KNOW THY With mobile usage at an all time high, specifically designed for has become more prevalent and sophisticated. MOBILE ENEMY. We’re here to help. Mobile malware can take on many different forms: POTENTIALLY UNWANTED SOFTWARE (PUS)

The Basics How PUS Starts Signs of a PUS Attack

• Often poses as • Users allow permission • Sudden increase in junk because attack poses as SMS texts antivirus software • Similar to • Data stolen from your or contacts list and shared with third parties • Millions of variations already exist

RANSOMWARE

The Basics Complete Anonymity & Fear

• Advanced cryptographic • Assailants demand • Most aren’t likely to report Accept threats that hold untraceable ransom ransomware acquired from les hostage payment (Bitcoin) embarrassing sources (ie. porn) • Ransom is due within • Attackers use Tor network a strict time limit to hide destination • Often payment doesn’t mean before les become of payment the bad guys uphold their permanently inaccessible end of the bargain • .onion addresses often used in ransom demands

How Ransomware Starts • Installing risky mobile apps from insecure websites

INFORMATION LEAKAGE

Every Move is Monitored IMEI Identifier Broadcast Personal Privacy Threats Within Mobile Network

• Often results from app • Can lead to cloned • Utilize GPS satellite designers who don’t phones where service systems to create digital encrypt or do it wrong is hijacked “breadcrumbs” showing activity

• Reveal where people live, work, socialize, etc. using social networking options

TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE

Users now have one device for everything— #1 Porn #2Suspicious chances of personal use impacting business networks at 36% WebAd networks/large networks are higher than ever. driving users to malnets

SAFETY TIPS

Seek visibility solutions that extend to mobile. Protect guest Wi-Fi with intelligent data-access policies. Warn users about risks, including:

• Surfing for porn • Searching for free/cracked • Connecting to free or versions of apps unsecured networks • Downloading apps from unof cial sources • Jail-breaking your phone

Know where you’re going: Use “press-and-hold” technique to reveal true destinations of links.

Knowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your networkKnowledge safe. Want is topower. know more? Now Read that the you’re full annual aware report of at bluecoat.com/XXXXXXXthe mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more? Call - 1-866-30-BCOAT Email - [email protected] Read the full report at bluecoat.com/mobile-malware

Copyright © 2015, Blue Coat Systems, Inc. All Rights Reserved. Network + Security + Cloud Blue Coat and the Blue Coat logo are registered trademarks of Blue Coat Systems, Inc.