G DATA MOBILE MALWARE REPORT

Similar documents
G DATA MOBILE MALWARE REPORT

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

MOBILE MALWARE REPORT

G DATA Mobile Malware Report

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

PROTECTING YOUR ASSETS.

Cyber Essentials Scheme

The Mobile Malware Problem

Installation Instructions

The Need for BYOD Mobile Device Security Awareness and Training

Dealing with the unsupported Windows XP

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Enterprise Mobility Report 08/2015. Creation date: Vlastimil Turzík

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

Android Architecture. Alexandra Harrison & Jake Saxton

Emerging Trends in Malware - Antivirus and Beyond

Five steps to improve your network s health

Henry Ford Health System Citrix Access Gateway Support Details

Network Security Report:

Studying Security Weaknesses of Android System

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

SA Series SSL VPN Virtual Appliances

10 best practice suggestions for common smartphone threats

St Mark s Church School (Version 2) Bring Your Own Device Policy

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET

PQ v3.0. Voice over Wi-Fi. Datasheet

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

PULSE SECURE FOR GOOGLE ANDROID

THE TOP 5 WAYS TODAY S SCHOOLS CAN UPGRADE CYBER SECURITY. Public School Cyber Security is Broken; Here s How to Fix It

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

ANDRA ZAHARIA MARCOM MANAGER

Defensible Strategy To. Cyber Incident Response

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Kaspersky Security 10 for Mobile Implementation Guide

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Avira Antivirus Security. HowTo

Cyber Essentials KAMI VANIEA 2

01. Introduction of Android

TLP WHITE. Denial of service attacks: what you need to know

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

How To Get A Cloud Service For A Small Business

MALWARE REPORT HALF-YEAR-REPORT JANUARY JUNE 2015 G DATA SECURITYLABS

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Business white paper. HP Business Helpdesk. System requirements and supported products

White Paper. Three Steps To Mitigate Mobile Security Risks

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

of firms with remote users say Web-borne attacks impacted company financials.

Security of Mobile Platforms, BYOD and MDM for the Solution of their Administration. November 22 nd 2012, Marek Deml

The Hidden Dangers of Public WiFi

Evolution of Smartphones And Android Operating System

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

WEB ATTACKS AND COUNTERMEASURES

All-in-one coverage for your business

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

PC/Tablet/Smartphone Security & Password Managers

Wireless Network Best Practices for General User

Fiber-Optic Networks: Is Safety Just an Optical Illusion?

Beyond the Hype: Advanced Persistent Threats

Practical guide for secure Christmas shopping. Navid

CEH Version8 Course Outline

What you need to know to keep your computer safe on the Internet

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Cyber Security: Beginners Guide to Firewalls

Simplifying the Challenges of Mobile Device Security

SECURING TODAY S MOBILE WORKFORCE

How to prevent computer viruses in 10 steps

Spyware: Securing gateway and endpoint against data theft

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

The All-in-One Support Solution. Easy & Secure. Secure Advisor

How to Successfully Roll Out an Android BYOD Program

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

COMPARATIVE STUDY OF VARIOUS CELLULAR PHONE OS IN CURRENT WORLD

Henry Ford Health System Remote Access Support Details

Enterprise Mobile Threat Report

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Using Tofino to control the spread of Stuxnet Malware

Guideline on Safe BYOD Management

INSTANT MESSAGING SECURITY

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

BOYD- Empowering Users, Not Weakening Security

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

If you can't beat them - secure them

Transcription:

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q3/2015 1

CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: almost 6,400 new Android malware instances every day 04-04 What are hacking tools? 05-05 Over 80 percent of Android users have an out-of-date operating system 06-07 2

