Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Mobile Attackers Move to Malicious Advertisements: Report

    Written by

    Robert Lemos
    Published March 7, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Web advertising that directs mobile users to malicious download sites has become the leading vector of attacks on mobile devices, according to a report released March 5 by enterprise security firm Blue Coat Systems.

      Malicious advertisements, or malvertising, has been a favorite method for cyber-criminals to spread programs that compromise victims’ systems, steal information and empty bank accounts. Now, malicious mobile advertisements account for nearly 20 percent of all attacks seen by Blue Coat Systems’ customers, stated the company’s 2014 Mobile Malware Report.

      Shopping has become the fifth most popular type of traffic on mobile devices, so it is not surprising that attackers are looking at ways to take advantage of users’ interest in products, Sasi Murthy, senior director of product marketing for Blue Coat, told eWEEK.

      “Cyber-crime is about low investment and high return,” she said. “Cyber-criminals are just capitalizing on the trends we are seeing with mobile users.”

      Attacks on mobile devices continue to be linked to the less secure application ecosystems in Asia and Eastern Europe. Infection rates in North America continue to be low, with network security firm Kindsight estimating infections at 0.55 percent, although some antivirus vendors have estimates as high as 4 percent. Nearly all—99 percent—of current malware attacks focus on Android devices, according to Cisco’s 2013 Annual Security Report.

      The Blue Coat report acknowledges that attacks require at least four stages and a great deal of user interaction. In a typical rogue antivirus scheme, for example, a user must first click on a malicious advertisement, then agree to install an application and, finally, change the third-party application installation setting for the smartphone to allow non-Google Play applications to be installed.

      “Mobile security still relies on the user to have the sense and the awareness to not click on these advertisements or to only purchase apps from legitimate marketplaces,” Murthy said.

      Because Blue Coat blocks the potential attacks, the company does not know how many of the attacks would have ultimately succeeded.

      While attacks through Web advertisements have become the most common vector, pornography remains the most dangerous category for mobile users. While less than 1 percent of all mobile content requests sought pornographic content, the category accounts for more than 16 percent of all attacks.

      Most malicious mobile software either steals personal information from the infected device or uses premium Short Message Service (SMS) communications to steal money. Data stolen from devices includes User-Agent stings, information on other apps, address book data and calendar data.

      “The lack of transparency into an app’s behavior sets users up to fail by putting them at greater risk for privacy violations,” the report stated. “It also makes it impossible for users to make risk-based decisions about the apps they want to use and the information they want to share.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×