Connect with us

Hi, what are you looking for?

HEADLINES

More than half a million Android users compromised by financial malware

Be cautious when conducting financial transactions with your Android device. Malicious programs targeting Android-based devices in order to steal their owners’ money were used in 60% of attacks.

Be cautious when conducting financial transactions with your Android device. Malicious programs targeting Android-based devices in order to steal their owners’ money were used in 60% of attacks registered by Kaspersky Lab security products, according to the results of the “Mobile CyberThreats” survey carried out by Kaspersky Lab and INTERPOL between August 2013 and July 2014.

The fraudsters mostly targeted users in Russia, but Ukraine, Spain, the UK, Vietnam, Malaysia, Germany, India and France also faced attacks.

In absolute terms, there were more than 588,000 Android users worldwide who faced financial malware (Trojan-SMS and Trojan-Banker) during the reporting period. That is six times greater than the number from the equivalent period 12 months earlier.

KL&INTERPOL_mobile-cyber-threatsOverall, 57.08% of all reported incidents involved attacks utilizing programs from the Trojan SMS malware family. These are designed to send messages to short premium-rate numbers without the owner’s knowledge.

Russia was on the receiving end of the greatest number of Trojan SMS attacks with 64.42% of all Kaspersky Lab anti-virus detections registered on devices of users from this country. About a quarter of Trojan-SMS attacks were detected in Kazakhstan (5.71%), Ukraine (3.32%), Spain (3.19%), the UK (3.02%), Vietnam (2.41%), Malaysia (2.3%), Germany (2%), India (1.55%) and France (1.32%).

Advertisement. Scroll to continue reading.

Another 1.98% of attacks used Trojan-Banker malware which, when combined with Trojan-SMS functionality, can steal bank card data as well as usernames and passwords for online banking services.

Russia is on top of this chart as well with 90.58% of all Trojan-Banker detections registered on the territory of the Russian Federation.

The rest of the top 10 all had a relatively small level of attacks and included Kazakhstan, Ukraine, Belarus, USA, Lithuania, Azerbaijan, Bulgaria, Germany and Uzbekistan.

Although during the reporting period, Kaspersky Lab products registered relatively few attacks using mobile banking Trojans, the company’s experts found the number of mobile malware modifications grew sharply – from 423 in August 2013 to 5,967 in July 2014, a 14-fold increase.

Modifications are a version of a malicious program that is slightly altered from the original piece of malware.

Advertisement. Scroll to continue reading.

This small change can make the malware less noticeable to antivirus solutions. The high level of modification growth found during this study shows that cybercriminals were creating multiple variations of their malware in attempts to go undetected by antivirus solutions and infect as many devices as possible. Typically, antivirus companies will create a new signature within the software to defend against this type of tactic.

“A successful Trojan-Banker infection can give a fraudster access to all of the victim’s money, while a Trojan-SMS needs to infect dozens or even hundreds of devices to show a worthwhile profit. In addition, not all owners currently use mobile online banking applications. That’s why there is such a difference in the number of Trojan-SMS and Trojan-Banker attacks registered by our products”, said Roman Unuchek, senior virus analyst at Kaspersky Lab.

“During the past few years, we have witnessed the rise of mobile cyber threats which have become more complex and intelligent enough to target specific entities. With the mobile market growing exponentially, it is clearer that these threats are mutating to include new attack vectors allowing the exploitation of personal smart devices”, said Madan Oberoi, Director of Cyber Innovation & Outreach at INTERPOL’s Global Complex for Innovation.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

This recognition underscores Kaspersky's commitment to providing robust security solutions tailored for industrial environments.

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

Advertisement