• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Mobile   »   Mobile Security Roundup 1H 2014

Mobile Security Roundup 1H 2014

  • Posted on:August 27, 2014 at 8:48 am
  • Posted in:Mobile, Vulnerabilities
  • Author:
    Ryan Certeza (Technical Communications)
0

The first half of this year has been quite eventful for the mobile threat landscape. Sure, we had an idea the state of affairs from 2013 would continue on to this year, but we didn’t know just to what extent. From ballooning mobile malware/high risk app numbers to vulnerabilities upon vulnerabilities, let’s recap just what happened in the past six months and see if we can learn anything from them for the six months ahead.

So, what did happen in the first half of 2014? Well, to summarize:

  • 2 million and counting: After only six months of reaching 1 million, the combined amount of mobile malware/high risk apps has doubled, to 2 million. That’s a growth of 170,000 apps PER month.
  • The first coin mining mobile malware: ANDROIDOS_KAGECOIN, a malicious app that turned any infected mobile device into a Bitcoin/Dogecoin/Litecoin miner was discovered in March.
  • The first mobile ransomware: ANDROIDOS_LOCKER locked phones by way of obstructing screens with a large UI window. It was discovered in May.
  • Deep Web: Cybercriminals also began to use TOR in their malicious apps, to cover their trails.
  • Operation Emmental: last July we successfully uncovered a cybercriminal operation that countered online banking’s 2-factor authentication. We dubbed this after the famous cheese Emmental.

A handful of major vulnerabilities were also discovered during this half of 2014, ranging from the Android Custom Permission vulnerability to the iOS Goto Fail vulnerability. Platform-agnostic vulnerability Heartbleed also made the news, affecting not just desktops but basically any platform that could connect to the web and load HTTP:// websites.

Hugely-popular events were also taken advantage of by cybercriminals through social engineering – the 2014 FIFA World Cup, for example, heralded the coming of fake game apps sporting the event’s name, with each one sporting malicious routines. Flappy Bird, the addictive game that had the entire mobile gaming scene taking attention, also garnered its own share of malicious clones.

That’s the first half of 2014 in a nutshell, with the most noteworthy events encapsulated. Can we learn anything from them in time to prepare for the next six months? Yes, of course – one lesson we can easily derive here is that we can always expect cybercriminals to take advantage of legitimate services that help make our lives more convenient online – and sometimes, they use it in ways we’ll never expect them to. So we need to look at new services coming out and, after seeing if they CAN be used maliciously, prepare for that inevitability. It helps to be prepared, after all.

Another lesson for the second half of 2014 is that people need to take mobile threats much more seriously. It’s no longer just a passing fad or something we can just forget about – it’s here, it’s happening, and like social engineering it’s going to be a part of our lives until the next breakthrough in technology comes along. Users, business owners, professionals need to protect themselves from becoming a victim – and all it takes are some best practices and a security solution.

For more information regarding the mobile threat landscape and how it fared in the first half of 2014, we’d like to point readers towards the latest issue of our Monthly Mobile Report, titled The Mobile Landscape Roundup: 1H 2014. You’ll see the events summarized above, but in more detail, along with other news events and definitely a lot more stats.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: androidbitcoinemmentalHeartbleedMobilemobile securityvulnerability

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.