Google Android smartphone owners have plenty to be wary of on the security front, according to a new report from Lookout Mobile Security.
Android handset users are 2.5 times more likely to be affected by malware today than they were six months ago, as anywhere from 500,000 to a million users were impacted by malware on their smartphone or tablet computer, Lookout said in its new 2011 Mobile Threat report.
Three out of 10 Android gadget owners are likely to encounter a Web-based threat on their device each year, with the number of malware-infested Android apps soaring from 80 apps in January to more than 400 apps through June 2011.
One such data-chomping exploit reared its head in the form of an Android malware package that records the phone conversations of mobile phone users affected with the payload.
Computer Associates security expert Dinesh Venkatesan reproduced the malware by showing how the Trojan logs all the details of incoming and outgoing calls and call duration in a text file. This Trojan drops a configuration file that contains key information about the remote server and the parameters. That file stores the recorded call in the phone’s SD card.
“As it is already widely acknowledged that this year is the year of mobile malware, we advise the smartphone users to be more logical and exercise the basic security principles while surfing and installing any applications,” Venkatesan noted.
Symantec said that fears of this malware were overblown because Android’s hardware fragmentation – differences among myriad devices from Samsung, HTC, Motorola and others – limit the spread of this call recording threat. This is because the bug crashed on most devices Symantec tried to run it.
Debate over the severity of the call recording payload aside, Lookout is seeing other creative malware in action, including threats it calls “malvertising” and “update attacks.”
In malicious advertising, perpetrators purchase mobile ads that point users toward malicious Website to trigger a dangerous payload download. The GGTracker malware used this tactic.
In the update attack, the attacker publishes a legitimate app to an application market and then releases an update to the app that includes malware so the entire user base gets infected. The Legacy malware used this attack on users.
“The value of mobile payment transactions is projected to reach almost $630 billion by 2014, up from $170 billion in 20105. Vendors, retailers, merchants, content providers, mobile operators, and banks are all actively establishing new payment services. Mobile payments create an attractive target for attackers, as they allow direct monetisation of attacks,” Lookout said.
Google believes its Wallet service, which pairs near field communications with smartphones for tap-and-pay services at participating retailers, offers the security to keep credit card info safe with an NFC chip on Android-based Nexus S smartphones. The service has not launched but, when it does, attackers will test it.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…