Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Advertising Trojans Increase in Number to Top the Charts of Mobile Malware


According to the 2016 Mobile Threat report by Kaspersky Lab, the year witnessed nearly a tripling of mobile malware identification, with advertising Trojans manipulating the best of user privileges to become the most prevalent e-threat.


Kaspersky recorded almost 40m targeted assaults that malware for mobile phones attempted in 2016. However, more than 4m owners of Android devices were adequately safeguarded. More than 260K identifications were done of installation suits related to ransomware Trojans for mobile devices.


The ransomware Trojans would capture rooting privileges, letting not just aggressive exhibition of ads by the Trojans on the contaminated mobile phones that would usually render the devices unusable; however, as well load other applications clandestinely.


Within plentiful instances, the Trojans abused earlier patched security flaws as users hadn't loaded the security patches created for those flaws. Besides, the Trojans side-by-side loaded their payloads onto the computers' system directories, thus creating great trouble for sanitizing the devices.


A few advertising Trojans also successfully contaminated recovery images, thus creating hurdles in restoration to factory configurations on the devices for ultimate resolution of the problem. The kind of these ad Trojans have been again-and-again discovered within Google's Play Store. Scmagazineuk.com posted this, February 28, 2017.


There are various forms of mobile malware that are made available to buyers. These are individual solutions, software packages, or advanced tools similar as which professional companies develop. Alternatively, like "Bot-as-a-service" the mobile malware comes in one smaller scale. There are interesting discussions of mobile malware on social media, forums and vendor shops.


During 2016, advertising Trojans, which abused super-user privileges, grew numerically. All through that year the threat was on top of the charts, while there's little indication of the trend changing. Internet crooks capitalize on the maximum devices' not getting operating software updates, therefore being prone to attacks by older, popular as also readily obtainable exploits. Furthermore, there are too many malware programs for mobile devices for cyber-criminals to cope with. These programs are increasingly exploring targets other than smart-phones.


Eventually, Senior Malware Analyst Roman Unuchek from Kaspersky Lab USA states that 2017 will perhaps witness vital assaults against Internet-of-Thing appliances executed via mobile devices.

» SPAMfighter News - 3/3/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page