Unwanted App Distribution on Android Devices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Identifying Threats Associated with Man-In-The-Middle Attacks During Communication Between a Mobile Device and the Back End Server in Mobile Banking Applications
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 35-42 www.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications Anthony Luvanda1,*Dr Stephen Kimani1 Dr Micheal Kimwele1 1. School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, PO Box 62000-00200 Nairobi Kenya Abstract: Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications. -
100169 V2 BCG Mobile Malware Infographic
KNOW THY With mobile usage at an all time high, malware specifically designed for smartphones has become more prevalent and sophisticated. MOBILE ENEMY. We’re here to help. Mobile malware can take on many different forms: POTENTIALLY UNWANTED SOFTWARE (PUS) The Basics How PUS Starts Signs of a PUS Attack • Often poses as • Users allow permission • Sudden increase in junk antivirus software because attack poses as SMS texts antivirus software • Similar to adware • Data stolen from your or spyware contacts list and shared with third parties • Millions of variations already exist RANSOMWARE The Basics Complete Anonymity Ransomware & Fear • Advanced cryptographic • Assailants demand • Most aren’t likely to report Accept threats that hold untraceable ransom ransomware acquired from les hostage payment (Bitcoin) embarrassing sources (ie. porn) • Ransom is due within • Attackers use Tor network a strict time limit to hide destination • Often payment doesn’t mean before les become of payment the bad guys uphold their permanently inaccessible end of the bargain • .onion addresses often used in ransom demands How Ransomware Starts • Installing risky mobile apps from insecure websites INFORMATION LEAKAGE Every Move is Monitored IMEI Identifier Broadcast Personal Privacy Threats Within Mobile Network • Often results from app • Can lead to cloned • Utilize GPS satellite designers who don’t phones where service systems to create digital encrypt or do it wrong is hijacked “breadcrumbs” showing activity • Reveal where people live, work, socialize, etc. using social networking options TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE Users now have one device for everything— #1 Porn #2Suspicious chances of personal use impacting business networks at 36% WebAd networks/large networks are higher than ever. -
State of Mobile Data 2019 Report by Nendo
A Nendo Publication THE STATE OF MOBILE DATA 2019 Context, Consumption, Control Contents ACKNOWLEDGEMENTS 03 CONSUMPTION CONTROL BACKGROUND 03 THE 5 S'S OF KENYAN INTERNET USE 24 SOFTWARE 39 THE ATTENTION ECONOMY 04 MINIMISING USAGE 39 SEARCH 25 THE 3 C'S OF THE INTERNET 04 MONITORING 42 SOCIAL 26 ZERO-RATING 42 SPORT 27 CONTEXT WI-FI AND ALTERNATIVE MEANS OF 44 SEX 28 CONNECTIVITY THE MOBILE PHONE AND THE 10 STORIES 28 INFORMATION SUPERHIGHWAY LITE-APPS OVER FULL APPS 46 IN THE BEGINNING WAS THE CYBER CAFÉ 10 INTERNET & MOBILE DATA BUNDLE 30 SWITCHING TO ANDROID GO-EDITION 46 THE MODERN CYBER CAFÉ - TYPE, 12 PRICING - AFFORDABILITY AND 30 TRANSSION & BOOMPLAY 47 REGISTER, PRINT OPTIONS IS THE WEB OPTIMISED FOR 48 BILLING & BYTES: THE CYBER CAFÉ VS 13 THE COST OF ACCESS 31 PREMIUM EXPERIENCES RATHER THE SMARTPHONE ADVERTISING TECHNOLOGY’S 35 THAN MEGABYTECONSTRAINTS? SMARTPHONES, FEATURE PHONES & 13 CONSUMING EFFECT ON MEGABYTES IN BASIC PHONES KENYA RECOMMENDATIONS HOW SMARTPHONES WORK 18 CAVEAT 50 HOW MANY KENYANS ARE ON THE 09 DISCLOSURES 53 INTERNET? END NOTES 54 State of Mobile Data 2019: Introduction 02 About Author Acknowledgements Mark Kaigwa is the Founder of Nendo - a digital My appreciation goes to Wanjiru Kaigwa for her growth consultancy delivering Advisory, Academy support in bringing this report to life and being a and Agency services. As a speaker, he has travelled sounding board throughout the writing process. My to over 37 countries around the world in a quest to thanks to Makena Onjerika for her editorial deliver projects, workshops and insights about assistance. -
Mobile Malware
CS 155 Spring 2016 Mobile Malware John Mitchell Outline • Mobile malware • Identifying malware – Detect at app store rather than on platform • Classification study of mobile web apps – Entire Google Play market as of 2014 – 85% of approx 1 million apps use web interface • Target fragmentation in Android – Out-of-date Apps may disable more recent security platform patches Malware Trends W Based on FairPlay vulnerability • Requires malware on user PC, installation of malicious app in App Store • Continues to work after app removed from store • Silently installs app on phone Android malware 2015 Current Android Malware Description AccuTrack This application turns an Android smartphone into a GPS tracker. Ackposts This Trojan steals contact information from the compromised device and uploads them to a remote server. Acnetdoor This Trojan opens a backdoor on the infected device and sends the IP address to a remote server. Adsms This is a Trojan which is allowed to send SMS messages. The distribution channel ... is through a SMS message containing the download link. Airpush/StopSMS Airpush is a very aggresive Ad-Network. … BankBot This malware tries to steal users’ confidential information and money from bank and mobile accounts associated with infected devices. http://forensics.spreitzenbarth.de/android-malware/ Trends 2014-15 Android free antivirus apps … 1. Comodo Security & Antivirus 2. CM Security Antivirus AppLock 3. 