{"id":10767,"date":"2011-11-15T22:32:56","date_gmt":"2011-11-16T02:32:56","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=10767"},"modified":"2022-08-19T16:07:19","modified_gmt":"2022-08-19T20:07:19","slug":"which-mobile-os-is-most-hit-by-malware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/which-mobile-os-is-most-hit-by-malware\/","title":{"rendered":"Which Mobile OS is Most Hit by Malware?"},"content":{"rendered":"<p><em><a href=\"http:\/\/www.dqindia.com\/the-volume-of-new-mobile-malware-tripled-in-2015\/\" target=\"_blank\" rel=\"hit malware? mobile most os which by is noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Which Mobile OS is Most Hit by Malware?\" src=\"https:\/\/i0.wp.com\/web.archive.org\/web\/20160405073022\/http%3A\/\/www.dqindia.com\/wp-content\/uploads\/2016\/02\/mobile-malware.png?resize=104%2C78&#038;ssl=1\" alt=\"Which Mobile OS is Most Hit by Malware?\" width=\"104\" height=\"78\" \/><\/a> <\/em><em>Help Net Security<\/em> <a title=\"www.net-security.org\/\" href=\"https:\/\/web.archive.org\/web\/20111021222716\/http:\/\/www.net-security.org:80\/malware_news.php?id=1883\" target=\"_blank\" rel=\"noopener noreferrer\">reminds<\/a> us that most <a title=\"Mobile phone\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_phone\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile phone<\/a> users still don&#8217;t have a mobile AV solution installed on their devices making. This makes it hard to gauge just how many of them have been hit by <a title=\"mashable.com\" href=\"https:\/\/web.archive.org\/web\/20201123193915\/https:\/\/mashable.com\/2011\/08\/12\/mobile-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile malware<\/a>. To overcome this fact, <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) researchers observed that mobile phones often get synched with the users&#8217; computers. Also, users often use their computers to search for mobile apps on third-party application markets and file-sharing sites. These habits allow mobile malware to occasionally end up on their desktop\/laptop computers and gets detected by desktop anti-virus software.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10971\" title=\"microsoft\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2011\/10\/microsoft1.jpg?resize=100%2C52\" alt=\"Microsoft\" width=\"100\" height=\"52\" \/>R<\/a>esearchers at the Microsoft Malware Protection Center (MMPC) were able to use thes detection to get an idea of what malware attacks the various <a title=\"Mobile operating system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_operating_system\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile operating systems<\/a>. The MMPC found was that <a title=\"Symbian\" href=\"http:\/\/symbian.org\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Symbian<\/a> users&#8217; devices are getting hit with a disproportionately bigger number of threats than those targeting other operating systems. In August 2011, <a title=\"www.crunchbase.com\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> detected around 42,000 of them.<\/p>\n<h3>Malware attacks<\/h3>\n<p>Microsoft&#8217;s Marianne Mallen says that Symbian-specific <a title=\"www.webopedia.com\" href=\"https:\/\/www.webopedia.com\/TERM\/M\/malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> seems to be evolving and Zeus-in-the-mobile (&#8220;<a title=\"blog.fortinet.com\" href=\"http:\/\/blog.fortinet.com\/tag\/zitmo\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZItmo<\/a>&#8220;) and SpyEye-in-the-mobile (&#8220;<a title=\"www.symantec.com\" href=\"https:\/\/web.archive.org\/web\/20161229192032\/https:\/\/www.symantec.com\/security_response\/\/writeup.jsp?docid=2011-091407-1435-99\" target=\"_blank\" rel=\"noopener noreferrer\">Spitmo<\/a>&#8220;) are the most recently detected malware and arguably the most dangerous for the user.<\/p>\n<p><a href=\"https:\/\/www.java.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10975 size-thumbnail\" style=\"border: 0pt none;\" title=\"java\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/java.gif?resize=42%2C75&#038;ssl=1\" alt=\"Java\" width=\"42\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/java.gif?resize=83%2C150&amp;ssl=1 83w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/java.gif?resize=166%2C300&amp;ssl=1 166w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/java.gif?resize=568%2C1024&amp;ssl=1 568w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/java.gif?w=942&amp;ssl=1 942w\" sizes=\"auto, (max-width: 42px) 100vw, 42px\" \/><\/a>The <del>Sun<\/del> <a title=\"Oracle\" href=\"https:\/\/www.oracle.