Android: Top Three Malware Threats and Solutions
- 1 of
-
Malware Threats to Mobile Operating Systems in 2012
Android: 79%, Symbian: 19%, iOS: 0.7%, Others: 0.7%, Windows Mobile: 0.3%, BlackBerry: 0.3% -
Types of Security Threats
The report outlined security threats and mitigation strategies for the following: SMS (Short Message Service or text message) Trojan horses, rootkits, and fake Google Play domains -
SMS Trojan Horses
Almost half of the attacks on older Android OSes are done by SMS Trojans. Without the user's knowledge, the Trojans send text messages to premium-rate numbers that are owned by cyber-criminals. These texts result in exorbitant charges to the user. -
What To Do
Install an Android security suite designed to combat SMS threats. Suites can be purchased or downloaded free from the Internet. -
Rootkits
In late 2011, a rootkit was discovered running on millions of mobile devices. It logged users' locations, keystrokes, and passwords without their knowledge. -
What To Do
Install the Carrier IQ test, a free application that detects and removes the malicious software. -
Fake Google Play Domains
Google Play enables users to browse and download entertainment and media including music, books, magazines, movies and TV programs. Fake Google Play Domains are sites that cyber-criminals create to trick users into installing malicious applications so that they can steal sensitive information. -
What To Do
Install only approved applications. Follow IT department procedures to update devices' OSs. Users should install and regularly update Android antivirus software.
Google's Android, the dominant mobile operating system, is the primary target for malware attacks, according to a study released by the Department of Homeland Security and the Federal Bureau of Investigation. Android remains a primary target for malware attacks "due to its [large] market share and open source architecture," according to the report. Furthermore, 44 percent of Android users are still using versions 2.3.3 through 2.3.7, known as Gingerbread, which were released in 2011 and contain security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OSes patched and up-to-date, the report notes. Flip through the following eight slides to learn more about the report, which has been published by the Public Intelligence Website.