Well if you’re going to do it might as well go for biggest market
Much as predicted, the villains have noticed that ‘mobile’ (rather than desktop) is the place to be when it comes to distributing malicious software. And if you’re going to get involved in this kind of activity, then you might as well play in the world’s largest cellular market – which is, of course, China. Strangely enough the kind of financial damage which these malicious activities generate isn’t new, either. It’s just that the sophistication has increased. Luckily, one mobile security specialist – NQ Mobile Security reckons it has nipped some of these activities in the bud before they have been able to infect more than 20,000 mobile devices in China.
You might have noticed that GoMo News has studiously avoided using the word ‘malware’ for describing these attacks.
For very good reason because some of these attacks are delivered – at least in the first place via SMS (text).
One of the most worrying types of attack which NQ Mobile Security claims to be able to protect its users against is being described as ‘fake bank’.
This attack type isn’t new and was hitting Spanish speaking banks pretty hard in the past.
These ‘Fake Bank’ attacks are on a much higher degree of nastiness than seen before.
Once installed, the app (which you’ve installed thanks to a fake SMS) will masquerade as a legitimate banking application.
Then it goes on to to steal users’ accounts and passwords; block or upload their text messages; send fraudulent messages (causing unexpected bill charges), and even block incoming calls.
In total, the company has just that have been discovered three new threats and has quarantined them in China.
Being delivered via SMS, these attacks are demonstrating that to stop malware it requires more than simply securing application marketplaces.
If you want the list of the Top Three biggest threats they are: -
- Fake Bank (privacy.SmsServices.a): The most potentially dangerous of the three, Fake Bank masquerades as a banking application, only to steal users’ accounts and passwords, block or upload their text messages, send fraudulent messages, and block incoming calls
- Fee Server (payment.ZooTiger.a): This threat delivered multiple malicious payloads, uploading users’ private contact lists to the server, delivering unwanted advertising to users’ inboxes and connecting to fee-based services via SMS and WAP resulting in unexpected bill charges
Group Scammer (privacy.Cckun.a): After users clicked a malicious link in an SMS message, the infected device could be remotely controlled to spread the infection through group messages. At the same time, a third-party application with the ability to send premium messages without the user’s consent could be installed on the device, leading to additional bill charges
NQ Mobile Security for Android is available for download from http://en.nq.com/mobilesecurity or via Google Play.