360 Security - Antivirus Boost 4. Sophos Free Antivirus and Security 5. Malwarebytes Anti- Malware 6. Bitdefender Antivirus -
Mobile Malware Security Challenges and Cloud-Based Detection
Mobile Malware Security Challeges and Cloud-Based Detection Nicholas Penning, Michael Hoffman, Jason Nikolai, Yong Wang College of Business and Information Systems Dakota State University Madison, SD 57042 {nfpenning, mjhoffman13054, janikolai}@pluto.dsu.edu, [email protected] Abstract— Mobile malware has gained significant ground since the techniques, privilege escalation, remote control, financial dawning of smartphones and handheld devices. TrendLabs charge, and information collection, etc. The previous stated estimated that there were 718,000 malicious and high risk Android techniques provide a malicious attacker with a variety of options apps in the second quarter of 2013. Mobile malware malicious to utilize a compromised mobile device. infections arise through various techniques such as installing repackaged legitimate apps with malware, updating current apps Many mobile malware prevention techniques are ported from that piggy back malicious variants, or even a drive-by download. desktop or laptop computers. However, due to the uniqueness of The infections themselves will perform at least one or multiple of smartphones [6], such as multiple-entrance open system, the following techniques, privilege escalation, remote control, platform-oriented, central data management, vulnerability to financial charge, and information collection, etc. This paper theft and lost, etc., challenges are also encountered when porting summarizes mobile malware threats and attacks, cybercriminal existing anti-malware techniques to mobile devices. These motivations behind malware, existing prevention methods and challenges include, inefficient security solutions, limitations of their limitations, and challenges encountered when preventing signature-based mobile malware detection, lax control of third malware on mobile devices. The paper further proposes a cloud- party app stores, and uneducated or careless users, etc. -
Leading Chinese Cross-Border Brands – the Top 50
Leading Chinese cross-border brands The Top 50 kpmg.com/cn © 2018 KPMG, a Hong Kong partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. Contents Foreword: KPMG & Facebook 2 Executive summary 4 Methodology 6 Top 50 Chinese global brands 8 Survey commentary 10 Chinese brands going global – business opportunities for SMEs 32 • Thought leader: Yan Zhu, Head, Institute of Internet Industry, Tsinghua University 34 Going global and ensuring market diversification 36 Customer centricity 44 Thought leaders 58 • Kaitian Zeng, Co-founder, 37 Interactive Entertainment 58 • Yue Leng, General Manager, Tmall Global, Alibaba Group 59 • Scott Thiel, Partner, DLA Piper 60 • Gu He, Vice President, Shenzhen Globalegrow E-Commerce Co., Ltd. 62 • Chibo Tang, Managing Director, Gobi Partners 63 • Ethan Wang, Vice President, NetEase 64 • Scott Kronick, Chief Executive, Public Relations & Influence, Asia, Ogilvy 65 • Alen Wu, Vice President, OPPO Mobile; Head of Business, Overseas Markets 66 • Beehong Hong, General Manager, Brand Management Centre, TRANSSION Holdings 67 Acknowledgements 68 About us 69 Contact us 70 Leading Chinese cross-border brands: The Top 50 1 © 2018 KPMG, a Hong Kong partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. © 2018 KPMG, a Hong Kong partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. Foreword Global trade has long been a hallmark of Chinese business culture. -
Mobile Malware Network View Kevin Mcnamee : Alcatel-Lucent Agenda
