dfm covers
 
 

Malware Targeting Android has a Taste for Gingerbread and Ice Cream Sandwich

Print PDF
Wednesday, 07 November 2012 10:43 Written by DFM News

Android versions 2.3.6, or 'Gingerbread', and 4.0.4, also known as 'Ice Cream Sandwich' were the most popular Android targets among cybercriminals in Q3, according to the latest analysis of Android malware by Kaspersky Lab experts.

The rapid growth in the number of new mobile malicious programs for Android continued in the third quarter, prompting the specialists at Kaspersky Lab to identify the platform versions most frequently targeted by cybercriminals. Android 2.3.6 Gingerbread accounted for 28 per cent of all blocked attempts to install malware, while the second most commonly attacked version was the new 4.0.4 Ice Cream Sandwich, which accounted for 22 per cent of attempts.

"Although Gingerbread was released back in September 2011, due to the segmentation of the Android device market it still remains one of the most popular versions, which, in turn, attracts increased interest from cybercriminals," commented Yuri Namestnikov, Senior Malware Analyst at Kaspersky Lab. "The popularity of the most recent version of the Android OS - Ice Cream Sandwich - among virus writers can be explained by the fact that the devices running the latest versions of the OS are more suitable for online activities. Unfortunately, users actively surfing the web often end up on malicious sites."

More than half of all malware detected on users smartphones turned out to be SMS Trojans, i.e. malicious programs that steal money from victims' mobile accounts by sending SMS messages to premium rate numbers. The OpFake family has become the most widespread (38.3 per cent of all the malicious programs detected for Android) among all the mobile malware families. All the programs in this family disguise themselves as OperaMini.

A fifth of the malicious programs detected on user devices are versatile Trojans, most of which belong to the Plangton family. After being installed on a device, these Trojans collect service data on the phone, send it to the command server and wait for the cybercriminals' commands. Specifically, malicious programs in this family can stealthily change bookmarks and the home page. The third most widespread malware was the FakeInst family, whose members pretend to be installers for popular programs (17 per cent). These two types of malware are mostly distributed via so-called alternative app stores created by cybercriminals.

Mobile threats of this kind can be neutralised with the help of dedicated mobile applications. For example, in addition to reliable protection against information theft via malware, Kaspersky Mobile Security and Kaspersky Tablet Security also ensure data stays safe even if a device is lost or stolen.

The full version of the report "IT Threat Evolution: Q3 2012" is available at secure.com.


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Angus Marshall

Angus Marshall is an independent digital forensic practitioner, author and researcher

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 32 on sale from August 2017:


Triage Solution for Sex Offender Managers

This article considers a proof of concept triage solution for sex offender managers for a local police force which if successful could simplify and modify the way that sex offenders are managed. Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Why Are Cybercriminals Attracted To Commit Crimes

Individuals who engage in cybercrime have a psychological mindset that is attuned to it. This paper discusses the motives behind cybercrime and what makes cybercrime attractive to cybercriminals. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue