SlideShare une entreprise Scribd logo
1  sur  17
The first mobile Malware
Name : Cabir/Caribe
Type : Computer Worm
1st Created : 2004
Platform : Mobile Phones
Fortunately, the Cabir worm was
considered to be less harmful
owing to its nature of simply
replicating itself and not carrying
out any serious damages.
With its contact effort of
replicating attempt as well as
scanning for Blooth enabled
devices, the battery life is often
shortened.
Rapid growth in Smartphone and tablet users has increased the
scope of malware threats
Reference: BusinessInsider.in
0
5
10
15
20
25
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
PC
Smartphone
Tablet
• Cabir
• First worm affecting symbian series2004
• Lkee and Duh
• Worms affecting jailbroken phones2009
• FakePlayer
• 1st Android to make money by sending SMS to premium numbers2010
• DroidDream
• First massive attack on Goggle Play.2011
• Zitmo
• Designed to steam banking mTANs2012
• Masterkey
• Designed to disguise as legitimate app2013
• DownAPK
• Fake banking app which gets connected through infected PC2014
Malware Threats
1. 79% of mobile market is owned by Android device
(Reference: Engadget.com)
2. Unlike Apple, Google Play (Android) doesn’t have walled
garden App store to prevent malware infections
3. Loosen Developer’s Agreement always any malware writer to
upload the their malicious app to Google Play
0
100000
200000
300000
400000
500000
600000
700000
2011-Nov
Dec
2012-Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
2013-Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Malware
Malware
1. Ramsonware
Restricts the system access of the user and asks for a ransom
to access the files.
2. Fake AV
Directs the User to the infected websites
3. Botney Activity
Controls the IRC channel & sends email spam's
4. Ginmaster
Steals the confidential information of the user
` from the Smartphone
Android Malware
Andr/Boxer-D
Andr/Opfake-C
Andr/Fakelns-B
Andr/MTK-C
Andr/Fakelns-D
Andr/SMSSend-J
Andr/Opfake-H
Andr/Spy-L
Andr/Wkload-A
Other
PUA doesn’t comes under the category of malware
however, they’re Potentially Unwanted Applications
which successful in Android Platform.
They too lead to security and other risks
PUAs
Android Airpush
Android Adwo
Android Dowgin
Android Kuguo
Android Apperhand
Android Multi Ads
Android Apperhand
Android LeadBolt
Android Mmarket
Other
0
100000
200000
300000
400000
500000
600000
700000
2011
- Nov
2012
- Jan
Mar May Jul Sep Nov 2013
- Jan
Mar May Jul Sep Nov 2014
- Jan
Malware
PUVs
Android 4.3 detached the feature of automatically
downloading the 3 party sources from Android Application
Packet.
Strict Developer’s Agreement
Identification and Restriction of Several App
Complexity of malware increasing for new victims
Danger for Personal Data
Additional security needed for financial organizations
1
2
3
Mobile Risk Awareness
Say no to accessing Company data via Wi-Fi
BYOD Policies
Prevention of Jailbreaking
Up-to-date OS
Device Encryption
Fitting mobile security policies
Install apps only from trusted sources
Anti-malware installation
Alternatives for cloud-sharing
Follow Us:
To Know more check our
Blog Post on Mobile Malware

Contenu connexe

Tendances

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578skowshik
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Instant messaging insight
Instant messaging insightInstant messaging insight
Instant messaging insightTomi Erzalani
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS securitySumanth Veera
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 

Tendances (20)

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
Smart phones
Smart phonesSmart phones
Smart phones
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Instant messaging insight
Instant messaging insightInstant messaging insight
Instant messaging insight
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile security
Mobile securityMobile security
Mobile security
 

En vedette

Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 RisksSantosh Satam
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 

En vedette (7)

Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 

Similaire à Top mobile security threats

Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012Itex Solutions
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Corporation
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Security Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentSecurity Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentLigia Adam
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmasTech and Law Center
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET Journal
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012Shivmohan Yadav
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 

Similaire à Top mobile security threats (20)

Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
HinDroid
HinDroidHinDroid
HinDroid
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Security Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentSecurity Issues in the Mobile Environment
Security Issues in the Mobile Environment
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 

Plus de RingtoIndia

How do i check credit history at ringtoindia android app
How do i  check credit history at ringtoindia android appHow do i  check credit history at ringtoindia android app
How do i check credit history at ringtoindia android appRingtoIndia
 
How do i add a favorite to ringtoindia android app
How do i add a favorite to ringtoindia android appHow do i add a favorite to ringtoindia android app
How do i add a favorite to ringtoindia android appRingtoIndia
 
