Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.
Android's popularity and open architecture have made it vulnerable to malware. Security experts outline the four biggest threats to the OS
August 17, 2011
A side effect of Android's growing popularity it that the more market share it has gained, the larger the target on its back has grown for cyber criminals and malicious software (malware) attacks.
Yuval Ben-Itzhak, CTO of security vendor AVG Technologies , says that once Android achieved around 10 percent market share, criminals began to see it as a moneymaking opportunity. Its popularity, coupled with the fact that it's written in Java, made it an easy and desirable target.
"Android simplified life for app developers, but also for malware developers," Ben-Itzhak says. They can run their software on top of a Java simulator, allowing it to infect any number of Android devices, regardless of the OS version or hardware type.
As the problem grows, wireless operators are starting to pay more attention to mobile security -- as a way to both protect their customers and make money selling into enterprises. Even so, Juniper Research Ltd. says that currently less than one in 20 smartphones and tablets have third-party security software installed in them. (See SK Telecom Chooses Fortinet for LTE Security, AT&T & Sprint Want More Security for Mobile Users and T-Mobile Makes Good on Enterprise Security for Android.)
Light Reading sister publication InformationWeek outlines the eight most notorious Android malware attacks and five ways to fight them. But we wanted to find out, more generally, what's got Android bugging out.
Here are the top four threats to Android. Consider yourself warned.
1) Spyware apps: Juniper Research Analyst Nitin Bhas says that most malware targeting Android are spyware apps that can harvest a user's private data. These apps can record and export SMS messages, emails, call logs, GPS and more, adds Symantec Corp. (Nasdaq: SYMC) Director Con Mallon.
What's more, some Android apps like Tapsnake and Flexispy, can record phone calls and turn on a phone's microphone.
2) Rogue applications: Rogue apps have become one of the trendiest forms of malware, according to AVG's Ben-Itzhak. For example, a criminal could download Angry Birds, reverse back the binaries into the source code and inject a few lines of malicious code into the game. It looks the same as the original, but once a user reaches a certain stage, it triggers the phone to send an SMS to a premium number.
"An attacker uses this to generate revenue by first setting and registering a premium rate number," adds Mallon in an email to LR Mobile. "Then, the attacker infects mobile devices with malware designed to covertly call or send an SMS message to this number."
The result of this discreet process is the device owner is billed a premium charge on their monthly statement that goes to the hacker, provided they don't notice the up-charge. Mallon says that most carriers allow a premium rate of up to $10 per message, but some allow charges of $50 per message or more.
3) Phishing attacks: Mobile commerce is on the rise, bringing with it a number of security threats. Bhas says that Web- or email-based phishing attacks in which criminals steal banking or other sensitive user data are becoming more common on Android. For example, malware may replace a shortcut to online banking, so that it appears that a user is going to the Bank of America site, but he or she is actually going to a phishing site that looks identical in appearance.
"When you log in, the hacker is doing it in parallel," Ben-Itzhak explains. "You are both interacting with the bank account. This is emerging, and for individuals, it's very scary."
4) Phony in-app promos: Most in-app advertising is annoying, but it can also be dangerous. According to Mallon, apps that encourage the download of additional software without disclosing its exact third-party location are a new vector that Symantec is tracking on Android. The apps that are being promoted don't have user views or security measures in place like those in the official market should.
"This type of in-app advertising abuse makes it difficult for traditional antivirus signature detections to keep up, meaning more advanced detection technologies, such as reputation-based security, need to be leveraged on mobile devices just as they are on PCs," Mallon says.
— Sarah Reedy, Senior Reporter, Light Reading Mobile
Director, Women in Comms
Sarah Thomas's love affair with communications began in 2003 when she bought her first cellphone, a pink RAZR, which she duly "bedazzled" with the help of superglue and her dad.
She joined the editorial staff at Light Reading in 2010 and has been covering mobile technologies ever since. Sarah got her start covering telecom in 2007 at Telephony, later Connected Planet, may it rest in peace. Her non-telecom work experience includes a brief foray into public relations at Fleishman-Hillard (her cussin' upset the clients) and a hodge-podge of internships, including spells at Ingram's (Kansas City's business magazine), American Spa magazine (where she was Chief Hot-Tub Correspondent), and the tweens' quiz bible, QuizFest, in NYC.
As Editorial Operations Director, a role she took on in January 2015, Sarah is responsible for the day-to-day management of the non-news content elements on Light Reading.
Sarah received her Bachelor's in Journalism from the University of Missouri-Columbia. She lives in Chicago with her 3DTV, her iPad and a drawer full of smartphone cords.
Away from the world of telecom journalism, Sarah likes to dabble in monster truck racing, becoming part of Team Bigfoot in 2009.
You May Also Like
Rethinking AIOPs — It's All About the DataMar 12, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Fiddling with Fixed WirelessMar 21, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Cable and 5G: The Odd Couple?Apr 18, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Delivering the DAA DifferenceMay 16, 2024