SlideShare a Scribd company logo
Confidential - Sophos internal and partners only 1
Mobile threats are here to stay and evolving
Everyone is mobile
• Every organization faces security
risks when employees mix personal
and business access to apps, email,
the internet from a device
• Any device that is roaming is
vulnerable
• Employee productivity versus
security must be balanced
• Every business needs to evaluate
what their risks are
Core reasons why Android
devices are attacked
• Google Play store is not
immune to malware
• 3rd party stores are a major
attack vector
• Multiple ways to monetize:
ransomware, cryptojacking, banking
Trojans, rogue advertisement and
premium SMS
Mobile Threat Data Points
Confidential - Sophos internal and partners only 2
iOS THREATS
<10
ANDROID THREATS
4 Million+
VS.
2017 SophosLabs Analyzation
Vast majority of
4 Million Malware Samples
came from outside
Google’s walled garden
In 2017, Google Play reported
35 different threat families
Google took down
700,000 packages
violating Google Play policies
A continuing trend:
47 threat families so far
6 of 37 malware families
discovered at SophosLabs
Android apps removed from Google Play
3
37% potentially harmful applications removed from Google Play in 2017 – SophosLabs
Total apps
submitted to
Google Play in
2017:
2,144,733
Free Apps:
2,012,893
Paid Apps:
131,840
37% - Removed from
Google Play app store
Free Apps: 681,241
Paid Apps: 109,897
Left in Google Play:
Free Apps: 1,331,652
Paid Apps: 21,943
14.2 billion installs
Built by 184,852
developers
Malware on Google Play found by SophosLabs
4
Cumulative number of malicious apps on Google Play from July 2017 till September 2018
0
2000
1800
1600
1400
1200
1000
800
600
200
400
(number of unique applications)
July 2017 January 2018 September 2018
SonicSpy
CPUMiner
ExpensiveWall
BankBot
AsiaHitGroup
Tizi
LightsOut
MyEtherWallet
47 New Malware Families
280 Million Downloads
6 out of 37 Malware Families
Discovered in 2018 Were
Discovered by Sophos
Android Malware Growth, 2015-2018
5
Annual rate of new Android malware and PUA collected by SophosLabs
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
3,000,000
3,500,000
4,000,000
4,500,000
2012 2013 2014 2015 2016 2017 2018
Malware PUA
Source: SophosLabs, 2017
100%
increase in new
malware sightings
expected, as
compared to 2015
projected
Android Ransomware: No sign of going away
6
0
50,000
100,000
150,000
200,000
250,000
300,000
350,000
400,000
450,000
500,000
2013 2014 2015 2016 2017 2018 Jan-
Aug
New Android ransomware samples
collected by SophosLabs, per year
SophosLabs: Cryptojacking is
replacing ransomware as a
preferred monetization route.
But ransomware shows no sign
of going away
Cryptominers: On The Rise
Confidential - Sophos internal and partners only 7
SophosLabs:
• Discovered 25 cryptomining apps on Google Play disguised
as games and educational applications on September 24,
installed more than 120,000 times LINK
• Observed more than 20,000 different variants of the Loapi
cryptomining malware in the second half of 2017
function startMiner(n, id)
{
if (isAlreadyStarted)
return;
isAlreadyStarted=true;
var miner = new
CoinHive.Anonymous(id, {
threads: n-1,
autoThreads: true,
throttle: 0.5
});
miner.start();
}
Generates cryptocurrency
for cybercriminals
Resources
Confidential - Sophos internal and partners only 8
SophosLabs Uncut “Android”
o Research straight from SophosLabs
Naked Security News
o Industry security news
SophosLabs on Twitter
o Follow for breaking news
and updates
Sophos Mobile Security
o Technology innovations
and protection

More Related Content

What's hot

State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
IBM Security
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
Symantec
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
Soluciona Facil
 
How to Protect Mobile Banking Users from BankBot
How to Protect Mobile Banking Users from BankBotHow to Protect Mobile Banking Users from BankBot
How to Protect Mobile Banking Users from BankBot
Zimperium
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
Envision Technology Advisors
 
Ppt crc nazir_seeds
Ppt crc nazir_seedsPpt crc nazir_seeds
Ppt crc nazir_seeds
Nazir Dar
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of PiracyIBM Security
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
Proofpoint
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
Waqas Amir
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
Alert Logic
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
Комсс Файквэе
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
PhishingBox
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
PhishingBox
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
Insight
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
- Mark - Fullbright
 

What's hot (20)

