2. The first mobile Malware
Name : Cabir/Caribe
Type : Computer Worm
1st Created : 2004
Platform : Mobile Phones
3. Fortunately, the Cabir worm was
considered to be less harmful
owing to its nature of simply
replicating itself and not carrying
out any serious damages.
With its contact effort of
replicating attempt as well as
scanning for Blooth enabled
devices, the battery life is often
shortened.
4. Rapid growth in Smartphone and tablet users has increased the
scope of malware threats
Reference: BusinessInsider.in
0
5
10
15
20
25
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
PC
Smartphone
Tablet
5. • Cabir
• First worm affecting symbian series2004
• Lkee and Duh
• Worms affecting jailbroken phones2009
• FakePlayer
• 1st Android to make money by sending SMS to premium numbers2010
• DroidDream
• First massive attack on Goggle Play.2011
• Zitmo
• Designed to steam banking mTANs2012
• Masterkey
• Designed to disguise as legitimate app2013
• DownAPK
• Fake banking app which gets connected through infected PC2014
7. 1. 79% of mobile market is owned by Android device
(Reference: Engadget.com)
2. Unlike Apple, Google Play (Android) doesn’t have walled
garden App store to prevent malware infections
3. Loosen Developer’s Agreement always any malware writer to
upload the their malicious app to Google Play
9. 1. Ramsonware
Restricts the system access of the user and asks for a ransom
to access the files.
2. Fake AV
Directs the User to the infected websites
3. Botney Activity
Controls the IRC channel & sends email spam's
4. Ginmaster
Steals the confidential information of the user
` from the Smartphone
11. PUA doesn’t comes under the category of malware
however, they’re Potentially Unwanted Applications
which successful in Android Platform.
They too lead to security and other risks
14. Android 4.3 detached the feature of automatically
downloading the 3 party sources from Android Application
Packet.
Strict Developer’s Agreement
Identification and Restriction of Several App
15. Complexity of malware increasing for new victims
Danger for Personal Data
Additional security needed for financial organizations
1
2
3
16. Mobile Risk Awareness
Say no to accessing Company data via Wi-Fi
BYOD Policies
Prevention of Jailbreaking
Up-to-date OS
Device Encryption
Fitting mobile security policies
Install apps only from trusted sources
Anti-malware installation
Alternatives for cloud-sharing