Preview

Statistics: Mobile Malware Samples

Powerful Essays
Open Document
Open Document
1404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Statistics: Mobile Malware Samples
Statistics
In Q3 2013, the number of mobile malware samples continued to grow:

Number of mobile malware samples in our collection

The distribution of mobile malware detected in Q3 2013 by type was similar to that in Q2:

Distribution of new mobile malware by behavior type, Q2 2013

The top position is still held by backdoors, although their share has fallen by 1.3 percentage points compared to Q2 2013. SMS Trojans (30%), which have gained 2.3 percentage points since the previous quarter, are in second place. As in Q2, they are followed by Trojans (22%) and Trojan-Spy malware, which accounts for 5% of the total. Together, backdoors and SMS Trojans make up 61% of all mobile malware detected during the third quarter – this is 4.5 percentage points more than in Q2.

It is common for a mobile malicious program to include several malicious components, which means backdoors often have SMS Trojan functionality and SMS Trojans may include sophisticated bot functionality.

TOP 20 mobile malicious programs

Rank Name % of all attacks
1 DangerousObject.Multi.Generic 29.15%
2 Trojan-SMS.AndroidOS.OpFake.bo 17.63%
3 Trojan-SMS.AndroidOS.FakeInst.a 8.40%
4 Trojan-SMS.AndroidOS.Agent.u 5.49%
5 Trojan.AndroidOS.Plangton.a 3.15%
6 Trojan-SMS.AndroidOS.Agent.cm 3.92%
7 Trojan-SMS.AndroidOS.OpFake.a 3.58%
8 Trojan-SMS.AndroidOS.Agent.ao 1.90%
9 Trojan.AndroidOS.MTK.a 1.00%
10 DangerousObject 1.11%
11 Trojan-SMS.AndroidOS.Stealer.a 0.94%
12 Trojan-SMS.AndroidOS.Agent.ay 0.97%
13 Exploit.AndroidOS.Lotoor.g 0.94%
14 Trojan-SMS.AndroidOS.Agent.a 0.92%
15 Trojan-SMS.AndroidOS.FakeInst.ei 0.73%
16 Trojan.AndroidOS.MTK.c 0.60%
17 Trojan-SMS.AndroidOS.Agent.df 0.68%
18 Trojan-SMS.AndroidOS.Agent.dd 0.77%
19 Backdoor.AndroidOS.GinMaster.a 0.80%
20 Trojan-Downloader.AOS.Boqx.a 0.49%Statistics
In Q3 2013, the number of mobile malware samples continued to grow:

Number of mobile malware samples in our collection

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The term "SMS" is used for all types of short text messaging and the user activity itself in many parts of the world. SMS is also employed in direct marketing, known as SMS marketing.…

    • 821 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    This is a highly technical paper that proposes software to identify mobile threats. Using observations of mobile viruses and worms the authors provide a method of detection with an accuracy rate of more than 96%. Proposed software can be a solution to growing mobile security concerns.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Aitoro, J. R. (2009). Cell phones, other wireless devices next big cybersecurity targets. NextGov. Retrieved from http://www.nextgov.com/cybersecurity/2009/06/cell-phones-other-wireless-devices-next-big-cybersecurity-targets/44033/…

    • 1279 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    References: Gahran, A. (2011). Mobile phone security: What are the risks?. CNNTech. Retrieved from http://articles.cnn.com/2011-06-17/tech/mobile.security.gahran_1_android-app-android-phone-apple-s-app-store?_s=PM:TECH…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Short Message Service (SMS) and Multimedia Messaging Service (MMS) are a communication service component of the GSM mobile communication system, using standardized communications protocols that allow the exchange of short text messages between mobile phone devices.[1] Some websites also allow you to communicate to mobiles via SMS for a fixed fee. To send an SMS you simply have to choose a contact from your phone, choose the text message, type up your message and then send it.…

    • 1709 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Iphone Keychain Faq

    • 4396 Words
    • 18 Pages

    1.9 2012-12-05 added: Appendix A Protection Class Overview, p. 15 added iOS 6.0.1 keychain entry classification table updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 6.0.1 is affected updated: 2.19 Which devices are in danger?, p. 11 added iPad4, iPad mini and iPhone 5 to the list of currently unaffected devices 1.8 2012-07-16 added: 2.20 Is the SIM PIN affected?, p. 11 SIM PIN can be extracted updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.1.1 is affected updated: 2.19 Which devices are in danger?, p. 11 added iPad3 to the list of currently unaffected devices updated: Appendix A Protection Class Overview, p. 14 SIM PIN and Bluetooth Link Keys classification added to table updated: Appendix A Protection Class Overview, p. 14 keychain entry classifications updated for iOS 5.1.1 release 1.7 2012-05-10 updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.1 is affected updated: Appendix A Protection Class Overview, p. 14 keychain entry classifications updated for iOS 5.1 release updated: Matthias Boll left the team and Rachid El Khayari entered as co-author 1.6 2012-02-27 updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.0.1 is affected updated: 2.3 Are X.509 certificates also affected?, p. 6 certificates in lower class than passwords updated: 2.19 Which devices are in danger?, p. 11 added iPad2 and iPhone 4S, potentially affected via Absinthe jailbreak updated: Appendix A…

    • 4396 Words
    • 18 Pages
    Satisfactory Essays
  • Best Essays

    Raymind, A. (2011, January 19). Bit-defender 's 2011E-Threat Predictions Spotlight DDoS Protests, Rogue Applications, Social Network Plug Ins, and Mobile Malware. World Market Media. Retrieved January 22, 2011, from World Market Media Web site: http:/ / worldmarketmedia.com…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Better Essays

    malware whose signature is unknown or has been modified. If mobile cloud services are provided, much more malicious applications may appear including new and modified malware. Therefore vaccine applications cannot detect and prohibit them with only signature-based method in the future. Moreover, mobile cloud infrastructure supports a huge number of virtual mobile instances. When a malware is compromised on a virtual mobile instance, it can be delivered to other virtual mobile instances in the same mobile cloud infrastructure. Without monitoring the network behavior in mobile cloud infrastructure, the malware will spread over the entire infrastructure.…

    • 992 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.…

    • 10251 Words
    • 42 Pages
    Good Essays
  • Better Essays

    Cellphone Detector

    • 3985 Words
    • 16 Pages

    I understand that all my project work must be my own unaided work. If I make use of material from any other source I must clearly identify it as such in any interviews, report or examinations. I understand that my report must be written unaided in my own words, apart from any quoted material which I must identify in the correct manner.…

    • 3985 Words
    • 16 Pages
    Better Essays

Related Topics