SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
G DATA MOBILE MALWARE REPORT
1
WhitepaperMobileMalwareReportUS07-2015•1816010915
G DATA
MOBILE MALWARE REPORT
THREAT REPORT: Q2/2015
G DATA MOBILE MALWARE REPORT
2
WhitepaperMobileMalwareReportUS07-2015•1816010915
At a glance  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  · 03-03
Forecasts and trends  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  · 03-03
Current situation: 6,100 new Android malware instances every day  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  · 04-04
Monitoring apps on mobile devices ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  · 05-05
Pre-installed malware on smartphones  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  ·  · 06-07
	
CONTENTS
G DATA MOBILE MALWARE REPORT
3
WhitepaperMobileMalwareReportUS07-2015•1816010915
AT A GLANCE
¡¡ The global market share of Android smartphones and
tablets was almost 64 percent in the second quarter
of 2015. This represents an increase of three percent
compared to the first quarter. In the USA around 48
percent of users use a mobile device with an Android
operating system.1
¡¡ Rapid increase in absolute malware figures for Android
devices: During the second quarter of 2015, G DATA
security experts analysed 560,671 new malware
samples. This is an increase of 27 percent compared to
the first quarter of 2015.
¡¡ New record: In the half-yearly comparison, the one
million mark for new Android malware samples within
a six-month period was surpassed for the first time
since the Mobile Malware Report has been published.
In the first half of 2015, G DATA experts discovered
1,000,938 new malware files. Compared to the second
half of 2014, that is an increase of 25 percent.
¡¡ Apps that conceal functions and monitor users are
blocked in G DATA security solutions. But according to
which criteria are they evaluated? The experts explain
their method using the example of an app with hidden
monitoring functions.
¡¡ Last year, the Star N9500 smartphone with built-in
spyware functions caused an uproar. G DATA security
experts have discovered evidence on well over 26
devices that indicates similar functions. The experts
suspect middlemen are behind this, who have
changed the firmware so that they can potentially steal
user data and make money through advertising.
1
Statcounter: http://gs.statcounter.com/
FORECASTS AND TRENDS
OVER TWO MILLION NEW ANDROID
MALWARE SAMPLES IN 2015
The G DATA security experts expect well over two million
new malware sample for the Android operating system
for 2015 as a whole – a new record. This means that the
number of new malware samples will have doubled
within two years.
QUALITY OF ANDROID MALWARE RISES
The IT company Hacking Team programs high quality
malware for intelligence services and governments.
After a cyber attack on the company, corporate data
and source code for an Android malware sample were
published. G DATA security experts expect cyber
criminals to exploit this easily accessible knowledge base
and publish large numbers of more mature Android
malware.
G DATA MOBILE MALWARE REPORT
4
WhitepaperMobileMalwareReportUS07-2015•1816010915
CURRENT SITUATION:
6,100 NEW ANDROID MALWARE INSTANCES EVERY DAY
The number of new Android
malware instances has grown
enormously again, as the forecast
from the first quarter has confirmed.
During the second quarter of 2015,
G DATA security experts analysed
560,671 new malware samples.
This represents an increase of
over 27 percent compared to the
first quarter of 2015 (Q1/2015). On
average the experts discovered
over 6,100 new Android malware
instances per day in Q2/2015 –
almost 1,200 per day more than in
Q1/2015. The analysts identify a new
malware sample every 14 seconds
on average.
The enormous increase in new
Android malware samples in the
first six months of 2015 represents
a new record. For the first time,
G DATA security experts discovered
over a million new Android malware
instances in a six month period. The
analysts are expecting significantly
more than two million new Android
malware samples for 2015 as a
whole.
The retrospective figures in this report are higher than in previously published reports. In some
cases, G DATA receives collections of files with a large number of new malware files collected over
an extended period of time and these sometimes contain older files, which are then assigned to
the respective month.
G DATA MOBILE MALWARE REPORT
5
WhitepaperMobileMalwareReportUS07-2015•1816010915
MONITORING APPS ON MOBILE DEVICES
In the Mobile Malware Report for
the first quarter of 2015, G DATA
security experts demonstrated
the significance of the adware
threat on Android mobile devices.
Besides adware, a large number of
other apps are categorized as PUP
(Potentially Unwanted Programs).
In this report we look at the area of
monitoring. These programs are not
malware in the traditional sense.
Rather, another individual uses them
to secretly monitor the smartphone
owner and collect the data. For
example, parents can monitor their
children and see who the child is
contacting or where they are right
now. There a numerous usage
options.
Monitoring malware hides itself.
Permissions can only be reviewed
during the installation or if the
user finds the app. However, even
legitimate apps often request
permissions that go beyond the
actual activity of the application.
Hence it is not always obvious to
users that there is an app with
monitoring functions on their
smartphone. For this reason, G DATA
security experts categorise such
programs as PUPs. G DATA security
solutions detect the applications.
DISGUISED GOOGLE DRIVE