AT A GLANCE The global market share of mobile devices using Android as an operating system was almost 67 percent in the third quarter of 2015. This represents an increase of no less than three percent compared to the second quarter. In Germany, around 68 percent of users were using a mobile device with an Android operating system. This percentage has remained the same. 1 Malware figures for Android devices in the third quarter of 2015 remained at a high level. During the third quarter, G DATA security experts identified 574,706 new malware samples. The figures were at a similarly high level in the second quarter (560,671). The number of new Android malware instances increased by 50 percent compared to the same period in the previous year (Q3/2014: 383,122). View for 2015 as a whole: up to the third quarter, G DATA security experts have already analysed some 1.6 million new Android malware samples. Over 80 percent of Android devices have an outdated operating system in use. Only 20 percent of the smartphones or tablets are using a current version of Android. Often the rollout of security fixes by the manufacturer takes a long time. Known vulnerabilities are be fixed in a timely manner. FORECASTS AND TRENDS ANDROID AS A GATEWAY TO THE INTERNET OF THINGS People and companies are turning to the Internet of Things. From fitness apps to vehicles, more and more devices are being networked together and can be linked to a smartphone or tablet. Such applications and the Android operating system are becoming more and more popular among cyber criminals, as they can offer a route for attack. 2 One well-known example of this is attacking a heating control system via a smartphone. 3 SMARTPHONES WITH PRE-INSTALLED MALWARE Following the latest results in the Mobile Malware Report for the second quarter of 2015, G DATA experts are continuing to look into this subject. More and more smartphones and tablets are afflicted with manipulated firmware. New results on this are expected in the coming months. 1 Statcounter: http://gs.statcounter.com/ 2 G DATA Security Evangelist Eddy Willems has published his opinion of the current situation on the Internet of Things in the G DATA SecurityBlog: https://blog.gdata.de/artikel/the-internet-of-things-trouble/ 3 http://www.heise.de/security/meldung/vaillant-heizungen-mit-sicherheits-leck-1840919.html COMPLEX MALWARE FOR ONLINE BANKING ATTACKS G DATA security experts expect to see an increase in complex malware that combines Windows and Android attack campaigns on online banking customers. Numerous customers have the option to receive TAN numbers by mobile phone as a secure two-way authentication process. Criminals can use this method to manipulate online banking transactions on the PC and simultaneously steal the accompanying authentication via the mobile device. 3

CURRENT SITUATION: ALMOST 6,400 NEW ANDROID MALWARE INSTANCES EVERY DAY During the third quarter of 2015, G DATA security experts analysed 574,706 new malware instances. The volume of new malware has continued to be at a high level and has increased compared to the second quarter of 2015 (560,671). This represents an increase of 50 percent compared to the same period in the previous year. On average, the experts discovered almost 6,400 new Android malware files every day in Q3/2015. Up to the end of the third quarter of 2015, G DATA experts had discovered over 1.5 million new Android malware samples this year. This means that the analysts have already discovered more malware programs than in the whole of 2014. Significantly more than two million new Android malware samples for 2015 as a whole is looking more and more likely. 4 4 The retrospective figures in this report are higher than in previously published reports. In some cases, G DATA receives collections of files with a large number of new malware files collected over an extended period of time and these sometimes contain older files, which are then assigned to the respective month. 4

WHAT ARE HACKING TOOLS? Hacking tools are not found in the Google Play store, but rather in third party markets, which also hide the risk of a malware infection. To use those apps, users must enable installation from unknown sources in the settings of their mobile device. IT experts use hacking tools to check out networks and computers for vulnerabilities and to prevent successful attacks on networks and devices. However, these apps can also be used to screen third-party mobile devices for potential security holes, infiltrate a WLAN network or monitor data traffic. As such, applications can pose a risk for users and G DATA security experts classify hacking tools as malware. Such applications can also have criminal law consequences. In the last report, the security experts described monitoring apps that monitor mobile devices. In Europe and the US recently investigating authorities brought a campaign against purchasers of the DroidJack monitoring software. This tool can be used, for example, to steal data such as TAN numbers, send SMS messages, locate the smartphone or eavesdrop on telephone calls. 5 For some time now, the WhatsApp sniffer 6 has been one of the most popular hacking tools for monitoring other people's WhatsApp chats. The application does this by exploiting a security hole in the popular messaging tool. Those who have the app can spy on conversations and data in any chats in real time. To do so, the devices must simply be logged in to a shared network. A public wireless network at an airport or in a hotel offers a neverending source of opportunity for stealing sensitive data for owners of the monitoring app. Screenshots 5 http://www.infosecurity-magazine.com/news/police-crack-down-droidjack/ 6 https://blog.gdatasoftware.com/blog/article/using-whatsapp-in-wifi-makes-conversations-public.html Note: The G DATA security experts have decided not to offer a current example of a hacking tool so as not to advertise them WHATSAPP SNIFFER: READING OTHER PEOPLE'S CHATS also show how easy it is to eavesdrop on chats. WhatsApp has now closed the security hole. However, this sniffer is still a very good example of hacking tools and the opportunities that exist for using them. 5

