Malicious software or 'malware' is used by hackers to gain access to devices for corporate espionage, spying on individuals, theft of personal information, generating massive quantities of spam, denial of service attacks on business and governments and millions of Euros in fraudulent banking and advertising scams.
Due to the unique position of the group's network security and analytic products within service provider networks, it can measure the impact of traffic types traversing the network, including malicious and cyber-security threats.
- 10% of home networks and over 0.5% of mobile devices were infected with malware, both increases from the previous quarter
- 6% of home networks exhibited high-level threats, such as 'bots', 'rootkits' and 'Trojan' banking viruses - all types of malware infecting computers, computer programs and applications running on computers
- The ZeroAccess botnet continues to be the most common malware threat, infecting 0.8% of broadband users
- In mobile networks, the vast majority of infected devices are either Android phones or Windows laptops tethered to a phone or connected directly through a mobile USB stick or MIFI hub
- Mobile malware continues to grow with a six fold increase in the number of Android malware samples
"Malware and cybersecurity threats continue to be a growing problem for home networks and mobile devices, particularly for Android smartphones and tablets which are increasingly targeted," said
The report includes the top 20 home network infections and Internet threats and analysis of malware developments, including ZeroAccess, Alureon, the Zeus banking Trojan, Uapush, QDPlugin, and others.
Proof-of-concept spy phone indicates corporate weaknesses
The report also includes information on the rise of mobile spyware as a threat to the BYOD (bring your own device) trend in workplaces.
To demonstrate how a smartphone can become a cyber-espionage device, McNamee said the company has developed a proof-of-concept spy-phone software module that can be injected into just about any Android application. From a remote web based command centre the attacker can:
- Track the phone's location
- Download contact lists and personal information
- Intercept and send messages
- Record conversations
- Take pictures
The group will demonstrate the risks of a mobile spy phone at the Black Hat 2013 security event in
All rights reserved.
Most Popular Stories
- Twitter Names Woman to Board
- NSA Tracks 5 Billion Cellphone Records a Day
- Nelson Mandela Dies After Momentous Life
- W.H. Corrects Itself on Unclegate
- Nelson Mandela Dead at 95
- Fast-Food Workers Want $15 an Hour
- Roybal-Allard Tours Gordon Brush Plant
- Pope Francis Says He'll Fight Child Sex Abuse
- Aspen Contracting Adding 300 Jobs
- Yemen Attack Kills 52