State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
How to Protect Mobile Banking Users from BankBot
How to Protect Mobile Banking Users from BankBotHow to Protect Mobile Banking Users from BankBot
How to Protect Mobile Banking Users from BankBot
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Ppt crc nazir_seeds
Ppt crc nazir_seedsPpt crc nazir_seeds
Ppt crc nazir_seeds
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 

Similar to Android stats v6 for threat report - Sophos

Enter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox ComparisonEnter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox Comparison
Jose Moruno Cadima
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
SSLRenewals
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
Itex Solutions
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Corporation
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
MarketingArrowECS_CZ
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012Shivmohan Yadav
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
Mobile Ad Fraud Deep Dive With AppsFlyer
Mobile Ad Fraud Deep Dive With AppsFlyerMobile Ad Fraud Deep Dive With AppsFlyer
Mobile Ad Fraud Deep Dive With AppsFlyer
GameCamp
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
FACE
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
Pranav Saini
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
ijtsrd
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
CSCJournals
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
IJECEIAES
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
Subho Halder
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Rahul Neel Mani
 

Similar to Android stats v6 for threat report - Sophos (20)

Enter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox ComparisonEnter Sandbox: Android Sandbox Comparison
Enter Sandbox: Android Sandbox Comparison
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Mobile Ad Fraud Deep Dive With AppsFlyer
Mobile Ad Fraud Deep Dive With AppsFlyerMobile Ad Fraud Deep Dive With AppsFlyer
Mobile Ad Fraud Deep Dive With AppsFlyer
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 

More from ITSitio.com

ITSitio.com - Projecto Ninja
ITSitio.com - Projecto Ninja ITSitio.com - Projecto Ninja
ITSitio.com - Projecto Ninja
ITSitio.com
 
Presentacion Consultora D Alessio Irol
Presentacion Consultora D Alessio IrolPresentacion Consultora D Alessio Irol
Presentacion Consultora D Alessio Irol
ITSitio.com
 
Proyecto Ley de Economia del Conocimiento modificado
Proyecto Ley de Economia del Conocimiento modificado Proyecto Ley de Economia del Conocimiento modificado
Proyecto Ley de Economia del Conocimiento modificado
ITSitio.com
 
Technology, Media, and Telecommunications Predictions 2020
 Technology, Media, and Telecommunications Predictions 2020 Technology, Media, and Telecommunications Predictions 2020
Technology, Media, and Telecommunications Predictions 2020
ITSitio.com
 
Cisco Visual Networking Index: Forecast and Trends, 2017–2022
Cisco Visual Networking Index: Forecast and Trends, 2017–2022Cisco Visual Networking Index: Forecast and Trends, 2017–2022
Cisco Visual Networking Index: Forecast and Trends, 2017–2022
ITSitio.com
 
#ITSitioMexico - Presentacion Desayuno CDMX
#ITSitioMexico - Presentacion Desayuno CDMX #ITSitioMexico - Presentacion Desayuno CDMX
#ITSitioMexico - Presentacion Desayuno CDMX
ITSitio.com
 
Desayuno ITSitio.com Colombia 2018
Desayuno ITSitio.com Colombia 2018 Desayuno ITSitio.com Colombia 2018
Desayuno ITSitio.com Colombia 2018
ITSitio.com
 
El Futuro de las Ventas - por Gustavo Pagotto
El Futuro de las Ventas - por Gustavo PagottoEl Futuro de las Ventas - por Gustavo Pagotto
El Futuro de las Ventas - por Gustavo Pagotto
ITSitio.com
 
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
ITSitio.com
 
NVdia Argentina Press Deck - Mayo 2018
NVdia Argentina Press Deck - Mayo 2018NVdia Argentina Press Deck - Mayo 2018
NVdia Argentina Press Deck - Mayo 2018
ITSitio.com
 
Logitech - Presentacion de Video Collaboration
Logitech - Presentacion de Video CollaborationLogitech - Presentacion de Video Collaboration
Logitech - Presentacion de Video Collaboration
ITSitio.com
 
AMD Latam Press Tour Buenos Aires Mayo 2018
AMD Latam Press Tour Buenos Aires Mayo 2018AMD Latam Press Tour Buenos Aires Mayo 2018
AMD Latam Press Tour Buenos Aires Mayo 2018
ITSitio.com
 
Reporte anual de seguridad Cisco 2018
Reporte anual de seguridad Cisco 2018Reporte anual de seguridad Cisco 2018
Reporte anual de seguridad Cisco 2018
ITSitio.com
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
ITSitio.com
 
Martin Tetaz - Economía 2018
Martin Tetaz - Economía 2018Martin Tetaz - Economía 2018
Martin Tetaz - Economía 2018
ITSitio.com
 
