Mobile Threats in June 2014 - BestCyberNews: Online News Presenter in the present world

BestCyberNews: Online News Presenter in the present world

Start knowing

Breaking

Mobile Threats in June 2014

Android users will probably remember June 2014 for the advent and wide-scale distribution of a significant number of blocker and encryption Trojans designed specifically for Android, as well as for a marked increase in the number of infections involving Android.SmsBot.120.origin. 


Also in June, Doctor Web's security researchers discovered new representatives of common malicious programs, such as spy Trojans and applications that send SMS messages to premium numbers without user consent.


According to Doctor Web statistics collected via Dr.Web for Android, in June 2014 the anti-virus registered 6,101,306 positives. As before, various advertising modules, used by developers to generate a profit from free applications, became the main cause for concern. 


These modules can display annoying notifications on the Android notification bar. Such messages often include advertisements for questionable and potentially dangerous websites. June 26 was the most “peaceful day” with only 163,580 threats discovered, while June 8 saw the greatest number of positives registered—226,002.


Traditionally, the number of malicious programs within the total number of advertising and potentially dangerous applications detected was relatively small and rarely exceeded 4%-5%, but in June the situation changed dramatically.Android.SmsBot.120.origin broke into the lead in terms of the number of infections attempted. 


It was disarmed by Dr.Web over 670,000 times, a figure that accounts for almost 11% of the total volume of identified threats. In addition to sending SMS messages to specified numbers, this malware can transmit information about infected devices (including IMEIs, lists of installed programs, etc.) to servers belonging to cyber criminals, remove installed programs and incoming SMS messages, and display notifications.

screenscreen
screen
Once this Trojan was detected, 514,893 users immediately removed it, a figure constituting 76.80% of the total number of incidents. 

In 13.88% of the cases (93,036 times) the threat was removed before the malware was installed on the device; the Trojan was moved to the quarantine 34,162 times (5.10% of the incidents), and 17,672 users (2.64%) ignored the Dr.Web warning, allowing the Trojan to run on their handhelds.


Android.SmsBot.120.origin was most frequently detected in Russia. The figure below illustrates the geographical distribution of this threat.

screen
Android.SmsSend.1215.origin and Android.SmsSend.859.origin rank second and third respectively by number of detections. The ten threats most frequently found on mobile devices by Dr.Web in June are presented in the table below.
Threat name%%
1Android.SmsBot.120.origin10,99
2Android.SmsSend.1215.origin1,43
3Android.SmsSend.859.origin1,35
4Android.SmsSend.1081.origin1,08
5Android.Spy.83.origin0,82
6Android.SmsSend.991.origin0,68
7Android.SmsSend.914.origin0,62
8Android.SmsSend.309.origin0,59
9Android.Subser.1.origin0,54
10Android.SmsSend.315.origin0,52
In late May, Doctor Web's security researchers registered incidents involving the first-ever encryption Trojan for Android.Android.Locker.2.origin would search infected devices for files containing the extensions .jpeg, .jpg, .png, .bmp, .gif, .pdf, .doc, .docx, .txt, .avi, .mkv, and .3gp, encrypt them, and then demand a ransom for their decryption. During JuneDr.Web for Android prevented 6,858 attempts to infect devices with this dangerous Trojan.

June will also be remembered for the intense distribution of Android blocker Trojans which interfere with the normal operation of infected devices. For instance, Android.Locker.5.origin primarily targets devices in China and locks the smart phone or tablet screen only temporarily, without inflicting severe damage to the information stored on the device. 


Yet the Trojans Android.Locker.6 .origin and Android.Locker.7.origin lock the touch screen and demand that the victim pay ransom to unlock it. These programs are distributed under the guise of the Adobe Flash Player and target Android handhelds in the U.S.

screenscreen
screenscreen
Learn more about these threats and ways to neutralise them in the informational material published on our website. Doctor Web urges users to be vigilant, to install applications only from trusted sources, and to use anti-virus software on their devices.

Doctor Web is the Russian developer of Dr.Web anti-virus software. We have been developing our products since 1992. The company is a key player on the Russian market for software that meets the fundamental need of any business — information security.