Tuesday 19 June 2012

Sophos reveals top 5 malware that hit Android


Sophos, on their Naked Security blog, have revealed the top 5 most common malware found to affect Android devices. The company says that with their new release of Android Mobile Security (they call it Mobile Security because they say it contains more than just anti-virus), they've released their list of the top 5 malware at an opportune time. The company says, "SophosLabs has examined the stats produced by installations of Sophos Mobile Security, which is now being used on Android smartphones and tablets in 118 different countries around the world."

The top 5 malware are as follows:

1. Andr/PJApps-C: When Sophos Mobile Security finds an application that's been labeled as Andr/PJApps-C, it means the app has been cracked using a public tool. While this sort of app isn't necessarily a threat to the functioning of the device, it is most likely illegal. These types of apps make up 63.4 percent of Android malware.

2. Andr/BBridge-A: This type of malware is also called BaseBridge. An app listed as this essentially elevates its privilege allowance and therefore is able to get into a position where it can download more malware on an Android-based device. It uses HTTP to communicate with a server and can also potentially hand out information that can be used to identify you. These apps can read and send SMSes, effectively being able to inflate your mobile bill. Furthermore, it signs you up for premium warning-based systems and has you pay a fee for them, but removes warnings when an SMS containing malicious content is received. This type of malware makes up 8.8 percent of Android malware.

3. Andr/BatteryD-A: This type of application tells you that it helps extend the battery life of your device, however, what it really does is connects to a server using HTTP and sends over identifiable information. It also shows advertisements aggressively. This type of malware makes up 4.0 percent of Android malware.

4. Andr/Generic-S: Sophos Mobile Security often finds malware of the generic variety, which perform functions like escalating priveleges as well as aggressive adware, much like variants of the Android Plankton malware. This type of malware comprises 6.1 percent of Android malware.

5. Andr/DrSheep-A: This malware is the Android equivalent of FireSheep, a tool that allows hackers to hijack Twitter, Facebook and LinkedIn sessions in a wireless environment. This type of malware makes up 2.6 percent of Android malware.

Other common malware include Andr/DroidRt-A, which escalates privileges to the point where the hacker can achieve root access to the device, and Andr/Opfake-C, a fake Opera app, which can install other malicious Android packages and send SMSes to premium numbers, depending on the country. The latter app has been spread via Facebook in the past. Sophos says the list of Android attacks constantly grows and they want you to protect your Android device with their Mobile Security application.

No comments:

Post a Comment