Laboratory of McAfee released a report on the threats for the second quarter of 2013, which recorded an unprecedented since the beginning of 2012 the growth of malicious programs for devices based on the operating system Android. It reached 35%. The tendency is accompanied by a steady increase in the number of malicious programs designed to steal SMS-to online banking, fake applications for dating and fun, intentionally modified versions of trusted applications, including malware, issued for useful utilities.
In the second quarter of lab McAfee registered more than double in the first quarter of the new sample programs for extortion. Thus, in 2013, they found more than in all previous years combined.
The second quarter also showed a rise in the number of suspicious URL-addresses on the 16% increase in the number of malicious programs, authentic signed certificates increased by 50%. In addition, the documented cases of large-scale cyber attacks and electronic espionage, including attacks on the Bitcoin system and expose the operation “Troy”, aimed at military targets the U.S. and South Korea.
Analysts McAfee identified a number of common strategies for mobile espionage, used by hackers to obtain money and sensitive information from the victims:
Malware in online banking. In many banks, which implements two-factor authentication, users log in to their accounts, indicating your name, password, and a transaction number that comes to their mobile device as a text message (mTAN). Analysts McAfee found four serious malware for mobile phones that first intercept user names and passwords, and then intercept SMS-message containing the credentials required for access to bank accounts. This allows an attacker to gain direct access to the accounts and funds transfer.
Fake apps for dating. McAfee lab found a huge increase in the number of applications for dating and entertainment that people are tricked into subscribing to non-existent paid services. Lonely people are trying to get access to profiles of potential partners and other content, but disappointed to learn that fell for a scam. In addition to profits from the sale of rights of access to the profiles of attackers gain additional revenue by selling user information and personal data were stolen from a mobile device.
Applications Trojans. Analysts have identified increased activity of spyware in the form of modified versions of trusted applications. Modified versions of the applications collect confidential user information (contacts, call logs, SMS-messages, location) and unload the data to the attacker’s server.
Fake utility. Cyber ??criminals also use applications that claim to be useful tools, but actually set spyware, hackers collecting and transmitting valuable personal data.
«Cyber ??crime in the area of ??mobile technologies is becoming increasingly clear outline to the extent that as cybercrime groups decide what tactics are most effective and profitable, “- says Vincent Weafer, senior vice president Labs McAfee. – “As in other developed areas of cybercrime, the desire to make a profit by breaking the bank accounts of criminals forces to overcome the technical difficulties associated with the digital system bypass trust. In some tactics of spreading malicious programs disguised as applications for dating and entertainment is successful because of the fact that such schemes are not given due attention, while others simply aim to get that in the world of mobile devices is the most common currency – users ‘personal data’ .
Along with mobile threats in the second quarter of the ongoing trends have been identified that appear to adapt to the emerging possibilities of attack and defeat the weak spots in the infrastructure business, as well as in the inventive combination of noise, distractions and damage to mask the complex targeted attacks:
Programs-extortionists. In the last two quarters of McAfee registered more samples of ransomware programs than in all previous years combined. The number of new unique patterns found in the second quarter exceeded 320,000, is more than twice the rate of the first quarter and confirms the profitability of this tactic.
Malicious programs with a digital signature. The number of malware signed authentic certificates increased by 50% to 1.2 million new samples – this is a significant increase since the recession that began to show in the first quarter. This trend threatens inevitably lead to the erosion of confidence in the global infrastructure of trusted certificates.
Suspicious URL-address. Growth in the number of suspicious URL-address in the second quarter suggests that the “infected” sites continue to play a major role as a mechanism to spread malicious programs. At the end of June, the number of detected suspicious McAfee URL-addresses has reached 74.7 million, up 16% over the first quarter.
volume of spam. The global volume of spam has grown throughout the second quarter. There were more than 5.5 trillion messages. This is about 70% of the global volume of e-mail in the same period.
attacks on Bitcoin. A sudden increase in activity in the market in the last quarter of Bitcoin and attracted the attention of cybercriminals. Along with the distributed attacks such as “denial of service» (DDoS), a group of cyber criminals infect their victims with malware, computer resources to generate and theft of virtual currency.
Operation “Troy.” Analysts McAfee found that attacks on banks and media companies in South Korea in March and June of this year, in fact, have been associated with a prolonged campaign of cyber espionage, launched back in 2009. These computer-technical examinations suggest that the campaign was designed to carry out attacks on military targets in the United States and South Korea for the purpose of detection and removal of confidential files, and, if necessary, to destroy the compromised systems through attacks on the master boot record ( MBR).
Embed to blog:
Laboratory of McAfee released a report on the threats for the second quarter of 2013, which recorded an unprecedented since the beginning of 2012 the growth of malicious programs for devices based on the operating system Android … full text
Source: Cybersecurity.ru
No comments:
Post a Comment