Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Top Five Android Threats Explained

Sophos : 15 June, 2012  (Technical Article)
Sophos gives details behind the top five malware threats to the popular Android smartphone operating system
Top Five Android Threats Explained
IT security and data protection firm Sophos has revealed the extent of malware targeting Android mobile phones, by analysing detection statistics from its Sophos Mobile Security app.  This data was taken from installations of the app on Android smartphones and tablets in 118 different countries around the world.

SophosLabs' research revealed the top five most commonly detected malware on
Android:

1 Andr/PJApps-C - 63.4%
2 Andr/BBridge-A - 8.8%
3 Andr/Generic-S - 6.1%
4 Andr/BatteryD-A - 4.0%
5 Andr/DrSheep-A - 2.6%

Others - 15.1%

1 Andr/PJApps-C.  When Sophos Mobile Security for Android detects an app as Andr/PJApps-C it means that it has identified an app that has been cracked using a publicly available tool.  Most commonly these are paid for apps that have been hacked.  They are not necessarily always malicious, but are very likely to be illegal.

2 Andr/BBridge-A.  Also known as BaseBridge, this malware uses a privilege escalation exploit to elevate its privileges and install additional malicious apps onto Android devices.  It uses HTTP to communicate with a central server and leaks potentially identifiable information.  These malicious apps can send and read SMS messages, potentially costing the mobile owner money.  In fact, it can even scan incoming SMS messages and automatically remove warnings that you are being charged a fee for using premium rate services it has signed the user up for.

3 Andr/Generic-S.  Sophos Mobile Security generically detects a variety of families of malicious apps as Andr/Generic-S.  These range from privilege escalation exploits to aggressive adware such as variants of the Android Plankton malware.

4 Andr/BatteryD-A.  This "Battery Doctor" app falsely claims to save battery life on an Android device.  But it actually sends potentially identifiable information to a server using HTTP, and aggressively displays adverts.

5 Andr/DrSheep-A.  This is an Android equivalent of the desktop tool Firesheep.  It can allow malicious hackers to hijack Twitter, Facebook and Linkedin sessions in a wireless network environment.

"The volume of malware that we've discovered highlights that mobile security is a real and growing problem, especially on Android," said Graham Cluley, senior security consultant at Sophos.  "Criminals are creating more and more targeted malware for different platforms, and smartphone users need to wise up to the fact that security is no longer limited to PCs, but mobiles and tablets are also at risk if not sufficiently protected."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo