Kaspersky Lab unveiled the latest version of Kaspersky Security Cloud, an adaptive security service that goes beyond traditional antivirus to safeguard consumers from any digital threats that they encounter.Learn more >
Woburn, MA – February 27, 2017 – Kaspersky Lab today announced the findings of its Mobile Virusology malware report for 2016, which found a near-threefold rise in mobile malware detections compared to 2015 – with a total of 8.5 million malicious installations identified. The annual report also highlights the evolution of mobile banking Trojans. Specialist officers from the INTERPOL Global Complex for Innovation have contributed an analysis of mobile malware on the Dark Web to the report.
In the span of just one year, a volume equivalent to 50% of all the malware detected in the previous 11 years (15.77 million in 2004 – 2015) was released. Leading the way were mobile advertising Trojans which now make up 16 of the top 20 malicious programs. In addition, Kaspersky Lab mobile security products reported:
- Nearly 40 million attacks attempts by mobile malware, with over 4 million users of Android-based devices protected (vs 2.6 million in 2015)
- Over 260,000 detections of installation packages for mobile ransomware Trojans (an increase of almost 8.5 times, year-on-year)
- More than 153,000 unique users targeted by mobile ransomware (an increase of 1.6 times compared with 2015)
- Over 128,000 mobile banking Trojans detected (nearly 1.6 times more than in 2015)
Advertising Trojan: is your device already rooted?
- The most widespread type of Trojan in 2016 was the advertising variety, accounting for 16 of the top 20 malware programs
These Trojans are capable of seizing rooting rights, allowing the malware to not only aggressively display ads on the infected device, often making it impossible to use, but also to secretly install other applications. These Trojans can also buy apps on Google Play.
In many cases, the Trojans were able to exploit previously patched vulnerabilities because the user had not installed the latest update.
Further, this malware simultaneously installs its modules in the system directory, which makes the treatment of the infected device very difficult. Some advertising Trojans are even able to infect the recovery image, making it impossible to solve the problem by restoring the device to factory settings.
Representatives of this class of malicious software have been repeatedly found in the official Google Play app store, for example, masquerading as a guide for Pokemon GO. In this case, the app was downloaded over 500,000 times, and is detected as a Trojan.AndroidOS.Ztorg.ad.
Mobile ransomware: further development
- In 2016, 153,258 unique users from 167 countries were attacked by Trojan-Ransom programs; this is 1.6 times more than in 2015.
Modern ransomware overlays windows with demand messages, thus making it impossible to use the device. This principle was used by the most popular mobile ransomware program in 2016 – Trojan-Ransom.AndroidOS.Fusob.
This Trojan mostly attacks users in Germany, the US and the UK, but avoids users from the CIS and some neighboring countries. Once launched, it runs a check of the device language and, after achieving some results, it may stop execution. The cybercriminals behind the Trojan usually demand between $100 and $200 to unblock a device and the ransom has to be paid using codes from pre-paid iTunes cards.
Mobile banking Trojan: a skyrocketing threat
- In 2016, over 305,000 users in 164 countries were attacked by mobile banking Trojans, compared with just 56,000 users in 137 countries the previous year.
- Russia, Australia and Ukraine are the top three countries affected in terms of the percentage of users attacked by mobile banking Trojans relative to all users hit by mobile malware.
Mobile banking Trojans continued to evolve through the year. Many of them gained tools to bypass the new Android security mechanisms and were able to continue stealing user information from the most recent versions of the OS. At the same time, the developers of mobile banking Trojans repeatedly enhanced their creations with new capabilities. For instance, the Marcher family, in addition to implementing the usual banking applications’ overlay, redirected users from financial institutions’ websites to phishing pages.
The Dark Web delusion
According to specialist officers from INTERPOL’s Global Complex for Innovation, who have also contributed to the report, the Dark Web remains an attractive medium for conducting illicit businesses and activities. Given its robust anonymity, low prices and client-oriented strategy, the Dark Web provides a means for criminal actors to communicate and engage in commercial transactions, buying and selling various products and services, including mobile malware kits. Mobile malware is offered for sale as software packages (e.g. remote access Trojans - RATs), individual solutions and sophisticated tools, like those developed by professional firms or, on a smaller scale, as part of a ‘Bot as a Service’ model. Mobile malware is also a ‘subject of interest’ on vendor shops, forums and social media.
“In 2016, the growth in the number of advertising Trojans capable of exploiting super-user rights continued. Throughout the year, it was the top threat and we see no sign of this trend changing. Cybercriminals are taking advantage of the fact that most devices do not receive OS updates (or receive them late), and are thus vulnerable to old, well-known and readily available exploits. Moreover, we see that the mobile landscape is getting a little crowded for cybercriminals, and they are beginning to interact more with the world beyond smartphones. Perhaps in 2017 we will see major attacks on IoT components launched from mobile devices,” concludes Roman Unuchek, Senior Malware Analyst at Kaspersky Lab USA.
To learn more about the mobile malware evolution in 2016, read the blog post available at Securelist.com.
About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.
For the latest in-depth information on security threat issues and trends, please visit:
Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter
Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter
Articles related to Press Releases
Kaspersky Lab’s quarterly analysis finds banks, e-shops and payment systems attacked most by phishersLearn more >
Muddy Water APT leveraging spear-phishing to extend beyond its traditional Middle East targetsLearn more >