OVER 80 PERCENT OF ANDROID USERS HAVE AN OUT-OF-DATE OPERATING SYSTEM In October 2015, G DATA security experts examined which Android versions are being used on smartphones and tablets with G DATA security solutions installed. The current Android 6 operating system is missing, as the new version was released this October. Only about 20 percent of users have installed an up-to-date operating system (Android 5.0 or higher). Over 80 percent use an outdated operating system that contains known security holes. And almost 12 percent are still using Froyo and Gingerbread, versions that are around five years old. The FBI 7 issued warnings about using Gingerbread over two years ago. Since then, even more security holes have been published, such as Stagefright 8, which affects a wide range of Android versions. In October 2015 only about 20 percent of Android users use an at this time current Android version. ANDROID VERSION DISTRIBUTION (IN PERCENT) Lollipop 20.74% Android 5.1 6.63% Android 5.0 14.11% Kitkat 20.29% Android 4.4 20.29% Jelly Bean 36.93% Android 4.3 6.35% Android 4.2 12.75% Android 4.1 17.83% Ice Cream Sandwich 10.66% Android 4.0 10.66% Honeycomb 0.4% Android 3.2 0.4% Gingerbread 9.18% Android 2.3.3-2.3.7 9.18% Froyo 1.29% Android 2.2 1.29% Other 0.51% 7 https://publicintelligence.net/dhs-fbi-android-threats/ 8 https://blog.gdata.de/artikel/sicherheitsluecke-in-android-medien-engine-stagefright/ Android users frequently wait a long time before updating their operating system. When Google publishes an update for the Android operating system, it normally takes weeks or months for providers of mobile devices to modify the versions for their products and make them available to their customers. With older smartphones and tablets, it is often unclear whether the providers have even closed security holes yet. Frequently even the most popular devices are only provided with support in terms of necessary updates for one or two years. Hence some providers have started to launch monthly update programs for products with an Android operating system. For example, Samsung has launched a mobile security blog where customers can see what updates are available for their device. In doing so the Korean provider has been guided by Microsoft Patchdays, whose 6

software is fully updated on every second Tuesday of the month. However, unfortunately only a few devices from the last two years are currently receiving these security patches. 9 Other providers are also planning to offer a similar service in the coming months in order to keep customers better informed and create greater awareness of security updates for mobile devices. 9 http://security.samsungmobile.com/ ABOUT G DATA G DATA Software AG is the antivirus pioneer. Founded in Bochum in 1985, the company developed the first antivirus program 30 years ago. Today, G DATA belongs to the leading providers of internet security solutions and virus protection, with over 400 employees worldwide. G DATA products set the benchmark worldwide: In the comparison tests of AV-Test, which are carried out twice a year, G DATA has repeatedly achieved the best virus detection of all products. "Stiftung Warentest" has compared IT security solutions eight times in total, starting in 2005. In every single one of these tests, G DATA INTERNET SECURITY demonstrated the best virus detection. The European Community project IPACSO named G DATA the most innovative IT security company of Europe in 2014 and lauded the quick response time to new threats. G DATA security solutions protect millions of PCs worldwide and are available in over 90 countries for private users as well as for SMB and large corporations, and as a Managed Service for enterprise customers through the numerous G DATA partners. That is security "Made in Germany". Copyright 05/2015 G DATA Software AG. All rights reserved. This document must not be copied or reproduced, in full or in part, without written permission from G DATA Software AG Germany. Microsoft, Windows, Outlook and Exchange Server are registered trademarks of The Microsoft Corporation. All other trademarks and brand names are the property of their respective owners and must therefore be treated as such. 7