Sign up for our newsletter - Navigating the horizon of business technology​
Technology / Cybersecurity

Mobile Malware on the Rise, Warns McAfee

Smartphone malware development is rising sharply, threat researchers at McAfee have warned, saying the decision by Epic Games to distribute Fortnite outside of Google Play has helped normalise the granting of permissions to applications outside of typically trusted environments.

The cybersecurity company pointed in particular to surging detections of mobile backdoor threats like TimpDoor – malware now twice as prevalent as its closest competitor – along with a sharp spike in the number of “fake” apps it noted towards the end of 2018, including trojans.

With the extensive permissions typically sought by – and granted to – “legitimate” apps (i.e. the ability to install new software, track location, read and write to USB/SD storage) a growing concern, the findings may be the least of a CISOs priorities, but the growth is significant.

Read this: Why Mobile Apps are a Headache for Critical Public Services

Fake app detections in 2018. Source: McAfee

Earlier versions of the TimpDoor malware use an HTTP proxy to forward web traffic, while the newer version uses a SOCKS proxy that can reroute any network traffic, McAfee’s researchers noted.

White papers from our partners

“Establishing the tunnel and keeping it open are currently the only included functions in TimpDoor. The evolving but still basic functionality implies that this attack is still under development. Since cybercriminals are mostly interested in money, the most likely additions to this attack are ad click fraud, distributed denial of service attacks, and sending spam and phishing emails. As they evolve, we expect attacks like this to become stealthier and increasingly targeted at specific devices, companies, or demographics.”

They added: “The shift away from Google Play as the distribution mechanism is also a significant concern.”

“Tricking users into installing fake apps to listen to fake voice messages is a novel approach. Leveraging popular websites and a convincing social-engineering attack to trick users into enabling unknown sources removes the need for root exploits to gain access to the device.”

 


This article is from the CBROnline archive: some formatting and images may not be present.

CBR Staff Writer

CBR Online legacy content.