How do i add a contact to ringtoindia android app
How do i add a contact to ringtoindia android appHow do i add a contact to ringtoindia android app
How do i add a contact to ringtoindia android appRingtoIndia
 
How to change login details of ringtoindia android app
How to change login details of ringtoindia android appHow to change login details of ringtoindia android app
How to change login details of ringtoindia android appRingtoIndia
 
How to make calls from ringtoindia android app
How to make calls from ringtoindia android appHow to make calls from ringtoindia android app
How to make calls from ringtoindia android appRingtoIndia
 
How to login to ringtoindia android app
How to login to ringtoindia android appHow to login to ringtoindia android app
How to login to ringtoindia android appRingtoIndia
 
Local access numbers from RingtoIndia
Local access numbers from RingtoIndiaLocal access numbers from RingtoIndia
Local access numbers from RingtoIndiaRingtoIndia
 
How to do Credit Transfer with RingtoIndia
How to do Credit Transfer with RingtoIndiaHow to do Credit Transfer with RingtoIndia
How to do Credit Transfer with RingtoIndiaRingtoIndia
 
Holiday Number Feature - How to activate account at RingtoIndia
Holiday Number Feature - How to activate account at RingtoIndiaHoliday Number Feature - How to activate account at RingtoIndia
Holiday Number Feature - How to activate account at RingtoIndiaRingtoIndia
 
Pin less dial feature - how to set up an account
Pin less dial feature - how to set up an accountPin less dial feature - how to set up an account
Pin less dial feature - how to set up an accountRingtoIndia
 
Direct Dial Feature
Direct Dial FeatureDirect Dial Feature
Direct Dial FeatureRingtoIndia
 
Vishu offer for India Call Rates
Vishu offer for India Call RatesVishu offer for India Call Rates
Vishu offer for India Call RatesRingtoIndia
 
50+ Features and its Benefits which comes with VoIP Service
50+ Features and its Benefits which comes with VoIP Service50+ Features and its Benefits which comes with VoIP Service
50+ Features and its Benefits which comes with VoIP ServiceRingtoIndia
 

Plus de RingtoIndia (13)

How do i check credit history at ringtoindia android app
How do i  check credit history at ringtoindia android appHow do i  check credit history at ringtoindia android app
How do i check credit history at ringtoindia android app
 
How do i add a favorite to ringtoindia android app
How do i add a favorite to ringtoindia android appHow do i add a favorite to ringtoindia android app
How do i add a favorite to ringtoindia android app
 
How do i add a contact to ringtoindia android app
How do i add a contact to ringtoindia android appHow do i add a contact to ringtoindia android app
How do i add a contact to ringtoindia android app
 
How to change login details of ringtoindia android app
How to change login details of ringtoindia android appHow to change login details of ringtoindia android app
How to change login details of ringtoindia android app
 
How to make calls from ringtoindia android app
How to make calls from ringtoindia android appHow to make calls from ringtoindia android app
How to make calls from ringtoindia android app
 
How to login to ringtoindia android app
How to login to ringtoindia android appHow to login to ringtoindia android app
How to login to ringtoindia android app
 
Local access numbers from RingtoIndia
Local access numbers from RingtoIndiaLocal access numbers from RingtoIndia
Local access numbers from RingtoIndia
 
How to do Credit Transfer with RingtoIndia
How to do Credit Transfer with RingtoIndiaHow to do Credit Transfer with RingtoIndia
How to do Credit Transfer with RingtoIndia
 
Holiday Number Feature - How to activate account at RingtoIndia
Holiday Number Feature - How to activate account at RingtoIndiaHoliday Number Feature - How to activate account at RingtoIndia
Holiday Number Feature - How to activate account at RingtoIndia
 
Pin less dial feature - how to set up an account
Pin less dial feature - how to set up an accountPin less dial feature - how to set up an account
Pin less dial feature - how to set up an account
 
Direct Dial Feature
Direct Dial FeatureDirect Dial Feature
Direct Dial Feature
 
Vishu offer for India Call Rates
Vishu offer for India Call RatesVishu offer for India Call Rates
Vishu offer for India Call Rates
 
50+ Features and its Benefits which comes with VoIP Service
50+ Features and its Benefits which comes with VoIP Service50+ Features and its Benefits which comes with VoIP Service
50+ Features and its Benefits which comes with VoIP Service
 

Dernier

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsChandrakantDivate1
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312wphillips114
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsChandrakantDivate1
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesChandrakantDivate1
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...nishasame66
 

Dernier (6)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 

Top mobile security threats