APP WITH MONITORING
FUNCTION
Android.Monitor.Gsyn.B is an app
categorised as a monitor that
pretends to be the Google Drive app.
Users assume that they have the
original Google Drive app as the icon
and the app identifier are similar
to the original program. However,
in this case the app contains just
monitoring functions.
According to providers, the
disguised app can steal a wide
range of data and execute functions
without the user knowing:
¡¡ Listening in to telephone
conversations
¡¡ Viewing and copy contacts
¡¡ Asking for location data
¡¡ Taking and copying images
¡¡ Recording conversations using the
microphone
¡¡ Sending and reading SMS/MMS
¡¡ Disabling AV software and other
apps
¡¡ Listening in to chats via messaging
services (WhatsApp, Skype, Viber,
Facebook, Google+, etc.)
¡¡ Reading the browser history
G DATA MOBILE MALWARE REPORT
6
WhitepaperMobileMalwareReportUS07-2015•1816010915
PRE-INSTALLED MALWARE ON SMARTPHONES
Since the discovery of pre-installed
malware on a smartphone in spring
2014, G DATA security experts have
found more and more models on
which the presence of malware in
the firmware can be proven. But
where does the malware come
from and who is installing it? The
G DATA security experts are certain
that the manufacturers are not the
perpetrators in the majority of cases.
Renowned companies will not risk
their reputation by distributing
malware in the firmware.
The G DATA experts therefore
suspect middlemen of being the
perpetrators. In addition to the
revenue gained from selling on the
mobile device, they try to make
additional financial gains from stolen
user data and enforced advertising.
HOW IS THE MALWARE
HIDDEN?
In the analysed cases, the malware
is usually hidden in a legitimate app
which is manipulated to contain
malware as an add-on. The malware
hides alongside the usual functions
in the app. Users do not notice these
add-on functions as the majority of
the processes run in the background.
EXAMPLE: MANIPULATED
FACEBOOK APP
A common method is to manipulate
a legitimate, popular app such as
the Facebook app. All of the usual
Facebook functions are available
in the manipulated version. Users
do not notice the surreptitious
access, but the range of functions is
expanded by the attached malware,
enabling third parties to access the
entire device without asking for
the user's consent. The permissions
have already been approved by the
owner prior to commissioning the
device. Hence the user only notices
the malicious app when he installs
a security solution such as G DATA
INTERNET SECURITY FOR ANDROID.
As soon as the security software
has been installed, it immediately
sounds an alarm. In this example, the
G DATA security solution identifies
the malware as Android.Trojan.
Andup.D. Uninstalling is often not
possible as the app is one of the
fixed installation applications in
the firmware. The G DATA security
experts advise afflicted users to
contact the vendor of the mobile
device.
The secret add-on functions are
wide-ranging. In this example, the
app can access the Internet, read and
send SMS, subsequently install apps,
see, store and amend call data and
data about the smartphone, access
the contact list, obtain location
data and monitor app updates.
These permissions enable extensive
misuse: location detection, listening
to and recording telephone calls or
conversations, making purchases,
bank fraud or sending premium
SMS. The possibilities are almost
endless.
In almost every variant that the
G DATA security experts have
analysed, the app has been poorly
programmed and harbours an
enormous security risk. Sensitive
data are largely sent unencrypted
or with a hardcoded key that can be
G DATA MOBILE MALWARE REPORT
7
WhitepaperMobileMalwareReportUS07-2015•1816010915
easily decrypted. Thus, even other
attackers can steal data or take
control of the malware.
In addition, none of the examined
samples checks in advance whether
it exchanges data with the correct
server. In this case Man-in-the-
middle-attacks could be easily
implemented.
INFECTED MODELS
(EXCERPT)
Xiaomi MI3
Huawei G510
Lenovo S860
Alps A24
Alps 809T
Alps H9001
Alps 2206
Alps PrimuxZeta
Alps N3
Alps ZP100
Alps 709
Alps GQ2002
Alps N9389
Andorid P8
ConCorde SmartPhone6500
DJC touchtalk
ITOUCH
NoName S806i
SESONN N9500
SESONN P8
Xido X1111
© Copyright 2015 G DATA Software AG. All rights reserved. This document must not be copied or reproduced, in full or in part,
without written permission from G DATA Software AG Germany.
Microsoft, Windows, Outlook and Exchange Server are registered trademarks of The Microsoft Corporation.
All other trademarks and brand names are the property of their respective owners and must therefore be treated as such.
The app can access the Internet, read and send SMS, subsequently install apps, see, store and amend call data and data about the
smartphone, access the contact list, obtain location data and monitor app updates.
The experts were able to prove
the presence of a manipulated
pre-installed app on three mobile
devices in factory condition. Besides
the Star N9500, which has been
under investigation since 2014, the
Star N8000 and IceFox Razor are
involved as well.
Through feedback from G DATA
INTERNET SECURITY FOR ANDROID,
support calls and results from other
security researchers, the experts
have identified further instances
in which evidence of pre-installed
malware on the devices is suspected.
In these cases, G DATA security
experts suspect that middlemen are
behind the manipulation of single
devices, like models from Huawei
or Lenovo. The experts believe that
there is a much higher undetected
number.
WHICH DEVICES ARE INVOLVED?