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle<\/a> (<a title=\"NASDAQ : ORCL\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-ORCL\/\" target=\"_blank\" rel=\"noopener noreferrer\">ORCL<\/a>) <a title=\"Java Platform, Micro Edition\" href=\"http:\/\/en.wikipedia.org\/wiki\/Java_Platform%2C_Micro_Edition\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Java ME<\/a> platform takes second place in the MSFT research, with nearly 24,000 threats detected in August 2011, mostly apps sending text messages to premium-rate numbers.<\/p>\n<p>The MMPC found that <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>&#8216;s (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"www.android.com\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> malware numbers were rather low when compared to Symbian and Java ME platforms. There were around 2,800 hits in August, but have been steadily rising since February. Much of the Android malware uses privilege-escalation exploits to install itself or other components on the device without having to ask the user for permission.<\/p>\n<p>At the end of the <a title=\"www.forbes.com\" href=\"http:\/\/www.forbes.com\/companies\/microsoft\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a> list are <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"IOS (Apple)\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS<\/a> and <a title=\"RIM\" href=\"http:\/\/www.rim.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research In Motion <\/a>(<a title=\"NASDAQ : RIMM\" href=\"https:\/\/crackberry.com\/goodbye-rimm-hello-bbry-research-motion-ticker-change-happens-monday-february-4th\" target=\"_blank\" rel=\"noopener noreferrer\">RIMM<\/a>). No new threats for Apple&#8217;s mobile OS have been discovered this year, and the total number of threats detected in August was around 590. RIM brings up the rear with only 5 malicious apps detected during that month and can boast of only one completely new threat springing up for it this year:.<\/p>\n<p><a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10973 \" style=\"border: 0pt none;\" title=\"apple\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/apple1-e1565405141599.jpg?resize=76%2C94&#038;ssl=1\" alt=\"Apple Computers\" width=\"76\" height=\"94\" \/><\/a>Ms. Mallen&#8217;s advice to mobile users is to scan applications downloaded when possible, even when it&#8217;s already on a <a title=\"Mobile device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile device<\/a>. Ms. Mallen says that even apps from the official app stores, may have been repackaged with <a title=\"arstechnica.com\" href=\"http:\/\/arstechnica.com\/security\/news\/2004\/11\/malware.ars\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> that can run stealthily without the user being made aware of the underlying payload,&#8221; she points out. &#8220;The payload can include data-theft, silent SMS-sending in the background, and downloading and installing of other malware components, among other things. This malware (or links to it) could also be spammed or sent through email, using social engineering to entice the user to download a copy of the malware onto the desktop.&#8221;<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>UMMM no critique of mobile malware issues on WinPhones? <\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20230613201721\/https:\/\/www.businessinsider.com\/the-one-chart-you-need-to-see-to-understand-mobile-2011-11\" target=\"_blank\" rel=\"noopener noreferrer\">The One Chart You Need To See To Understand Mobile (AAPL, GOOG, RIMM, MSFT, NOK)<\/a> (businessinsider.com)<\/li>\n<li><a href=\"http:\/\/techtimely.wordpress.com\/2011\/10\/08\/overview-of-smartphones-and-malwares\/\" target=\"_blank\" rel=\"noopener noreferrer\">Overview of Smartphones and Malwares<\/a> (techtimely.wordpress.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Malware Protection Center says that Symbian is the most attacked mobile OS then Java ME GOOG Android, AAPL iOS, and RIM Blackberry<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[431],"tags":[3045,420,202,101,536,92,860,82,431,869,421,511,284,868,127],"class_list":["post-10767","post","type-post","status-publish","format-standard","hentry","category-mobile","tag-3045","tag-aapl","tag-android","tag-apple","tag-goog","tag-google","tag-ios-apple","tag-microsoft","tag-mobile","tag-mobile-operating-system","tag-msft","tag-research-in-motion","tag-rim","tag-symbian","tag-zeus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10767"}],"version-history":[{"count":22,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10767\/revisions"}],"predecessor-version":[{"id":132940,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10767\/revisions\/132940"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}