×

Warning

JUser: :_load: Unable to load user with ID: 3653
Wednesday, 24 July 2013 06:34

Android Phones are spying on you Featured

By

Security threats to mobile broadband networks are on the rise as consumer usage continues to grow. The biggest threat is from spyware on Android phones.

Alcatel-Lucent’s Kindsight subsidiary has released figures that show an increase in malicious software (malware) used by hackers to gain access to devices for corporate espionage, spying on individuals, theft of personal information, generating spam, denial of service attacks on business and governments and millions of dollars in fraudulent banking and advertising scams.

Alcatel-Lucent says it is in a unique position to analyse such threats due to the many network security and analytic products it has within service provider networks. Its widespread presence enables it to measure the impact of traffic types traversing the network, including malicious and cyber-security threats.

The latest Kindsight Security Labs Malware Quarterly Report found that 10% of home networks and over 0.5% of mobile devices were infected with malware, both increases from the previous quarter.

StatCounter - Free Web Tracker and Counter

Other highlights of the report include:

  • 6% of home networks exhibited high-level threats, such as ‘bots’, ‘rootkits’ and ‘Trojan’ banking viruses – all types of malware infecting computers, computer programs and applications running on computers.
  • The ZeroAccess botnet continues to be the most common malware threat, infecting 0.8% of broadband users.
  • In mobile networks, the vast majority of infected devices are either Android phones or Windows laptops tethered to a phone or connected directly through a mobile USB stick or WiFi hub.
  • Mobile malware continues to grow, with a sixfold increase in the number of Android malware samples.

“Malware and cybersecurity threats continue to be a growing problem for home networks and mobile devices, particularly for Android smartphones and tablets which are increasingly targeted,” said Kevin McNamee, security architect and director of Alcatel-Lucent’s Kindsight Security Labs.

“Users often don’t take the appropriate security precautions for their mobile devices, and even when they do a malicious app can easily evade detection by device-based anti-virus.”

The report also includes the top 20 home network infections and Internet threats, as well as analysis of malware developments, including ZeroAccess, Alureon, the Zeus banking Trojan, Uapush, QDPlugin, and others.

The Kindsight Security Labs report also includes information on the rise of mobile spyware as a threat to the BYOD (bring your own device) trend in workplaces. To demonstrate how a smartphone can become a cyber-espionage device, McNamee said Kindsight has developed a proof-of-concept spy-phone software module that can be injected into just about any Android application. From a remote web based command centre the attacker can:

  • Track the phone’s location
  • Download contact lists and personal information
  • Intercept and send messages
  • Record conversations
  • Take pictures

“A third of the top 15 security threats are now spyware related, up from only two spyware instances the last quarter,” said McNamee. “MobileSpy and FlexiSpy were already in the top 15 list, but SpyBubble moved up to take the 4th spot, while SpyMob and PhoneRecon appeared for the first time, ranking 5th and 7th respectively.

“Until now mobile spyware has been aimed at the consumer market, with the promise of being able to track your loved one’s every move through their phone. But locating teenagers and a straying spouse are only one part of the story.

Mobile spyware in the BYOD context poses a threat to enterprises because it can be installed surreptitiously on an employee’s phone and used for industrial or corporate espionage.”

McNamee said it is “surprisingly easy” to add a command and control interface to allow the attacker to control the device remotely, activating the phone’s camera and microphone without the user’s knowledge.

“This enables the attacker to monitor and record business meetings from a remote location. The attacker can even send text messages, make calls or retrieve and modify information stored on the device – all without the user’s knowledge.

“The mobile phone is a fully functional network device. When connected to the company’s Wi-Fi, the infected phone provides backdoor access to the network and the ability to probe for vulnerabilities and assets.

“With these features, an ordinary smart-phone becomes the perfect platform for launching advanced persistent threats (APTs).”

Read 8804 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Graeme Philipson

Graeme Philipson sadly passed away in Jan 2021 and he was always a valued senior associate editor at iTWire. He was one of Australia’s longest serving and most experienced IT journalists. He is the author of the only definitive history of the Australian IT industry, ‘A Vision Splendid: The History of Australian Computing.’He was in the high tech industry for more than 30 years, most of that time as a market researcher, analyst and journalist. He was founding editor of MIS magazine, and is a former editor of Computerworld Australia. He was a research director for Gartner Asia Pacific and research manager for the Yankee Group Australia. He was a long time weekly IT columnist in The Age and The Sydney Morning Herald, and is a recipient of the Kester Award for lifetime achievement in IT journalism. Graeme will be sadly missed by the iTWire Family, Readers, Customers and PR firms.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments