{"id":30334,"date":"2022-03-26T01:05:26","date_gmt":"2022-03-25T14:05:26","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-2021\/30334\/"},"modified":"2022-03-26T01:05:36","modified_gmt":"2022-03-25T14:05:36","slug":"mobile-malware-2021","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-2021\/30334\/","title":{"rendered":"Mobile threats: who targeted smartphones in 2021"},"content":{"rendered":"<p>We continuously monitor the mobile threat landscape to keep you informed of the most important trends. Not long back, we published a <a href=\"https:\/\/securelist.com\/mobile-malware-evolution-2021\/105876\/\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> about the threats facing smartphone and tablet owners in 2021. First the good news: a major takeaway is that last year we saw a significant decrease in mobile threat activity compared to 2020. However, with that said \u2014 it\u2019s too early to relax. For one thing, the number of attacks on smartphones and tablets fell only relative to the record high of 2020, and remained at around the same level as in 2019. For another, cybercriminals are becoming increasingly inventive.<\/p>\n<h2>Adware attacks<\/h2>\n<p>One of the trends in 2021 was the introduction of malicious code in third-party ads modules, which developers of various useful apps often plug in to monetize their work. For example, last spring cybercriminals used a malicious advertisement SDK to <a href=\"https:\/\/www.kaspersky.com\/blog\/infected-apkpure\/39273\/\" target=\"_blank\" rel=\"noopener nofollow\">infect<\/a> APKPure, a popular alternative Android app store. Fortunately, its developers took security seriously, and released a clean version a day after we got in touch with them.<\/p>\n<p>A similar story <a href=\"https:\/\/www.kaspersky.com\/blog\/fmwhatsapp-mod-downloads-malware\/41334\/\" target=\"_blank\" rel=\"noopener nofollow\">happened<\/a> with the popular WhatsApp mod FMWhatsApp: one of the versions of the app harbored the <a href=\"https:\/\/www.kaspersky.com\/blog\/triada-trojan\/11481\/\" target=\"_blank\" rel=\"noopener nofollow\">Triada Trojan<\/a> inside an advertisement SDK. This Trojan is infamous for being very difficult to remove from an infected device. Moreover, Triada rarely comes alone and tends to download a bunch of other malicious apps onto the victim\u2019s device.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<h2>Malware on Google Play<\/h2>\n<p>We\u2019ve already written more than once that <a href=\"https:\/\/www.kaspersky.com\/blog\/google-play-malware\/28604\/\" target=\"_blank\" rel=\"noopener nofollow\">malware can sneak into official app stores<\/a>. To pass all checks and get to through to users, cybercriminals employ all sorts of tricks, such as loading malicious code into an approved program in the guise of an update. In 2021, loaders for various Trojans were found in apps on Google Play, which included the Joker and Facestealer malware. Joker stealthily takes out paid subscriptions for the user, while Facestealer, as the name suggests, specializes in stealing Facebook credentials.<\/p>\n<p>In most cases, to spread their creations via Google Play, cybercriminals add tiny injections of malicious code to an otherwise harmless apps that have been already approved by the store. For example, the authors of the Joker Trojan took advantage of the popularity of the Korean TV series <em>Squid Game<\/em> to hide the malware in an app that offered themed wallpapers. When Joker was discovered, there were more than 200 apps dedicated to the series on Google Play, and many of them borrowed features from each other. Unsurprisingly, when scanning such programs, the store moderators let a malicious \u201cupgrade\u201d sneak past. Small injections of malicious code are hard to detect during moderation, which cybercriminals constantly try to exploit.<\/p>\n<div id=\"attachment_43999\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/03\/26010533\/mobile-malware-2021-joker.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43999\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/03\/26010533\/mobile-malware-2021-joker.jpg\" alt=\"One of the apps in Google Play that contained Joker Trojan\" width=\"900\" height=\"900\" class=\"size-full wp-image-30335\"><\/a><p id=\"caption-attachment-43999\" class=\"wp-caption-text\">One of the apps in Google Play that contained Joker Trojan<\/p><\/div>\n<h2>Bankers \u2014 creative theft<\/h2>\n<p>For several years now, banking Trojans have been hunting, not just for bank accounts but also for accounts in online stores and other digital services. In 2021, their area of interest widened even further: our experts discovered the <a href=\"https:\/\/securelist.com\/it-threat-evolution-q1-2021-mobile-statistics\/102547\/\" target=\"_blank\" rel=\"nofollow noopener\">Gamethief<\/a> malware, which steals login data for the mobile version of the game <em>PlayerUnknown\u2019s Battlegrounds<\/em> (PUBG). This is the first <em>mobile<\/em> Trojan that specializes in stealing gaming accounts \u2014 just a few years ago, this type of malware was exclusive to desktop computers.<\/p>\n<p>Cybercriminals also improved the functionality of their creations. For example, the Fakecalls banking Trojan is capable of dropping the call if the user tries to contact their bank, and replacing it with a pre-recorded response of a fake bank representative. That way, the malware lulls the victim into thinking that a bank employee answered the call.<\/p>\n<h2>How to protect your smartphone from malware<\/h2>\n<p>Cybercriminals are resourceful and take every opportunity to prey on mobile device users. So, regardless of their activity level, it pays to be alert.<\/p>\n<ul>\n<li>Download apps only from official sources. True, this is not a 100% security guarantee, but there are far less malicious programs in official stores, and even when malware slips through moderation it usually gets removed from the store relatively quickly.<\/li>\n<li>Whenever possible, use apps from trusted developers with a good reputation to minimize the chances of encountering malware.<\/li>\n<li>Ignore apps that promise payouts you\u2019ve never heard of or overly generous prizes. It\u2019s almost bound to be a scam.<\/li>\n<li>Don\u2019t give apps permissions they don\u2019t need to work. Most malware will not be able to deploy fully without potentially <a href=\"https:\/\/www.kaspersky.com\/blog\/five-permissions-android-games-do-not-need\/36636\/\" target=\"_blank\" rel=\"noopener nofollow\">dangerous permissions<\/a>, for example, access to Accessibility, access to text messages and <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">installation of unknown apps<\/a>.<\/li>\n<li>Use a reliable <a href=\"https:\/\/www.kaspersky.com.au\/mobile-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____f4d699061e0733ea\" target=\"_blank\" rel=\"noopener\">mobile antivirus<\/a> that will detect and block malware that tries to get inside your phone.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that\u2019s no reason to relax, and here\u2019s why.<\/p>\n","protected":false},"author":2477,"featured_media":30337,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[105,183,36,1475,723],"class_list":{"0":"post-30334","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-google-play","10":"tag-malware-2","11":"tag-triada","12":"tag-trojans"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-2021\/30334\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-2021\/23989\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-2021\/19476\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-2021\/9828\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-2021\/26294\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-2021\/24252\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-2021\/27018\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-2021\/26563\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-2021\/32991\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-2021\/10577\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-2021\/43996\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-2021\/18667\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-2021\/19221\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-2021\/15877\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-2021\/28366\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-2021\/28170\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-2021\/24898\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-2021\/30106\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2477"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=30334"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30334\/revisions"}],"predecessor-version":[{"id":30336,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30334\/revisions\/30336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/30337"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=30334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=30334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=30334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}