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Veracode
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
World best web apps security and Active detection of malicious link
World best web apps  security and  Active detection of malicious linkWorld best web apps  security and  Active detection of malicious link
World best web apps security and Active detection of malicious link임채호 박사님
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Andrey Apuhtin
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreVeracode
 
Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Reham Maher El-Safarini
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 ReportRonen Mendezitsky
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 
Hiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad HashesHiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad HashesTripwire
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 

Was ist angesagt? (19)

Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
World best web apps security and Active detection of malicious link
World best web apps  security and  Active detection of malicious linkWorld best web apps  security and  Active detection of malicious link
World best web apps security and Active detection of malicious link
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 Report
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Hiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad HashesHiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad Hashes
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 

Andere mochten auch

5-6 Parallel Perpendicular-DESMOS.pdf
5-6 Parallel Perpendicular-DESMOS.pdf5-6 Parallel Perpendicular-DESMOS.pdf
5-6 Parallel Perpendicular-DESMOS.pdfLomasAlg1
 
Ppd search slideshare september 2
Ppd search slideshare september  2Ppd search slideshare september  2
Ppd search slideshare september 2Emma O'Connell
 
Embudo de Marketing
Embudo de MarketingEmbudo de Marketing
Embudo de MarketingRamiro Lara
 
WF_in_retail_banking_enterprise_systems
WF_in_retail_banking_enterprise_systemsWF_in_retail_banking_enterprise_systems
WF_in_retail_banking_enterprise_systemsOleh Zheleznyak
 
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...Birgit van der Wiel
 
MÚsica Popular Urbana: anys 70, Reggae i Punk
MÚsica Popular Urbana: anys 70, Reggae i PunkMÚsica Popular Urbana: anys 70, Reggae i Punk
MÚsica Popular Urbana: anys 70, Reggae i PunkVirginia Gomez
 
Rongowhakaata Claims Settlement Act 2012
Rongowhakaata Claims Settlement Act 2012Rongowhakaata Claims Settlement Act 2012
Rongowhakaata Claims Settlement Act 2012Gina Chamberlain
 