CES 2018 TECH TRENDS
CES 2018 TECH TRENDS CES 2018 TECH TRENDS
CES 2018 TECH TRENDS
ITSitio.com
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
ITSitio.com
 
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic #CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
ITSitio.com
 
Desayuno marketing 3.0
Desayuno marketing 3.0Desayuno marketing 3.0
Desayuno marketing 3.0
ITSitio.com
 
Desayuno mayoristas IT
Desayuno mayoristas IT Desayuno mayoristas IT
Desayuno mayoristas IT
ITSitio.com
 

More from ITSitio.com (20)

ITSitio.com - Projecto Ninja
ITSitio.com - Projecto Ninja ITSitio.com - Projecto Ninja
ITSitio.com - Projecto Ninja
 
Presentacion Consultora D Alessio Irol
Presentacion Consultora D Alessio IrolPresentacion Consultora D Alessio Irol
Presentacion Consultora D Alessio Irol
 
Proyecto Ley de Economia del Conocimiento modificado
Proyecto Ley de Economia del Conocimiento modificado Proyecto Ley de Economia del Conocimiento modificado
Proyecto Ley de Economia del Conocimiento modificado
 
Technology, Media, and Telecommunications Predictions 2020
 Technology, Media, and Telecommunications Predictions 2020 Technology, Media, and Telecommunications Predictions 2020
Technology, Media, and Telecommunications Predictions 2020
 
Cisco Visual Networking Index: Forecast and Trends, 2017–2022
Cisco Visual Networking Index: Forecast and Trends, 2017–2022Cisco Visual Networking Index: Forecast and Trends, 2017–2022
Cisco Visual Networking Index: Forecast and Trends, 2017–2022
 
#ITSitioMexico - Presentacion Desayuno CDMX
#ITSitioMexico - Presentacion Desayuno CDMX #ITSitioMexico - Presentacion Desayuno CDMX
#ITSitioMexico - Presentacion Desayuno CDMX
 
Desayuno ITSitio.com Colombia 2018
Desayuno ITSitio.com Colombia 2018 Desayuno ITSitio.com Colombia 2018
Desayuno ITSitio.com Colombia 2018
 
El Futuro de las Ventas - por Gustavo Pagotto
El Futuro de las Ventas - por Gustavo PagottoEl Futuro de las Ventas - por Gustavo Pagotto
El Futuro de las Ventas - por Gustavo Pagotto
 
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
Presentación de IDC Evento SOPHOS See The Future Buenos Aires Sep2018
 
NVdia Argentina Press Deck - Mayo 2018
NVdia Argentina Press Deck - Mayo 2018NVdia Argentina Press Deck - Mayo 2018
NVdia Argentina Press Deck - Mayo 2018
 
Logitech - Presentacion de Video Collaboration
Logitech - Presentacion de Video CollaborationLogitech - Presentacion de Video Collaboration
Logitech - Presentacion de Video Collaboration
 
AMD Latam Press Tour Buenos Aires Mayo 2018
AMD Latam Press Tour Buenos Aires Mayo 2018AMD Latam Press Tour Buenos Aires Mayo 2018
AMD Latam Press Tour Buenos Aires Mayo 2018
 
Reporte anual de seguridad Cisco 2018
Reporte anual de seguridad Cisco 2018Reporte anual de seguridad Cisco 2018
Reporte anual de seguridad Cisco 2018
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Martin Tetaz - Economía 2018
Martin Tetaz - Economía 2018Martin Tetaz - Economía 2018
Martin Tetaz - Economía 2018
 
CES 2018 TECH TRENDS
CES 2018 TECH TRENDS CES 2018 TECH TRENDS
CES 2018 TECH TRENDS
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
 
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic #CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
 
Desayuno marketing 3.0
Desayuno marketing 3.0Desayuno marketing 3.0
Desayuno marketing 3.0
 
Desayuno mayoristas IT
Desayuno mayoristas IT Desayuno mayoristas IT
Desayuno mayoristas IT
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Android stats v6 for threat report - Sophos