Mobile Malware Network View Kevin McNamee : Alcatel-Lucent Agenda • Introduction • How the data is collected • Lies, Damn Lies and Statistics • Windows PC Malware • Android Malware • Network Impact • Examples of malware • DDOS Monitoring the Mobile Network • Monitor GTP-C traffic MOBILE NETWORK SECURITY ANALYTICS - Maps IMSI, APN & EMEI to IP address - Associates infection with a specific device or user Forensic Analysis • Monitor GTP-U traffic Alert - Malware C&C Aggregation & Analysis - Exploits Malware - DDOS Detection Sensor - Hacking 10GE or GE NodeB SGSN RAN Alternate Tap Recommended Alternate tap RNC (Iu-PS and S1-u) Tap (Gn and choice (Gi and Internet S5/8) SGi) GGSN/PGW eNodeB SGW 3 Monitoring the Mobile Network • Analytics Provides MOBILE NETWORK SECURITY ANALYTICS - Raw security alerts - Trigger packets - Infection history by device Forensic Analysis - Infection history by malware Alert • Reports Aggregation & Analysis - Most active malware Malware Detection - Network impact Sensor - Infection rates 10GE or GE NodeB SGSN RAN Alternate Tap Recommended Alternate tap RNC (Iu-PS and S1-u) Tap (Gn and choice (Gi and Internet S5/8) SGi) GGSN/PGW eNodeB SGW 4 Detection Rules Development Process MALWARE TRAFFIC SAMPLES POLICY MALWARE ZERO DAY RULES TRAFFIC BEHAVIORAL VIRUS VAULT SANDBOX DEVELOPMENT LIBRARY RULES LIBRARY RULES • 120K+ ANALYZED PER DAY • 30M+ Active samples RULE ACTIVATION RULES REPOSITORY DEPLOYMENT-SPECIFIC RULE SETS FEEDBACK FROM FIELD QUALITY TESTS TESTING FIELD TESTING IN LIVE NETWORKS 5 Infection Rate • C&C detection measures actual infections as seen from the network • Problem is growing (by 25% in 2014) • LTE device 5 times more likely to be infected 6 Estimates of Mobile Malware infection However… rates vary wildly - ALU, Lookout & Google report 0.4% to 0.6% - Verizon Breach Report quoted 0.03% - Damballa quoted 0.0064% at RSA. -
MOBILE MALWARE EVOLUTION 2016 Contents the Year in Figures
MOBILE MALWARE EVOLUTION 2016 Contents The year in figures ......................................................................................................................................... 2 Trends of the year .......................................................................................................................................... 2 Malicious programs using super-user rights ............................................................................................. 3 Cybercriminals continue their use of Google Play..................................................................................... 4 Bypassing Android’s protection mechanisms ............................................................................................ 6 Mobile ransomware................................................................................................................................... 7 A glance into the Dark Web. Contribution from INTERPOL’s Global Complex for Innovation. ..................... 8 Marketplaces ................................................................................................................................................. 8 Vendor shops, forums and social media ....................................................................................................... 9 Statistics ....................................................................................................................................................... 10 Geography of mobile threats .................................................................................................................. -
Android Malware Category and Family Detection and Identification Using Machine Learning
Android Malware Category and Family Detection and Identification using Machine Learning Ahmed Hashem El Fiky1*, Ayman El Shenawy1, 2, Mohamed Ashraf Madkour1 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 2 Software Engineering and Information Technology, Faculty of Engineering and Technology, Egyptian Chinese University, Cairo, Egypt. [email protected] [email protected] [email protected] Abstract: Android malware is one of the most dangerous threats on the internet, and it's been on the rise for several years. Despite significant efforts in detecting and classifying android malware from innocuous android applications, there is still a long way to go. As a result, there is a need to provide a basic understanding of the behavior displayed by the most common Android malware categories and families. Each Android malware family and category has a distinct objective. As a result, it has impacted every corporate area, including healthcare, banking, transportation, government, and e-commerce. In this paper, we presented two machine- learning approaches for Dynamic Analysis of Android Malware: one for detecting and identifying Android Malware Categories and the other for detecting and identifying Android Malware Families, which was accomplished by analyzing a massive malware dataset with 14 prominent malware categories and 180 prominent malware families of CCCS-CIC- AndMal2020 dataset on Dynamic Layers. Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate. Our approach provides a method for high-accuracy Dynamic Analysis of Android Malware while also shortening the time required to analyze smartphone malware. -
Not So Secure! Research Report on End-Point Compromises and the Risk to Internet Banking
