Sunday 28 February 2016

Around 2.3 Million Android Malware Samples Detected In 2015

Around 2.3 Million Android Malware Samples Detected In 2015

Around 2.3 Million Android Malware Samples Detected in 2015

The German cyber-security firm G DATA said that "during 2015, a sample of the Android malware has appeared every 11 seconds, and in total 2,333,777 malware samples for the whole year, it was raised 50% as compared to the previous year 2014 when it was only 1,548,129 samples."

According to the G DATA's Q4 2015 Mobile Malware Report, revealed that during the last quarter of 2015, researchers also came across 758,133 new Android malware files, which was only the increase of 32% from previous quarter.

When they put the past year criminals they found that around 2.5 different malicious Android apps spread their malware families.

The reason behind the assault on Android devices may be the increased fame of Android and their market shares too, which continue to be high as it ever was. User uses their mobile phones, tablets for financial and banking operations too.

Since most crooks are motivated by financial gains, they tend to follow the money, and so, have expanded their malware arsenal to include more tools that target the Android ecosystem.

Malware grew in sophistication is not just your run-of-the-mill viruses. In past month, it was discovered by the security companies researchers that most of the target to the Android device is to steal and gain access to the financial information.

"The most dangerous Android malware are Mazar BOT, Acecard, Asacub and Xbot, which is categorized as a ransomware, information stealers, and even banking trojans."

Internet of Things(IoT) is also the reason for the increase in mobile malware said by G DATA researchers. Many of the sensitive information are held by the Internet-connected devices and are managed by the mobile apps.

Whatever the targeting flaws contain by these mobile apps, hackers get to the IoT devices by the help of these mobile apps. When the device's firmware can't be modified with a bootkit component, then the mobile app is used as a persistent infection point.


Post a Comment

Note: only a member of this blog may post a comment.

Toggle Footer