  • 1. Confidential - Sophos internal and partners only 1 Mobile threats are here to stay and evolving Everyone is mobile • Every organization faces security risks when employees mix personal and business access to apps, email, the internet from a device • Any device that is roaming is vulnerable • Employee productivity versus security must be balanced • Every business needs to evaluate what their risks are Core reasons why Android devices are attacked • Google Play store is not immune to malware • 3rd party stores are a major attack vector • Multiple ways to monetize: ransomware, cryptojacking, banking Trojans, rogue advertisement and premium SMS
  • 2. Mobile Threat Data Points Confidential - Sophos internal and partners only 2 iOS THREATS <10 ANDROID THREATS 4 Million+ VS. 2017 SophosLabs Analyzation Vast majority of 4 Million Malware Samples came from outside Google’s walled garden In 2017, Google Play reported 35 different threat families Google took down 700,000 packages violating Google Play policies A continuing trend: 47 threat families so far 6 of 37 malware families discovered at SophosLabs
  • 3. Android apps removed from Google Play 3 37% potentially harmful applications removed from Google Play in 2017 – SophosLabs Total apps submitted to Google Play in 2017: 2,144,733 Free Apps: 2,012,893 Paid Apps: 131,840 37% - Removed from Google Play app store Free Apps: 681,241 Paid Apps: 109,897 Left in Google Play: Free Apps: 1,331,652 Paid Apps: 21,943 14.2 billion installs Built by 184,852 developers
  • 4. Malware on Google Play found by SophosLabs 4 Cumulative number of malicious apps on Google Play from July 2017 till September 2018 0 2000 1800 1600 1400 1200 1000 800 600 200 400 (number of unique applications) July 2017 January 2018 September 2018 SonicSpy CPUMiner ExpensiveWall BankBot AsiaHitGroup Tizi LightsOut MyEtherWallet 47 New Malware Families 280 Million Downloads 6 out of 37 Malware Families Discovered in 2018 Were Discovered by Sophos
  • 5. Android Malware Growth, 2015-2018 5 Annual rate of new Android malware and PUA collected by SophosLabs 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 4,000,000 4,500,000 2012 2013 2014 2015 2016 2017 2018 Malware PUA Source: SophosLabs, 2017 100% increase in new malware sightings expected, as compared to 2015 projected
  • 6. Android Ransomware: No sign of going away 6 0 50,000 100,000 150,000 200,000 250,000 300,000 350,000 400,000 450,000 500,000 2013 2014 2015 2016 2017 2018 Jan- Aug New Android ransomware samples collected by SophosLabs, per year SophosLabs: Cryptojacking is replacing ransomware as a preferred monetization route. But ransomware shows no sign of going away
  • 7. Cryptominers: On The Rise Confidential - Sophos internal and partners only 7 SophosLabs: • Discovered 25 cryptomining apps on Google Play disguised as games and educational applications on September 24, installed more than 120,000 times LINK • Observed more than 20,000 different variants of the Loapi cryptomining malware in the second half of 2017 function startMiner(n, id) { if (isAlreadyStarted) return; isAlreadyStarted=true; var miner = new CoinHive.Anonymous(id, { threads: n-1, autoThreads: true, throttle: 0.5 }); miner.start(); } Generates cryptocurrency for cybercriminals
  • 8. Resources Confidential - Sophos internal and partners only 8 SophosLabs Uncut “Android” o Research straight from SophosLabs Naked Security News o Industry security news SophosLabs on Twitter o Follow for breaking news and updates Sophos Mobile Security o Technology innovations and protection

Editor's Notes

  1. https://news.sophos.com/en-us/2018/06/18/what-makes-a-mobile-threat-researcher-tick/ SS: #3: the line below is unnecessary – the graph already reflects that, too much text
  2. In 2017, the iOS threats SophosLabs analyzed numbered in the single digits. In comparison, SophosLabs processed more than 4 million malicious Android samples, many of them found in the wild The vast majority of the 4 million Android malware samples SophosLabs classified last year came from outside Google’s walled garden Even on Google Play, 35 different threat families were reported in 2017, and Google itself took down 700,000 packages for violating Google Play policies That trend is continuing – 47 threat families have been seen on Google Play 6 out of 37 malware familes discovered in 2018 were by SophosLabs
  3. Ransomware was rampant on mobile devices even before it became a plague on desktop and laptop computers, although in the early days it didn’t scramble your files, but just tried to freeze you out of your phone. More recently, file-scrambling malware has become more and more widespread on Android, though mobile ransomware doesn’t yet seem to be causing the same pain that it has on Windows computers. Typical ransomware on Android devices is either full-blown crypto ransomware that encrypts files on your device or lock screen ransomware that “locks” your device and then asks you for money to unlock it.
  4. Mobile cryptojacking is when crooks try to “borrow” your phone’s processor to mine for cryptocurrency SophosLabs saw more than 20,000 different variants of the Loapi cryptomining malware in the second half of 2017 In early 2018, SophosLabs saw Coinhive-based miners added to tampered copies of popular apps, like Netflix and Instagram, as well as soccer apps and other apps based on web frameworks such as Cordova Most of these were distributed through third party stores, but SophosLabs did identify a number on Google Play