The Rise of Mobile Malware
The first smartphone came out in 2007 with the advent of the iPhone. Thirteen years later, 78% of the world’s population had one in hand. Now global smartphone shipments are projected to clear $1.43 billion. The rise of mobile phone usage has been astronomical - as have the threats that follow.
Why Target Smartphones?
Mobile malware is on the rise, and you can’t blame bad actors for going after low-hanging fruit. Researchers noted a staggering 500% increase in mobile malware attempts in the first half of this year alone. Beware people from “Microsoft” calling you out of the blue, never “authenticate” anything unless you’ve initiated it, and if you’re already logged into Twitter, clicking on a link shouldn’t make you “log-in” again.?
Bad actors count on our phone-induced autopilot to get us into trouble, and it does. And, they’re not only after our data. “The main aim of a substantial proportion of mobile malware is to steal usernames and passwords for email or bank accounts, but many forms of mobile malware are also equipped with invasive snooping capabilities,” reads a recent article in ZDNet. These include the ability to “record audio and video, track your location, or even wipe your content and data.”
Mobile Malware Attacks
So, knowing that our phones are prime bait for hackers, what should we be on the lookout for?
Phishing, smishing and vishing?
Phishing attempts aren’t just for your inbox (which we all have on our phone anyway). Those alluring links come via Messenger, SMS text messaging (“smishing”), or even on a voicemail (vishing).
SMS-based trojans?
A number of low-key apps were recently outed for offering users prizes that included an SMS trojan download once they entered their phone number - to collect the prize, of course. Other exploits intercepted text messages filtered for words like “pay”, “bank,” and “balance”. Be careful not to send sensitive information without requiring authentication - and some basic security.
Non-secure WIFI
We all want to save on data, but the bad guys have that figured. Think twice before happily jumping on to “Starbuck_FreeWifi” and consider your surroundings. Or, download a mobile VPN.
领英推荐
Suspicious URLs
Malware doesn’t even require you to enter information on a fake site anymore - just clicking on it can send out crawlers that steal your logins on all your most sensitive mobile apps (including fitness, banking, and trading apps).
Third-party apps?
Android users are a bit more susceptible here because of the openness of Android marketplace - the fact that you can download from third-party app stores makes the whole exchange more of a risk.
?Also, some operating systems are more targeted than others. Accessibility Service has been Android's Achilles' heel in recent years, allowing threat actors to leverage the legitimate API to serve unsuspecting users with fake overlay screens and capture sensitive information. The openness of Android OS can cut both ways as malware finds a way to abuse legitimate (and useful) features, and the restrictions we’ve seen put in place still don’t entirely solve the problem. It’s an uphill battle, so if you’re going to opt for some of these more flexible environments, just make sure to up your defense.
Mitigating Mobile Malware
Here are a few tips for staying safe while still making full use of your mobile device - no matter what operating system you’re on.?
Now you may be thinking, but what about my employees? They’re the ones walking around with hand-held liabilities. Companies like KnowBe4 offer security awareness training for mobile devices, ensuring you and your team make the transition safely and confidently. OneLogin is another great tool for one-click access to all your cloud and enterprise applications, protecting users on-the-go. And Umbrella for mobile defends against threats at the DNS layer, so even if someone stumbles into a phishing campaign and clicks a bad link, internet-based threats are detected and mitigated at the source.?
If you’re going to have mobile workers, you need a full mobile security suite. Port53, is dedicated to finding you the right security tools for work in a post-perimeter world, and that includes mobile business. We know mobile malware is rampant, tools are myriad, and there are a million ways to go wrong.
We pride ourselves in making the complex simple and letting you know where you stand with our cybersecurity maturity assessment, then helping you get to where you want to be. And, we’re with you every step of the way. Find out all the different ways Port53 secures your mobile workforce.
Independent Information Services Professional
2 年Make complex understandable Good info