{"id":20472,"date":"2018-06-15T12:37:14","date_gmt":"2018-06-15T16:37:14","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-1\/20472\/"},"modified":"2019-11-15T22:34:12","modified_gmt":"2019-11-15T11:34:12","slug":"mobile-malware-part-1","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-1\/20472\/","title":{"rendered":"Mobile beasts and where to find them \u2014 part one"},"content":{"rendered":"<p>In recent years, cybercriminals have been increasingly fixated on our phones. After all, we never part company with our smartphones; they are our primary means for storing personal docs and photos, communicating, and taking pictures. We even use them as tickets and wallets, and much more besides.<\/p>\n<p>They also store oodles of valuable data that can fetch a handsome reward in certain quarters. And mobile devices are excellent for other malicious purposes as well. So there\u2019s no shortage of smartphone malware out there.<\/p>\n<p>Last year we <a href=\"https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/\" target=\"_blank\" rel=\"noopener noreferrer\">caught<\/a> 42.7 million pieces of malware on smartphones and tablets. For this series on mobile malware, we divided them into several types according to purpose and behavior. In part one, we look at three fairly common types.<\/p>\n<h2>Adware: Ad clickers and intrusive banners<\/h2>\n<p>One of the most common types of mobile infection comes in the shape of adware. Its task is to increase the number of clicks on online banners either automatically or manually (by exploiting users). Some just show you unwanted advertising.<\/p>\n<p>In the first case, you don\u2019t even see the ad, but the clicker uses up your smartphone\u2019s resources, including battery charge and data. The infected smartphone dies in just a few hours, and the next bill may hold an unpleasant surprise.<\/p>\n<p>The second type of adware replaces online banners with the ones of its own, and drowns the user in so many ads that, like it or not, they end up following some links. In many cases, the flow of spam is so overwhelming that the device becomes impossible to use \u2014 everything is smothered with ad banners.<\/p>\n<p>Some malware also collects information about your online habits without asking. This data then ends up in the hands of advertisers, who use it to fine-tune their advertising campaigns. What\u2019s more, banners can link to malicious sites where your device might pick up something even worse.<\/p>\n<h3>SMS and Web subscribers<\/h3>\n<p>The second type of malware we discuss today is <em><em>subscribers<\/em><\/em>, also known as Trojan clickers. Their job is to steal data from your mobile account, where thievery is much simpler because it bypasses card numbers, which tend to be under tighter guard. The funds flow out through WAP or SMS billing, and in some cases through calls to premium numbers at the victim\u2019s expense.<\/p>\n<p>See <a href=\"https:\/\/www.kaspersky.com\/blog\/wap-billing-trojans\/18080\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> for details of what WAP is and how cybercriminals exploit it. To take out a paid subscription in your name, all the WAP clicker needs do is click on the relevant button on the site. SMS malware requires permission to send messages, but many users give it to any app without a second thought. Programs that waste your money on <a href=\"https:\/\/securelist.com\/threats\/voip-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">IP telephony<\/a> have a slightly harder task: They have to register an account with the service.<\/p>\n<p>A striking example of a subscriber is the <a href=\"https:\/\/securelist.com\/threats\/trojan-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a> Ubsod. This pest is a <a href=\"https:\/\/www.kaspersky.com\/blog\/wap-billing-trojans\/18080\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WAP specialist<\/a>. To conceal its activity for as long as possible, it deletes all SMS messages containing the text string \u201cubscri\u201d (a fragment of the word \u201csubscribe\u201d or \u201csubscription\u201d). Moreover, it can switch from Wi-Fi to mobile Internet, which is required for WAP operations.<\/p>\n<p>Fortunately, getting rid of unwanted subscriptions isn\u2019t complicated; all subscriptions are displayed in the user\u2019s personal account on the operator\u2019s website. There, you can delete them and even forbid new ones from being linked to the phone number (though in some cases such a block can be imposed only temporarily). The main thing is to notice money leaking from your account as early as possible to prevent a deluge.<\/p>\n<h3>SMS flooders and DDoSers<\/h3>\n<p>These two categories combine malware that instead of downloading, sends data \u2014 lots of data! And they do it on the sly without requesting permission. Scammers are able to make a pretty penny from ruining other people\u2019s lives at your expense.<\/p>\n<p>As such, SMS flooding is often used by hooligans to tease their victims or disable their devices. A user can willingly install a flooding app on his or her device to swamp their enemies with thousands of SMS messages. But many go further and try to send messages at others\u2019 expense, surreptitiously planting the malicious app on the devices of unsuspecting owners.