Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Cybersecurity
    • Development
    • Mobile
    • Networking

    Android Malware Affected Up to 1M Users in 2011

    Written by

    Clint Boulton
    Published August 3, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Google (NASDAQ:GOOG) Android smartphone owners have plenty to be wary of on the security front, according to a new report from Lookout Mobile Security.

      Android handset users are 2.5 times more likely to be affected by malware today than they were 6 months ago, as anywhere from 500,000 to 1 million users were impacted by malware on their smartphone or tablet computer, Lookout said in its new 2011 Mobile Threat report.

      Moreover, three out of 10 Android gadget owners are likely to encounter a Web-based threat on their device each year, with the number of Android apps infected with malware soaring from 80 apps in January to more than 400 apps through June 2011.

      Lookout, whose report includes aggregated data from more than 700,000 applications and 10 million devices worldwide, noted that “attackers are deploying a variety of increasingly sophisticated techniques to take control of the phone, personal data, and money.”

      One such data-chomping exploit reared its head in the form of an Android malware package that records the phone conversations of mobile phone users affected with the payload.

      Computer Associates security expert Dinesh Venkatesan reproduced the malware by showing how the Trojan logs all the details of incoming and outgoing calls and call duration in a text file. This Trojan drops a configuration file that contains key information about the remote server and the parameters. That file stores the recorded call in the phone’s SD card.

      “As it is already widely acknowledged that this year is the year of mobile malware, we advise the smartphone users to be more logical and exercise the basic security principles while surfing and installing any applications,” Venkatesan noted.

      However, Symantec said Aug. 3 that fears of this malware were overblown because Android’s hardware fragmentation — differences among myriad devices from Samsung, HTC, Motorola and others– limit the spread of this call recording threat. Symantec tested the bug on several devices and it crashed on most of them.

      Debate over the severity of the call recording payload aside, Lookout is seeing other creative malware in action, including threats it calls “malvertising” and “update attacks.”

      In malicious advertising, perpetrators purchase mobile ads that point users toward malicious Website to trigger a dangerous payload download. GGTracker was one such malware to use this tactic.

      In the update attack, the attacker publishes a legitimate app to an application market and then releases an update to the app that includes malware so the entire user base gets infected. The Legacy malware used this attack on users.

      Security aficionados and pundits may debate the notion of whether users should drop their Android phones and flee for the comfort of the more secure, locked down Apple iPhone and the iTunes App Store.

      However, it might be more useful to look at what’s driving the mobile threats on Android. Lookout said mobile payment services, which includes Google Wallet, ISIS and American Express’ Serve, are key attack vectors.

      “The value of mobile payment transactions is projected to reach almost $630 billion by 2014, up from $170 billion in 2010. Vendors, retailers, merchants, content providers, mobile operators, and banks are all actively establishing new payment services. Mobile payments create an attractive target for attackers, as they allow direct monetization of attacks,” Lookout said.

      Google believes its Wallet service, which pairs near field communications with smartphones for tap-and-pay services at participating retailers, offers the security to keep credit card info safe with an NFC chip on Android-based Nexus S smartphones.

      The service hasn’t launched, but when it does, attackers will test it.

      Clint Boulton
      Clint Boulton

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×