Proyecto de vida
Proyecto de vidaProyecto de vida
Proyecto de vidaJAVIERPI
 
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?Burt Thompson
 
詹姆士看天下 2017/01/23
詹姆士看天下 2017/01/23詹姆士看天下 2017/01/23
詹姆士看天下 2017/01/23ezfunds
 

Andere mochten auch (12)

5-6 Parallel Perpendicular-DESMOS.pdf
5-6 Parallel Perpendicular-DESMOS.pdf5-6 Parallel Perpendicular-DESMOS.pdf
5-6 Parallel Perpendicular-DESMOS.pdf
 
Ppd search slideshare september 2
Ppd search slideshare september  2Ppd search slideshare september  2
Ppd search slideshare september 2
 
Embudo de Marketing
Embudo de MarketingEmbudo de Marketing
Embudo de Marketing
 
WF_in_retail_banking_enterprise_systems
WF_in_retail_banking_enterprise_systemsWF_in_retail_banking_enterprise_systems
WF_in_retail_banking_enterprise_systems
 
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...
Universitaire Lerarenopleiding Tilburg / Lerarenopleiding Filosofie, Nederlan...
 
MÚsica Popular Urbana: anys 70, Reggae i Punk
MÚsica Popular Urbana: anys 70, Reggae i PunkMÚsica Popular Urbana: anys 70, Reggae i Punk
MÚsica Popular Urbana: anys 70, Reggae i Punk
 
Rongowhakaata Claims Settlement Act 2012
Rongowhakaata Claims Settlement Act 2012Rongowhakaata Claims Settlement Act 2012
Rongowhakaata Claims Settlement Act 2012
 
ORQUIDEAS
ORQUIDEASORQUIDEAS
ORQUIDEAS
 
Proyecto de vida
Proyecto de vidaProyecto de vida
Proyecto de vida
 
Editing 2
Editing 2Editing 2
Editing 2
 
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?
NATION BUIDLING - A BAD IDEA WHO'S TIME HAS COME?
 
詹姆士看天下 2017/01/23
詹姆士看天下 2017/01/23詹姆士看天下 2017/01/23
詹姆士看天下 2017/01/23
 

Ähnlich wie G data mobile_mwr_q2_2015_us

Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAnatoliy Tkachev
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishDaniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Humming bad research-report-final-62916
Humming bad research-report-final-62916Humming bad research-report-final-62916
Humming bad research-report-final-62916Andrey Apuhtin
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Securityryanfarmer
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Corporation
 

Ähnlich wie G data mobile_mwr_q2_2015_us (20)

Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Humming bad research-report-final-62916
Humming bad research-report-final-62916Humming bad research-report-final-62916
Humming bad research-report-final-62916
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
 

Kürzlich hochgeladen

Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...SUHANI PANDEY
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 

Kürzlich hochgeladen (20)

Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

G data mobile_mwr_q2_2015_us

  • 1. G DATA MOBILE MALWARE REPORT 1 WhitepaperMobileMalwareReportUS07-2015•1816010915 G DATA MOBILE MALWARE REPORT THREAT REPORT: Q2/2015
  • 2. G DATA MOBILE MALWARE REPORT 2 WhitepaperMobileMalwareReportUS07-2015•1816010915 At a glance · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · 03-03 Forecasts and trends · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · 03-03 Current situation: 6,100 new Android malware instances every day · · · · · · · · · · · · · · · · · · 04-04 Monitoring apps on mobile devices · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · 05-05 Pre-installed malware on smartphones · · · · · · · · · · · · · · · · · · · · · · · · · · · · · 06-07 CONTENTS
  • 3. G DATA MOBILE MALWARE REPORT 3 WhitepaperMobileMalwareReportUS07-2015•1816010915 AT A GLANCE ¡¡ The global market share of Android smartphones and tablets was almost 64 percent in the second quarter of 2015. This represents an increase of three percent compared to the first quarter. In the USA around 48 percent of users use a mobile device with an Android operating system.1 ¡¡ Rapid increase in absolute malware figures for Android devices: During the second quarter of 2015, G DATA security experts analysed 560,671 new malware samples. This is an increase of 27 percent compared to the first quarter of 2015. ¡¡ New record: In the half-yearly comparison, the one million mark for new Android malware samples within a six-month period was surpassed for the first time since the Mobile Malware Report has been published. In the first half of 2015, G DATA experts discovered 1,000,938 new malware files. Compared to the second half of 2014, that is an increase of 25 percent. ¡¡ Apps that conceal functions and monitor users are blocked in G DATA security solutions. But according to which criteria are they evaluated? The experts explain their method using the example of an app with hidden monitoring functions. ¡¡ Last year, the Star N9500 smartphone with built-in spyware functions caused an uproar. G DATA security experts have discovered evidence on well over 26 devices that indicates similar functions. The experts suspect middlemen are behind this, who have changed the firmware so that they can potentially steal user data and make money through advertising. 1 Statcounter: http://gs.statcounter.com/ FORECASTS AND TRENDS OVER TWO MILLION NEW ANDROID MALWARE SAMPLES IN 2015 The G DATA security experts expect well over two million new malware sample for the Android operating system for 2015 as a whole – a new record. This means that the number of new malware samples will have doubled within two years. QUALITY OF ANDROID MALWARE RISES The IT company Hacking Team programs high quality malware for intelligence services and governments. After a cyber attack on the company, corporate data and source code for an Android malware sample were published. G DATA security experts expect cyber criminals to exploit this easily accessible knowledge base and publish large numbers of more mature Android malware.
  • 4. G DATA MOBILE MALWARE REPORT 4 WhitepaperMobileMalwareReportUS07-2015•1816010915 CURRENT SITUATION: 6,100 NEW ANDROID MALWARE INSTANCES EVERY DAY The number of new Android malware instances has grown enormously again, as the forecast from the first quarter has confirmed. During the second quarter of 2015, G DATA security experts analysed 560,671 new malware samples. This represents an increase of over 27 percent compared to the first quarter of 2015 (Q1/2015). On average the experts discovered over 6,100 new Android malware instances per day in Q2/2015 – almost 1,200 per day more than in Q1/2015. The analysts identify a new malware sample every 14 seconds on average. The enormous increase in new Android malware samples in the first six months of 2015 represents a new record. For the first time, G DATA security experts discovered over a million new Android malware instances in a six month period. The analysts are expecting significantly more than two million new Android malware samples for 2015 as a whole. The retrospective figures in this report are higher than in previously published reports. In some cases, G DATA receives collections of files with a large number of new malware files collected over an extended period of time and these sometimes contain older files, which are then assigned to the respective month.
  • 5. G DATA MOBILE MALWARE REPORT 5 WhitepaperMobileMalwareReportUS07-2015•1816010915 MONITORING APPS ON MOBILE DEVICES In the Mobile Malware Report for the first quarter of 2015, G DATA security experts demonstrated the significance of the adware threat on Android mobile devices. Besides adware, a large number of other apps are categorized as PUP (Potentially Unwanted Programs). In this report we look at the area of monitoring. These programs are not malware in the traditional sense. Rather, another individual uses them to secretly monitor the smartphone owner and collect the data. For example, parents can monitor their children and see who the child is contacting or where they are right now. There a numerous usage options. Monitoring malware hides itself. Permissions can only be reviewed during the installation or if the user finds the app. However, even legitimate apps often request permissions that go beyond the actual activity of the application. Hence it is not always obvious to users that there is an app with monitoring functions on their smartphone. For this reason, G DATA security experts categorise such programs as PUPs. G DATA security solutions detect the applications. DISGUISED GOOGLE DRIVE APP WITH MONITORING FUNCTION Android.Monitor.Gsyn.B is an app categorised as a monitor that pretends to be the Google Drive app. Users assume that they have the original Google Drive app as the icon and the app identifier are similar to the original program. However, in this case the app contains just monitoring functions. According to providers, the disguised app can steal a wide range of data and execute functions without the user knowing: ¡¡ Listening in to telephone conversations ¡¡ Viewing and copy contacts ¡¡ Asking for location data ¡¡ Taking and copying images ¡¡ Recording conversations using the microphone ¡¡ Sending and reading SMS/MMS ¡¡ Disabling AV software and other apps ¡¡ Listening in to chats via messaging services (WhatsApp, Skype, Viber, Facebook, Google+, etc.) ¡¡ Reading the browser history
