• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Consumer   »   The New Mobile Threat Landscape, circa 2017 to 2018

The New Mobile Threat Landscape, circa 2017 to 2018

  • Posted on:April 26, 2018
  • Posted in:Consumer, Mobile Security, Ransomware, Security
  • Posted by:
    Trend Micro
0
Is your phone infected?

Submitted by Ian Grutze

If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines.

Banking Trojans, now more obfuscated, can now phish credentials from their banks of interest in real time. Adware, which used to be just a nuisance at most, is now stealing data beyond just user browsing habits. Targeted attacks also became more noticeable, shedding light on how mobile devices were used in cyberespionage-related campaigns that go as far back as 2011. But the learning curve these days does not appear to be as steep: Cybercriminals weaponized proof-of-concept exploits and repurposed publicly released source code into different versions of themselves, with varying capabilities.

Mobile threats are also joining the cryptocurrency mining bandwagon—a sign of things to come in the platform’s threat landscape. They’re no longer just afterthoughts like they apparently were during the advent of Bitcoin, Litecoin, and Monero. Cybercriminals are now using a myriad of ways to rehash grayware, steal the device’s resources, zombify them, and ultimately make unwitting victims a part of the problem. Mining malware affects performance, increases wear and tear, and bears a hidden cost: increased power consumption for your device.

More conspicuously, cybercriminals found more ways to elude detection and persist within an affected device by further obscuring their malicious routines and hiding behind legitimate services (or posing as one). As smartphones add features and become more connected with other devices, the wider their security gaps become and the impact of a single design flaw or vulnerability is magnified.

In our 2017 Mobile Threat Landscape Report, introduced here, we delve into 2017’s most notable threats to see what lies ahead in the mobile landscapes—and what users and organizations can do to navigate it in 2018 and beyond. Read our report to inform and arm yourself against mobile threats.

As always, mobile device users are encouraged to use Trend Micro Mobile Security on their Android and iOS devices, to protect both your apps and you on the websites you visit from ransomware, banking trojans, cryptocurrency mining malware, and other mobile threats. Go to Trend Micro Mobile Security Solutions to try our mobile security products today.

Related posts:

  1. A Look Back at the 2018 Security Landscape
  2. How mobile threats impact today’s BYOD landscape
  3. 2017’s Biggest Threats and What CISOs Can do to Mitigate Risks in 2018
  4. Takeaways from the 2016 Threat Landscape

Security Intelligence Blog

  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes
  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.