Not so secure! Research report on end-point compromises and the risk to Internet banking Special research report. August 2016 Internet Banking has grown by leaps and bounds in India. India had over 400 million Internet users by the beginning of 2016 as per a report by IAMAI and IMRB. This is the highest number of Internet banking users in any country. While having a high number of Internet banking users indicates healthy adoption of IT and reduced costs for banks, it also means that this population is vulnerable to cyberthreats which can put their hard-earned money at risk. One of the biggest addressable risks which users face is man-in-the-browser and end-point compromise attacks. “Virtual keyboards are ineffective in preventing the theft of end-user credentials and banks need to look at end point security more holistically. End-point compromise is an attack in which the end user’s computer and, in many cases these days, a browser is compromised using a simple program—generally a browser plugin or browser extension. The program is designed to steal the Internet banking credentials of the end users. Our security research team looked at the Internet banking websites of 26 banks in India. We found that over 21 banks have inadequate mechanisms to detect or prevent attacks which could compromise the end user credentials. This finding has significant implications as the end user is generally gullible, and many users can be made to download a browser extension/plugin which is capable of capturing banking credentials. Mechanisms which are currently prevalent, such as the virtual keyboard, which were long considered a protection against such attacks, were found to be inadequate to prevent these attacks. -
Handset ODM Industry White Paper
Publication date: April 2020 Authors: Robin Li Lingling Peng Handset ODM Industry White Paper Smartphone ODM market continues to grow, duopoly Wingtech and Huaqin accelerate diversified layout Brought to you by Informa Tech Handset ODM Industry White Paper 01 Contents Handset ODM market review and outlook 2 Global smartphone market continued to decline in 2019 4 In the initial stage of 5G, China will continue to decline 6 Outsourcing strategies of the top 10 OEMs 9 ODM market structure and business model analysis 12 The top five mobile phone ODMs 16 Analysis of the top five ODMs 18 Appendix 29 © 2020 Omdia. All rights reserved. Unauthorized reproduction prohibited. Handset ODM Industry White Paper 02 Handset ODM market review and outlook In 2019, the global smartphone market shipped 1.38 billion units, down 2.2% year-over- year (YoY). The mature markets such as North America, South America, Western Europe, and China all declined. China’s market though is going through a transition period from 4G to 5G, and the shipments of mid- to high-end 4G smartphone models fell sharply in 2H19. China’s market shipped 361 million smartphones in 2019, a YoY decline of 7.6%. In the early stage of 5G switching, the operator's network coverage was insufficient. Consequently, 5G chipset restrictions led to excessive costs, and expectations of 5G led to short-term consumption suppression. The proportion of 5G smartphone shipments was relatively small while shipments of mid- to high-end 4G models declined sharply. The overall shipment of smartphones from Chinese mobile phone manufacturers reached 733 million units, an increase of 4.2% YoY. -
Section 3: China's Strategic Aims in Africa
SECTION 3: CHINA’S STRATEGIC AIMS IN AFRICA Key Findings • Beijing has long viewed African countries as occupying a cen- tral position in its efforts to increase China’s global influence and revise the international order. Over the last two decades, and especially under General Secretary of the Chinese Com- munist Party (CCP) Xi Jinping’s leadership since 2012, Beijing has launched new initiatives to transform Africa into a testing ground for the export of its governance system of state-led eco- nomic growth under one-party, authoritarian rule. • Beijing uses its influence in Africa to gain preferential access to Africa’s natural resources, open up markets for Chinese exports, and enlist African support for Chinese diplomatic priorities on and beyond the continent. The CCP flexibly tailors its approach to different African countries with the goal of instilling admira- tion and at times emulation of China’s alternative political and governance regime. • China is dependent on Africa for imports of fossil fuels and commodities constituting critical inputs in emerging technology products. Beijing has increased its control of African commodi- ties through strategic direct investment in oil fields, mines, and production facilities, as well as through resource-backed loans that call for in-kind payments of commodities. This control threatens the ability of U.S. companies to access key supplies. • As the top bilateral financier of infrastructure projects across Africa, China plays an important role in addressing the short- age of infrastructure on the continent. China’s financing is opaque and often comes with onerous terms, however, leading to rising concerns of economic exploitation, dependency, and po- litical coercion.