  • 6. G DATA MOBILE MALWARE REPORT 6 WhitepaperMobileMalwareReportUS07-2015•1816010915 PRE-INSTALLED MALWARE ON SMARTPHONES Since the discovery of pre-installed malware on a smartphone in spring 2014, G DATA security experts have found more and more models on which the presence of malware in the firmware can be proven. But where does the malware come from and who is installing it? The G DATA security experts are certain that the manufacturers are not the perpetrators in the majority of cases. Renowned companies will not risk their reputation by distributing malware in the firmware. The G DATA experts therefore suspect middlemen of being the perpetrators. In addition to the revenue gained from selling on the mobile device, they try to make additional financial gains from stolen user data and enforced advertising. HOW IS THE MALWARE HIDDEN? In the analysed cases, the malware is usually hidden in a legitimate app which is manipulated to contain malware as an add-on. The malware hides alongside the usual functions in the app. Users do not notice these add-on functions as the majority of the processes run in the background. EXAMPLE: MANIPULATED FACEBOOK APP A common method is to manipulate a legitimate, popular app such as the Facebook app. All of the usual Facebook functions are available in the manipulated version. Users do not notice the surreptitious access, but the range of functions is expanded by the attached malware, enabling third parties to access the entire device without asking for the user's consent. The permissions have already been approved by the owner prior to commissioning the device. Hence the user only notices the malicious app when he installs a security solution such as G DATA INTERNET SECURITY FOR ANDROID. As soon as the security software has been installed, it immediately sounds an alarm. In this example, the G DATA security solution identifies the malware as Android.Trojan. Andup.D. Uninstalling is often not possible as the app is one of the fixed installation applications in the firmware. The G DATA security experts advise afflicted users to contact the vendor of the mobile device. The secret add-on functions are wide-ranging. In this example, the app can access the Internet, read and send SMS, subsequently install apps, see, store and amend call data and data about the smartphone, access the contact list, obtain location data and monitor app updates. These permissions enable extensive misuse: location detection, listening to and recording telephone calls or conversations, making purchases, bank fraud or sending premium SMS. The possibilities are almost endless. In almost every variant that the G DATA security experts have analysed, the app has been poorly programmed and harbours an enormous security risk. Sensitive data are largely sent unencrypted or with a hardcoded key that can be
  • 7. G DATA MOBILE MALWARE REPORT 7 WhitepaperMobileMalwareReportUS07-2015•1816010915 easily decrypted. Thus, even other attackers can steal data or take control of the malware. In addition, none of the examined samples checks in advance whether it exchanges data with the correct server. In this case Man-in-the- middle-attacks could be easily implemented. INFECTED MODELS (EXCERPT) Xiaomi MI3 Huawei G510 Lenovo S860 Alps A24 Alps 809T Alps H9001 Alps 2206 Alps PrimuxZeta Alps N3 Alps ZP100 Alps 709 Alps GQ2002 Alps N9389 Andorid P8 ConCorde SmartPhone6500 DJC touchtalk ITOUCH NoName S806i SESONN N9500 SESONN P8 Xido X1111 © Copyright 2015 G DATA Software AG. All rights reserved. This document must not be copied or reproduced, in full or in part, without written permission from G DATA Software AG Germany. Microsoft, Windows, Outlook and Exchange Server are registered trademarks of The Microsoft Corporation. All other trademarks and brand names are the property of their respective owners and must therefore be treated as such. The app can access the Internet, read and send SMS, subsequently install apps, see, store and amend call data and data about the smartphone, access the contact list, obtain location data and monitor app updates. The experts were able to prove the presence of a manipulated pre-installed app on three mobile devices in factory condition. Besides the Star N9500, which has been under investigation since 2014, the Star N8000 and IceFox Razor are involved as well. Through feedback from G DATA INTERNET SECURITY FOR ANDROID, support calls and results from other security researchers, the experts have identified further instances in which evidence of pre-installed malware on the devices is suspected. In these cases, G DATA security experts suspect that middlemen are behind the manipulation of single devices, like models from Huawei or Lenovo. The experts believe that there is a much higher undetected number. WHICH DEVICES ARE INVOLVED?