantities. Android is king of the hill when it comes to mobility and it may be suffering a bit of the same fate.

With Android, though, it isn't just about market share. It is also how apps are loaded on the platform. With a model like Apple has with iOS and Microsoft has with Windows Phone 7, it is very difficult to get apps on the device without the app going through an audit to ensure it: does what it claims; doesn't violate a set of rules designed to protect the device, network, and user data; and most of all, doesn't contain malware. No process is perfect and surely somewhere in the 300,000-plus apps in the App Store there is some code that was written to cause some sort of mischief, but should that happen, Apple will just flip the kill switch and remove the app from your phone.

Android doesn't have those protections. First of all, the Android Market doesn't subject apps to the scrutiny that Apple does, and that has caused more than one app in the Market to be a source of infection. Just two months ago Google removed 26 malicious apps.

Secondly, even if Google tightened its application approval process, you aren't forced to use the Android Market exclusively. If you want an app on your iPhone, you are locked into the App Store. (This ignores those that jailbreak their devices. I ignore that group of people when it comes to security because they are deliberately bypassing built-in security features, so they're on your own there.) With Android, you can choose from a variety of markets, none of which are approved by Google, so who knows what you risk when downloading from those?

According to Lookout Mobile Security, half a million Android users were affected by malware in the first six months of this year.

If you are an IT manager, this should give you pause. It is one more thing to worry about when deploying devices. Educate your users on downloading from trusted sources and consider the various antivirus products for Android. Having a phone that is infected is a hassle and can cause data loss; having it cause the loss or theft of corporate data can be catastrophic.

Google should step up here and at least provide a marketplace that is as tightly run as the App Store is. That would give users a lot of comfort that, when downloading from the main source of Android apps, there should be very little to worry about.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.