<\/p>\n<p><a href=\"https:\/\/securelist.com\/threats\/ddos-distributed-denial-of-service-attack-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">DDoSers<\/a> are able to overwhelm not only smartphones, but also far more powerful devices and even major online resources. Cybercriminals do so by combining infected gadgets into a network, known as a <a href=\"https:\/\/securelist.com\/threats\/botnet-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>, and bombarding a victim with requests from it. Incidentally, clickers can also act as DDoSers when trying to open the same Web page countless times.<\/p>\n<p>Both flooders and DDoSers try to use your smartphone to harm third parties. But you too will suffer from the load on your device\u2019s battery and processor, not to mention your wallet. Typically, such programs are not widely distributed, but in July 2013, the SMS flooder Didat <a href=\"https:\/\/securelist.com\/spam-in-july-2013\/36744\/\" target=\"_blank\" rel=\"noopener\">made it into the Top 20<\/a> malicious programs sent by e-mail.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h3>The further you get, the harder the going<\/h3>\n<p>To be honest, the types of mobile miscreants we\u2019ve covered today are small fries. At worst, they\u2019ll siphon off a bit of cash from your phone account and frazzle your nerves. In any event, many of them are easy to detect and remove with the help of antivirus software.<\/p>\n<p>In the chapters to come, we\u2019ll discuss some villains higher up in the pecking order. Keep track of updates and remember the rules of mobile security:<\/p>\n<ul>\n<li>Don\u2019t install apps from third-party sources, or better still, block them in the operating system settings!<\/li>\n<li>Keep your mobile OS and all installed apps updated to the latest versions.<\/li>\n<li>Protect all of your Android devices with a <a href=\"https:\/\/www.kaspersky.com.au\/mobile-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____f4d699061e0733ea\" target=\"_blank\" rel=\"noopener\">mobile antivirus<\/a> solution<\/li>\n<li>Regularly check the list of paid services in your personal account with your mobile operator and disable anything that you didn\u2019t subscribe to yourself. If you see a subscription you don\u2019t recognize, immediately scan the entire device for viruses.<\/li>\n<li>Always read the list of permissions requested by an app, and <a href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">grant only what\u2019s absolutely essential<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In part one of our mobile malware series, we cover infectious Android malware \u2014 adware, subscribers, and flooders \u2014 and how mobile viruses can damage your smartphone or tablet&#8230;<\/p>\n","protected":false},"author":2484,"featured_media":20473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646,9],"tags":[572,105,109,36,97,45,422,268],"class_list":{"0":"post-20472","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-adware","10":"tag-android","11":"tag-apps","12":"tag-malware-2","13":"tag-security-2","14":"tag-smartphones","15":"tag-threats","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-1\/20472\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-1\/13525\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-part-1\/11291\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-part-1\/6076\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-part-1\/15596\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-part-1\/13848\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-malware-part-1\/13073\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-part-1\/16336\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-part-1\/15847\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-part-1\/20773\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-1\/5045\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-1\/22770\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-part-1\/10628\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-part-1\/10620\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-part-1\/9295\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-part-1\/16999\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-1\/12156\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-malware-part-1\/20623\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-part-1\/23804\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-part-1\/16689\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-part-1\/20457\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=20472"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20472\/revisions"}],"predecessor-version":[{"id":24045,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20472\/revisions\/24045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/20473"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=20472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=20472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=20472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}