Thursday, August 26, 2021

Cyber Security | Mobile Security & Malware

Mobile Security & Malware Attacks

Malware attack on smart phones, malicious dot apk files, Trojans, ransomware and viruses are known threats to mobile devices now a days. Rapidly increasing the use of mobile devices resulted in, mobile devices are becoming an increasingly attractive target of Cyber attackers or hackers. 

In case of Android mobiles, all the applications are available at Google Play store only. In that case, those are again verified or vetted by third party or google team before available on play store. Still there are some malware based payloads come through image file, video file, pdf files, etc. in hidden format unknowingly. As applications allowing users to view and make transactions on financial accounts, auction listings, paying bills, subscription renewals and shopping accounts linked to credit cards/ debit cards / Internet banking are becoming commonplace. The functionality of such applications are expanding to the certain point where they will be an favorite target for online cyber criminals. 

Again there are many associated risk of exposure of credentials to critical online services, banking apps, payment wallets, mobile devices can also expose information such as business contacts, call logs, geographic data, personal information including private photos and internal company information. 

Present malwares automatically sends SMS, pays self bills, destroys data, takes remote control on devices, installing key loggers, harvests tracking information on users, and even uses desktop computers to spread itself. Worms have expanded to use hardware ports such as Bluetooth, memory cards, and Wi-Fi as replication channels.

Even many worms and Trojans have been subjected of widely published press releases by security and antivirus vendors with their POC, which has made it somewhat unclear what the real threats posed are.  There are in fact a large number of mobile viruses and malicious programs, but few have succeeded in terms of infection rate.

Below are few examples on mobile device malware software:

Cabir

The first ever discovered mobile malware was planned for the Symbian OS in the form of the Cabir worm, and was largely analogous to early PC viruses the purpose was simple replication or vandalism. Cabir spread over Bluetooth connections, prompting users within range to install an application and asking repeatedly until the user accepted. The worm then made system modifications and began to scan for other Bluetooth peers within range. However, Cabir never gained a significant foothold in the market.

Beselo.B

The first worm that was used media files to spread was Beselo.B. This worm sent either JPG, MP3, or RM files over Bluetooth and MMS. It also copied itself onto Multi Media Cards (MMC), where it would infect any other phone into which the card was inserted. But it was not spreaded extensively.

WinCE/Brador.a

The Brador.a Trojan infected earlier Windows Mobile devices (2003), notifying the Trojan’s owner of the compromise and then listening on a TCP port for remote instructions. It had simple backdoor capabilities, that was allowing for uploading and downloading files, self executing commands, and sending list of directories and trees.

Finally the best practices are to keep your mobile safe and secure;

  • Always keep your applications updated from trusted sites.
  • Use antiviruses in mobiles
  • Do not click unknown links and unverified links
  • Do not believe on forward links always, without checking HTTPs
  • Padlock symbol need to be watched also.
  • For more on security tips you can check another post in this blog.

Do you have further queries and suggestions, feel free to add in comment section.

-DR


No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....