100169 V2 BCG Mobile Malware Infographic
Total Page:16
File Type:pdf, Size:1020Kb
KNOW THY With mobile usage at an all time high, malware specifically designed for smartphones has become more prevalent and sophisticated. MOBILE ENEMY. We’re here to help. Mobile malware can take on many different forms: POTENTIALLY UNWANTED SOFTWARE (PUS) The Basics How PUS Starts Signs of a PUS Attack • Often poses as • Users allow permission • Sudden increase in junk antivirus software because attack poses as SMS texts antivirus software • Similar to adware • Data stolen from your or spyware contacts list and shared with third parties • Millions of variations already exist RANSOMWARE The Basics Complete Anonymity Ransomware & Fear • Advanced cryptographic • Assailants demand • Most aren’t likely to report Accept threats that hold untraceable ransom ransomware acquired from les hostage payment (Bitcoin) embarrassing sources (ie. porn) • Ransom is due within • Attackers use Tor network a strict time limit to hide destination • Often payment doesn’t mean before les become of payment the bad guys uphold their permanently inaccessible end of the bargain • .onion addresses often used in ransom demands How Ransomware Starts • Installing risky mobile apps from insecure websites INFORMATION LEAKAGE Every Move is Monitored IMEI Identifier Broadcast Personal Privacy Threats Within Mobile Network • Often results from app • Can lead to cloned • Utilize GPS satellite designers who don’t phones where service systems to create digital encrypt or do it wrong is hijacked “breadcrumbs” showing activity • Reveal where people live, work, socialize, etc. using social networking options TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE Users now have one device for everything— #1 Porn #2Suspicious chances of personal use impacting business networks at 36% WebAd networks/large networks are higher than ever. driving users to malnets SAFETY TIPS Seek visibility solutions that extend to mobile. Protect guest Wi-Fi with intelligent data-access policies. Warn users about risks, including: • Surfing for porn • Searching for free/cracked • Connecting to free or versions of apps unsecured networks • Downloading apps from unofcial sources • Jail-breaking your phone Know where you’re going: Use “press-and-hold” technique to reveal true destinations of links. Knowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your networkKnowledge safe. Want is topower. know more? Now Read that the you’re full annual aware report of at bluecoat.com/XXXXXXXthe mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more? Call - 1-866-30-BCOAT Email - [email protected] Read the full report at bluecoat.com/mobile-malware Copyright © 2015, Blue Coat Systems, Inc. All Rights Reserved. Network + Security + Cloud Blue Coat and the Blue Coat logo are registered trademarks of Blue Coat Systems, Inc..