Mobile Malware Report Predicts 'Significant' Uptick in Cellphone Attacks

Mobile Malware Report Predicts 'Significant' Uptick in Cellphone Attacks - top government contractors - best government contracting event
Mobile Malware Report Predicts 'Significant' Uptick in Cellphone Attacks - top government contractors - best government contracting event
iPhone and IBM Simon

On the heels of a recent study warning about mobile malware emerging as the new frontier of cyber crime comes another report that discusses the evolution of both smart devices and the threats that target them.

The “Smartphone Malware Report,” by Panda Security and Spain’s National Cyber-Security Advisory Council, follows the historical milestones of mobile devices, starting with IBM Simon, the first smartphone designed in 1992, as well as discusses security issues, threat vectors, and predictions for the future.

Boosting the security of cellphones is a major challenge for any security department,  and the threat must be dealt with as soon as possible to help protect users’ information and businesses, said Luis Corrons, technical director of PandaLabs.

“Even though cellphone malware is not a priority for cyber crooks yet, we are starting to see the first major attacks on these platforms,” he said. “We predict that the next few months will see significant growth in cellphone attacks, especially on Google’s Android operating system.”

Detailing the evolution of the mobile malware, the report discusses how Cabir, the first malicious code for smartphones appeared in 2004. The malware was soon followed by Pbstealer, one of the first binary files that could steal confidential information from cellphones; Ikee.A, the first-ever iPhone worm that changed the wallpaper to an image of Rick Astley; and the more recent malicious application Droid09 that infiltrated the Android Market.

The report also highlights future threat scenarios, including:

  • Cellphones as a new method of payment
  • Online banking applications for cellphones
  • User tracking (using GPS technology)
  • Advanced social-engineering attacks

Unlike the previous generations of cellphones that were vulnerable to local Bluetooth hijacking, the report said, modern smartphones are susceptible to the same risks as PCs.

“New attack vectors will increasingly be exploited by fraudsters as online banking services use these devices as second authentication factors given the current convergence between PCs and cellphones,” the report concluded.


ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News


Written by Admin

Hacker Crackdown in Spain Brings Down Suspected Members of Anonymous
DHS Reduces Grant Funding in Effort to Focus on High-Risk Areas