SlideShare a Scribd company logo
In 2012, the Android OS continued to be the
number one target for mobile malware. Overall,
the number of malware attacks more than
doubled from 2011 to 2012.
Additionally, cybercriminals continued to expand
beyond China and Eastern Europe, focusing
their efforts on consumers in the United
States, Saudi Arabia and other markets. One
of the biggest and most profitable trends for
cybercriminals in 2012 was combining mobile
malware with social engineering techniques
(Phishing and Smishing) to gain access to users’
financial information.
2012 Overview
© 2007 - 2013 NQ Mobile™
NQ MOBILE’S PROPRIETARY TOOLS AND RESOURCES
283 million registered user accounts
and 98 million active user accounts
help provide real-time data on new
malware and global infection rates.
Crawler™
RiskRank™
Sense™
In 2012, our crawler scanned over 2.2
billion URLs, and discovered over 5.4
million fraudlent URLs.
Crawler™
RiskRank™
Sense™
In 2012, our RiskRank algorithm
scanned 5.3M apps in 406
marketplaces around the world.
Crawler™
RiskRank™
Sense™
NQ Mobile’s 2012 Security Report is based on insights from
NQ Mobile’s Security Lab, a team of over 250 mobile security
professionals, scientists and developers around the world who
proactively monitor the mobile landscape for new malware
threats and mobile hacking methods. The report is also based
on data collected from NQ Mobile proprietary tools and
services.
Source: NQ Mobile proprietary data.
6,7602010
1,6492009
24,7942011
65,2272012
Malware Discoveries, by Year
•	 163% increase in mobile malware: NQ Mobile discovered
over 65,227 new pieces of mobile malware in 2012 vs.
only 24,794 in 2011
•	 65% of malware discovered in 2012 falls into the broader
category of Potentially Unwanted Programs (or PUPs).
PUPs include root exploits, spyware, pervasive adware and
Trojans (surveillance hacks)
•	 94.8% of malware discovered in 2012 was designed to
attack Android devices vs. only 4% targeting Symbian
•	 28% of mobile malware discovered in 2012 was designed
to collect and profit from a user’s personal data
•	 7% of malware was simply designed to make a user’s
device stop working (i.e., “bricking” their phones)
•	 The three primary methods for delivering malware
in 2012 included Smishing, Malicious URLs and App
Repackaging
•	 More than 32.8 million Android devices were infected in
2012 vs. 10.8 million in 2011 according to NQ Mobile
estimates – an increase of over 200 percent
•	 25.5% of infected mobile devices were in China, followed
by India (19.4%), Russia (17.9%), the United States
(9.8%) and Saudi Arabia (9.6%)
Smishing
This type of fraud increases the user’s
bill to the profit of the malware
developer via SMS.
Using social engineering (phishing)
along with SMS, consumers are
contacted by cybercriminals and asked
to click on a malicious link. Clicking
the link will trigger a malicious app
download or direct the consumer to
a rogue website. One of the most
efficient and lucrative methods of
smishing automatically downloads
Premium Rate Service (PRS) images to
the infected device. Also called “Toll
Fraud,” this method generates as much
as $4 USD per SMS for cybercriminals.
Malicous URLs
This type of fraud is intended to collect
user’s personal information while
browsing on mobile devices, especially
in regard to major banking and
financial institutions.
Malware developers, taking advantage
of hard-to-see or hidden mobile web
URLs, redirect users from a genuine
website to a clone website. Upon
visiting the malicious website the
browser might initiate any number of
actions including entering a username
and password, downloading fake
security updates, or even asking for
the user’s mobile number so it can
send a malicious URL link.
App Repackaging
This is the most common method used
by malware authors and therefore
the most common way for mobile
devices and user information to be
compromised.
Cybercriminals add lines of malicious
code into a genuine app and
repackage and reload it onto a 3rd
party marketplace for unsuspecting
mobile users to download and install.
Once installed, the app works in the
background to collect user data,
change user settings, or remotely
control the device to send SMS
messages.
Malware Highlights
2012: Top 5 Infected Markets
9.6%SaudiArabia
9.8%UnitedStates
17.9%Russia
19.4%India
Global Infection Rates
© 2007 - 2013 NQ Mobile™
25.5%China
Bill Shocker
The most infectious and costly mobile malware in
history, Bill Shocker infected over 600,000 users in
