{"id":3683,"date":"2014-02-06T15:28:19","date_gmt":"2014-02-06T20:28:19","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=3683"},"modified":"2020-02-27T03:39:35","modified_gmt":"2020-02-26T16:39:35","slug":"number-of-the-week-10-million-malicious-android-apps","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/number-of-the-week-10-million-malicious-android-apps\/3683\/","title":{"rendered":"Number of the Week: 10 Million Malicious Android Apps"},"content":{"rendered":"<p>In late January, Kaspersky Lab <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792318\/Kaspersky_Security_Bulletin_2013_Overall_statistics_for_2013\" target=\"_blank\" rel=\"noopener nofollow\">had accumulated\u00a0<\/a>about 200,000 unique samples of mobile malware, up 34% from November 2013, at which time we had recorded only 148,000 samples. This can\u2019t compare to the number of malicious Android apps that our researches found though, because in January it hit the 10 million mark!<\/p>\n<p>Those who are interested in Android and know any official Google statistics would tell us we are wrong: the Google Play market offers around 1.1 million applications. So how can it be that we found ten times more malicious apps than exist in the store? The answer is very simple.<\/p>\n<div class=\"pullquote\">The truth of the matter is that the number of unofficial stores, which contain more than a million applications, are more likely to be malicious.<\/div>\n<p>The truth of the matter is that the number of unofficial stores, which contain more than a million applications, are more likely to be malicious. So if you\u2019re using Google Play, the chances of getting malware are quite slim. But when it comes to alternatives, you can be swindled in no time. Ever aware of the fact that people enjoy free apps, attackers are eager to seed their malicious applications, naming them after famous games, <a href=\"https:\/\/www.kaspersky.com.au\/blog\/the-big-four-banking-trojans\/\" target=\"_blank\" rel=\"noopener\">banking apps<\/a>\u00a0or popular tools. The result is simple: users\u2019 private data, banking credentials and money are going straight into the <a href=\"https:\/\/www.kaspersky.com.au\/blog\/an-android-trojan-swindles-banking-credentials\/\" target=\"_blank\" rel=\"noopener\">hands of criminals<\/a>. A version of the <a href=\"http:\/\/www.securelist.com\/en\/blog\/208194045\/Carberp_in_the_Mobile\" target=\"_blank\" rel=\"noopener nofollow\">Carberp Trojan<\/a>, that originated in Russia and was found in 2012, is a very good example of how your money can be stolen using a malicious app. The truth of the matter is that there are around 10 million malicious Android packages (apk files) on the Internet.<\/p>\n<p>The mobile market is constantly growing and accumulating more users\u2019 money than it used to in the PC era. At the same time, there are quite a few anti-virus mobile software options, which can protect smartphones and tablets. These factors make mobile users the perfect target for attackers.<\/p>\n<p>However, it\u2019s not that difficult to be safe. Just follow these expert recommendations:<\/p>\n<p style=\"padding-left: 30px;\">\u2013 Do not activate the \u201cdeveloper mode\u201d on the device<\/p>\n<p style=\"padding-left: 30px;\">\u2013 Do not activate the \u201cInstall applications from third-party sources\u201d option<\/p>\n<p style=\"padding-left: 30px;\">\u2013 Only install applications from official channels<\/p>\n<p style=\"padding-left: 30px;\">\u2013 When installing new apps, carefully read the rights requested<\/p>\n<p style=\"padding-left: 30px;\">\u2013 Use protective software<\/p>\n<p>And, of course, visit our blog to find out the latest information about security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In late January, Kaspersky Lab had accumulated\u00a0about 200,000 unique samples of mobile malware, up 34% from November 2013, at which time we had recorded only 148,000 samples. This can\u2019t compare<\/p>\n","protected":false},"author":214,"featured_media":3684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[105,537],"class_list":{"0":"post-3683","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-mobile-malware"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/number-of-the-week-10-million-malicious-android-apps\/3683\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/number-of-the-week-10-million-malicious-android-apps\/2899\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/number-of-the-week-10-million-malicious-android-apps\/2792\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/number-of-the-week-10-million-malicious-android-apps\/3138\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/number-of-the-week-10-million-malicious-android-apps\/3071\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/number-of-the-week-10-million-malicious-android-apps\/3683\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/number-of-the-week-10-million-malicious-android-apps\/2545\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/number-of-the-week-10-million-malicious-android-apps\/3683\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=3683"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3683\/revisions"}],"predecessor-version":[{"id":26218,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3683\/revisions\/26218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/3684"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=3683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=3683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=3683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}