Mobile Threat Trends: Ransomware, Tor, and Pornography Apps

Status
Not open for further replies.

SillyBilly299

Level 17
Thread author
Verified
Top Poster
Well-known
Apr 26, 2015
815
We're getting close to the end of the year, and annual reports are about to flood your news feeds. One of the first to come out is from Blue Coat, and it presents the top threat trends and infection sources for mobile devices.

While in 2014 the prime source of infection were mobile ads with a "market share" of 19.69%, in 2015, pornography apps and websites have managed to account for 36.13% of all infected mobile users.

This number is much greater than the 2013 value of 22.16%, when pornography websites also topped the list as the main source of infections on mobile devices.

Blue Coat says that, most of the time, infections come via malvertising attacks, and via websites that distribute pornography apps that bundle hidden trojans in their code.

Ransomware is becoming a big problem on mobile devices
While the trend of using adult content to appeal to users is not something new, having previously wreaked havoc on desktop PCs for years, during 2015, Blue Coat has additionally noted an uptick in mobile ransomware.

In previous years, mobile ransomware was not quite such a problem, mainly due to the simple and unsophisticated level at which ransomware infections manifested themselves.

Most of them were quite easy to bypass and remove, but in recent months, after many years of hits&misses, coupled with advances in Android OS capabilities, today's world of mobile ransomware is as dangerous as the one you see on regular computers.

In recent months, security vendors and antivirus companies have started observing mobile ransomware with file encrypting capabilities, C&C server connections, rootkit-like persistence capabilities, and harder to remove lockscreens.

Using Tor to mask ransom demands
Put ransomware, pornography, and the Tor network together, and you have mobile threats as dangerous and as hard to track and remove as on desktops.

"Creators of mobile ransomware are also taking advantage of the Tor anonymity network to obscure the real destination of the ransom payment. It’s not uncommon to see “.onion” addresses used in ransom demands," say Blue Coat researchers. "Victims have very little time to get up to speed on the intricacies of Tor before the deadline to pay clicks away and their precious files are lost forever."

You can get Blue Coat's report from their website. A quick summary can be viewed in the infographic below.

2015 mobile threat landscape
 

Exterminator

Community Manager
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
If you would like to take a look at a good report about the ever increasing trend of Mobile malware threats including ransomware and some suggestions on avoiding these threats you can download the Security Report "BLUE COAT SYSTEMS 2015 MOBILE MALWARE REPORT" here Blue Coat
You must enter and email,name,country & state to get the report
The broad acceptance of BYOD in the workplace has long produced anxiety that the mobile platform is the next great exploit opportunity for hackers. In addition, organizations are
rapidly adopting cloud-based, mobile versions of enterprise applications such as Salesforce.com, potentially opening up another avenue for attackers. The recent actions by Apple to
pull several products from its App Store over concerns they could comprise users’ personal and sensitive information highlights yet another potential risk.
A look back at the majority of the year 2015 shows those worries are not unfounded, although not necessarily in the way initially predicted. While 2015 did not show a sharp rise in the volume of malware, what is alarming is the increasingly insidious and malicious nature of the types of malware and attacks. From the increasing instances of ransomware –essentially cyber blackmail – to the stealthy insertion of spyware on devices that allow cyber criminals to profile
behavior and manipulate sales, these are just some of the examples that seem to be the favored exploits of today’s mobile platform.
This report describes the latest trends and vulnerabilities in mobile malware, provides advice for strengthening corporate defenses and educating mobile device users, and offers predictions about the future of mobile threats.

Here is my link to the downloaded report MEGA
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top