China. NQ Mobile discovered the infection, which
spread through popular apps including Tencent
QQ Messenger and Sohu News.
Bill Shocker silently installed itself in the
background and then attempted to take remote
control of the mobile device, internet
connections, dialing and texting functions,
and upload the contact data. It then turned the
device into a “zombie” which allowed it to send
PRS SMS without the user’s knowledge.
DyPusher
This malware was capable of uploading device specific information
(i.e. IMSI, IMEI, mobile number, system number etc.) as well as
dynamically downloading files and apps without the user’s consent,
thereby causing loss of privacy and potential bill shock. 210 users
were infected by the time DyPusher was discovered by NQ Mobile.
FireLeaker
This malware was disguised as a widget and hidden from view but
could collect device specific information (i.e. IMSI, IMEI, mobile
number, system number, etc.) and contact data and upload it to a
remote server. 13 users were infected by the time FireLeaker was
discovered and eradicated by NQ Mobile.
VDloader
This malware ran as a client on an Android device and then
requested interaction with a remote server.
The primary infection path was via an SMS link, using social
engineering techniques to target victims. Upon clicking the link,
the malware would hide inside a genuine application and only
broadcast when requested.
This malware was the first to be found - by any global security
vendor - with the ability to automatically upgrade itself.1,714
users were infected by the time VDloader was discovered and
innoculated by NQ Mobile.
DDSpy
DDSpy disguised itself as Gmail and ran silently in the background.
It showed no icon and hid itself in the app list, communicating with
its command and control server via SMS. This was discovered as a
client-side Trojan malware. DDSpy included a GPS hook, whereby
location-based malware can be set to activate based on a specific
GPS or cell site location.
This type of location-based malware is more difficult to detect
and could evade mobile anti-virus scanning engines. By hiding the
malware, the authors did not have to re-engineer the malcode as
often and kept their development costs down.
© 2007 - 2013 NQ Mobile™
NQ Mobile Discovery: Bill Shocker
Major Malware Discoveries
NQ Mobile’s Security Labs discovered a number of new pieces of mobile
malware, including the largest driver of SMS Toll Fraud ever discovered.
Image credit: NASA, The Visible Earth http://visibleearth.nasa.gov/
While instances of malware infections did not
significantly increase from 2011 to 2012 in
the U.S., the market is an attractive target for
cybercriminals. NQ Mobile expects to see an
increasing number of attacks on smartphones in
the region.
1.	 http://securityledger.com/android-ecosystem-still-fragmented-insecure/ and http://developer.android.com/
about/dashboards/index.html
2.	 http://www.nielsen.com/us/en/newswire/2012/young-adults-and-teens-lead-growth-among-smartphone-
owners.html
3.	 This survey was conducted online within the United States on behalf of NQ Mobile from February 22-25,
2013 among 413 adults ages 18 and older. This online survey is not based on a probability sample and
therefore no estimate of theoretical sampling error can be calculated.
© 2007 - 2013 NQ Mobile™
What Are The Real Risks to
Smartphone Users?
Young Smartphone Users
According to Nielsen 58%
of children aged 13-17
in the United States own
smartphones.2
Android Fragmentation
Two years after its
introduction, more than 39%
of Android users are still
using Gingerbread.1
App Sideloading
More and more Android users can now download and install
mobile apps outside of Google Play.
This means that more users than ever are able to visit and
download apps from third party marketplaces, where the
majority of malicious apps are being hosted.
39%As a result, these mobile consumers are lacking many of the major
security updates provided by Ice Cream Sandwich and Jelly Bean.
58%This is a demographic that not only downloads more apps (41 on
average) but is also more open to downloading content and apps
outside of Google Play (46%).3
Behavior Changes Needed
52%
In the US, Only 52% of consumers reported requiring a
passcode or other authentication method to access their
device.3
While consumers who have
lost a smartphone or had
one stolen in the past are
significantly more likely to
be taking basic protective
measures with their current
device, nearly one-third have
still not learned their lesson.

More Related Content

What's hot

10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
ijmnct
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
ijmnct
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
BMI Healthcare
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
n|u - The Open Security Community
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
Infinigate Group
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Cscu module 13 securing mobile devices
Cscu module 13 securing mobile devicesCscu module 13 securing mobile devices
Cscu module 13 securing mobile devicesSejahtera Affif
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
Symantec
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
 

What's hot (20)

10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Cscu module 13 securing mobile devices
Cscu module 13 securing mobile devicesCscu module 13 securing mobile devices
Cscu module 13 securing mobile devices
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 

Viewers also liked

Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
Janet Hale
 
CMI2012 CCSS for Mathematics
CMI2012 CCSS for MathematicsCMI2012 CCSS for Mathematics
CMI2012 CCSS for Mathematics
Janet Hale
 
Proforma One Source Infinite Resources
Proforma One Source Infinite ResourcesProforma One Source Infinite Resources
Proforma One Source Infinite Resources
Javier Labbe
 
Trail Maintenance Tutorial
Trail Maintenance TutorialTrail Maintenance Tutorial
Trail Maintenance Tutorial
David Tran
 
Upgrading the Curriculum
Upgrading the CurriculumUpgrading the Curriculum
Upgrading the CurriculumJanet Hale
 

Viewers also liked (6)

Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
Designing Common Core State Standards Systemic Mathematics Curriculum: Part 1
 
CMI2012 CCSS for Mathematics
CMI2012 CCSS for MathematicsCMI2012 CCSS for Mathematics
CMI2012 CCSS for Mathematics
 
Supply Chain Modularity
Supply Chain ModularitySupply Chain Modularity
Supply Chain Modularity
 
Proforma One Source Infinite Resources
Proforma One Source Infinite ResourcesProforma One Source Infinite Resources
Proforma One Source Infinite Resources
 
Trail Maintenance Tutorial
Trail Maintenance TutorialTrail Maintenance Tutorial
Trail Maintenance Tutorial
 
Upgrading the Curriculum
Upgrading the CurriculumUpgrading the Curriculum
Upgrading the Curriculum
 

Similar to 2012 nq mobile_security_report

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
 
Enter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox ComparisonEnter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox Comparison
Jose Moruno Cadima
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET Journal
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
Karim Shaikh
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
Kulani Mahadewa
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
CSCJournals
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
IOSR Journals
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
EMC
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Rahul Neel Mani
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
csandit
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
Комсс Файквэе
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
Copper Mobile, Inc.
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
Anjoum .
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 

Similar to 2012 nq mobile_security_report (20)

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Enter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox ComparisonEnter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox Comparison
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

2012 nq mobile_security_report

  • 1. In 2012, the Android OS continued to be the number one target for mobile malware. Overall, the number of malware attacks more than doubled from 2011 to 2012. Additionally, cybercriminals continued to expand beyond China and Eastern Europe, focusing their efforts on consumers in the United States, Saudi Arabia and other markets. One of the biggest and most profitable trends for cybercriminals in 2012 was combining mobile malware with social engineering techniques (Phishing and Smishing) to gain access to users’ financial information. 2012 Overview © 2007 - 2013 NQ Mobile™ NQ MOBILE’S PROPRIETARY TOOLS AND RESOURCES 283 million registered user accounts and 98 million active user accounts help provide real-time data on new malware and global infection rates. Crawler™ RiskRank™ Sense™ In 2012, our crawler scanned over 2.2 billion URLs, and discovered over 5.4 million fraudlent URLs. Crawler™ RiskRank™ Sense™ In 2012, our RiskRank algorithm scanned 5.3M apps in 406 marketplaces around the world. Crawler™ RiskRank™ Sense™ NQ Mobile’s 2012 Security Report is based on insights from NQ Mobile’s Security Lab, a team of over 250 mobile security professionals, scientists and developers around the world who proactively monitor the mobile landscape for new malware threats and mobile hacking methods. The report is also based on data collected from NQ Mobile proprietary tools and services. Source: NQ Mobile proprietary data. 6,7602010 1,6492009 24,7942011 65,2272012 Malware Discoveries, by Year
  • 2. • 163% increase in mobile malware: NQ Mobile discovered over 65,227 new pieces of mobile malware in 2012 vs. only 24,794 in 2011 • 65% of malware discovered in 2012 falls into the broader category of Potentially Unwanted Programs (or PUPs). PUPs include root exploits, spyware, pervasive adware and Trojans (surveillance hacks) • 94.8% of malware discovered in 2012 was designed to attack Android devices vs. only 4% targeting Symbian • 28% of mobile malware discovered in 2012 was designed to collect and profit from a user’s personal data • 7% of malware was simply designed to make a user’s device stop working (i.e., “bricking” their phones) • The three primary methods for delivering malware in 2012 included Smishing, Malicious URLs and App Repackaging • More than 32.8 million Android devices were infected in 2012 vs. 10.8 million in 2011 according to NQ Mobile estimates – an increase of over 200 percent • 25.5% of infected mobile devices were in China, followed by India (19.4%), Russia (17.9%), the United States (9.8%) and Saudi Arabia (9.6%) Smishing This type of fraud increases the user’s bill to the profit of the malware developer via SMS. Using social engineering (phishing) along with SMS, consumers are contacted by cybercriminals and asked to click on a malicious link. Clicking the link will trigger a malicious app download or direct the consumer to a rogue website. One of the most efficient and lucrative methods of smishing automatically downloads Premium Rate Service (PRS) images to the infected device. Also called “Toll Fraud,” this method generates as much as $4 USD per SMS for cybercriminals. Malicous URLs This type of fraud is intended to collect user’s personal information while browsing on mobile devices, especially in regard to major banking and financial institutions. Malware developers, taking advantage of hard-to-see or hidden mobile web URLs, redirect users from a genuine website to a clone website. Upon visiting the malicious website the browser might initiate any number of actions including entering a username and password, downloading fake security updates, or even asking for the user’s mobile number so it can send a malicious URL link. App Repackaging This is the most common method used by malware authors and therefore the most common way for mobile devices and user information to be compromised. Cybercriminals add lines of malicious code into a genuine app and repackage and reload it onto a 3rd party marketplace for unsuspecting mobile users to download and install. Once installed, the app works in the background to collect user data, change user settings, or remotely control the device to send SMS messages. Malware Highlights 2012: Top 5 Infected Markets 9.6%SaudiArabia 9.8%UnitedStates 17.9%Russia 19.4%India Global Infection Rates © 2007 - 2013 NQ Mobile™ 25.5%China
  • 3. Bill Shocker The most infectious and costly mobile malware in history, Bill Shocker infected over 600,000 users in China. NQ Mobile discovered the infection, which spread through popular apps including Tencent QQ Messenger and Sohu News. Bill Shocker silently installed itself in the background and then attempted to take remote control of the mobile device, internet connections, dialing and texting functions, and upload the contact data. It then turned the device into a “zombie” which allowed it to send PRS SMS without the user’s knowledge. DyPusher This malware was capable of uploading device specific information (i.e. IMSI, IMEI, mobile number, system number etc.) as well as dynamically downloading files and apps without the user’s consent, thereby causing loss of privacy and potential bill shock. 210 users were infected by the time DyPusher was discovered by NQ Mobile. FireLeaker This malware was disguised as a widget and hidden from view but could collect device specific information (i.e. IMSI, IMEI, mobile number, system number, etc.) and contact data and upload it to a remote server. 13 users were infected by the time FireLeaker was discovered and eradicated by NQ Mobile. VDloader This malware ran as a client on an Android device and then requested interaction with a remote server. The primary infection path was via an SMS link, using social engineering techniques to target victims. Upon clicking the link, the malware would hide inside a genuine application and only broadcast when requested. This malware was the first to be found - by any global security vendor - with the ability to automatically upgrade itself.1,714 users were infected by the time VDloader was discovered and innoculated by NQ Mobile. DDSpy DDSpy disguised itself as Gmail and ran silently in the background. It showed no icon and hid itself in the app list, communicating with its command and control server via SMS. This was discovered as a client-side Trojan malware. DDSpy included a GPS hook, whereby location-based malware can be set to activate based on a specific GPS or cell site location. This type of location-based malware is more difficult to detect and could evade mobile anti-virus scanning engines. By hiding the malware, the authors did not have to re-engineer the malcode as often and kept their development costs down. © 2007 - 2013 NQ Mobile™ NQ Mobile Discovery: Bill Shocker Major Malware Discoveries NQ Mobile’s Security Labs discovered a number of new pieces of mobile malware, including the largest driver of SMS Toll Fraud ever discovered. Image credit: NASA, The Visible Earth http://visibleearth.nasa.gov/
  • 4. While instances of malware infections did not significantly increase from 2011 to 2012 in the U.S., the market is an attractive target for cybercriminals. NQ Mobile expects to see an increasing number of attacks on smartphones in the region. 1. http://securityledger.com/android-ecosystem-still-fragmented-insecure/ and http://developer.android.com/ about/dashboards/index.html 2. http://www.nielsen.com/us/en/newswire/2012/young-adults-and-teens-lead-growth-among-smartphone- owners.html 3. This survey was conducted online within the United States on behalf of NQ Mobile from February 22-25, 2013 among 413 adults ages 18 and older. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. © 2007 - 2013 NQ Mobile™ What Are The Real Risks to Smartphone Users? Young Smartphone Users According to Nielsen 58% of children aged 13-17 in the United States own smartphones.2 Android Fragmentation Two years after its introduction, more than 39% of Android users are still using Gingerbread.1 App Sideloading More and more Android users can now download and install mobile apps outside of Google Play. This means that more users than ever are able to visit and download apps from third party marketplaces, where the majority of malicious apps are being hosted. 39%As a result, these mobile consumers are lacking many of the major security updates provided by Ice Cream Sandwich and Jelly Bean. 58%This is a demographic that not only downloads more apps (41 on average) but is also more open to downloading content and apps outside of Google Play (46%).3 Behavior Changes Needed 52% In the US, Only 52% of consumers reported requiring a passcode or other authentication method to access their device.3 While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly one-third have still not learned their lesson.