{"id":13001,"date":"2018-08-03T02:30:04","date_gmt":"2018-08-03T10:30:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/03\/news-6768\/"},"modified":"2018-08-03T02:30:04","modified_gmt":"2018-08-03T10:30:04","slug":"news-6768","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/03\/news-6768\/","title":{"rendered":"Mobile beasts and where to find them \u2014 part two"},"content":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Fri, 03 Aug 2018 09:10:01 +0000<\/strong><\/p>\n<p>In the <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-1\/22770\/\">last installment<\/a><\/u> of this story about mobile miscreants, we discussed relatively harmless malware that can find its way onto your smartphone or tablet. Today, we will talk about some far more dangerous beasts that are much more likely to leave you out of pocket or phoneless.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/08\/03050225\/mobile-malware-part-2-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-23351\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/08\/03050225\/mobile-malware-part-2-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" \/><\/a><\/p>\n<h2>Mobile ransomware<\/h2>\n<p>As we&#8217;ve said before, people are so reliant on their smartphones that if access is denied, they will walk over hot coals to get it back. Knowing that, malicious developers create mobile ransomware Trojans to block victims&#8217; devices and demand money to restore access.<\/p>\n<p>Like its desktop cousin, mobile ransomware is divided into two types: blockers and encryptors. As the names suggest, encryptors encrypt files and blockers block access \u2014 most often by overlaying the screen with a dodgy banner or demanding a PIN.<\/p>\n<p>Incidentally, mobile malware often encrypts <em><em>and<\/em><\/em> blocks. That, for example, is how a certain modification of our old friend, the <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mobile-ransomware-2016\/12491\/\">Svpeng<\/a><\/u> Trojan, earns its scratch.<\/p>\n<p>Whereas desktop blockers have all but disappeared (they are easy to bypass), on mobile devices they are snowballing. For example, 83% of detected ransomware <u><a target=\"_blank\" href=\"https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/%252520\">in 2017<\/a><\/u> came from the Congur family of Trojans, which locked victims&#8217; devices with a PIN.<\/p>\n<p>Like desktop blockers, mobile versions typically accuse the user of having violated some law \u2014 usually by viewing pornography \u2014 and demand payment of a penalty, supposedly to a government agency. Needless to say, the money goes to the attackers. Such malware is most often distributed through porn sites, adding credibility to the accusation in the eyes of some victims.<\/p>\n<h3>Mobile wipers<\/h3>\n<p>Once more, the clue is in the name: Wipers wipe all files from a victim&#8217;s device. For ordinary scammers trying to make money by collecting ransom, wiping user data makes no business sense. Instead, wipers tend to be used in corporate or political knife fights.<\/p>\n<p>Wipers are encountered far less often on mobile gadgets than on PCs. And even when they do appear on handheld devices, most often they are acting in concert with some other nasty trick. For example, malware under the name <u><a target=\"_blank\" href=\"http:\/\/news.softpedia.com\/news\/mazar-bot-android-malware-can-erase-your-phone-s-data-except-if-you-re-russian-500349.shtml\">Mazar<\/a><\/u> is able not only to delete data, but also to turn a mobile phone into part of a <u><a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/botnet-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\">botnet<\/a><\/u> \u2014 a network used for cyberattacks. But we&#8217;ll cover the topic of two-in-one pests another time.<\/p>\n<h3>Mobile miners<\/h3>\n<p>If your smartphone suddenly starts to heat up, slow down, and drain battery quickly, the most likely culprit is a hidden cryptocurrency miner \u2014 these pests, well, secretly mine cryptocurrency for someone else at your expense.<\/p>\n<p>It&#8217;s possible to get <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/google-play-hidden-miners\/21882\/\">infected<\/a><\/u> even in official app stores: such programs are well disguised as bona fide applications fulfilling the specification in the description, all the while mining virtual coins in the background for their creators. Meanwhile, apps downloaded from third-party sources do their best to impersonate system applications. Sometimes, the malware even pretends to be an application to update Google Play itself, for example, <u><a target=\"_blank\" href=\"https:\/\/www.newsbtc.com\/2018\/03\/30\/hiddenminer-mines-monero-on-android-devices-while-protecting-itself-from-discovery-and-removal\/\">HiddenMiner<\/a><\/u>.<\/p>\n<p>Although miners do not steal your money or wipe your files, the risk should not be underestimated: Excessive load can cause the device not only to slow down and discharge too quickly, but also to overheat catastrophically.<\/p>\n<h3>How to stay protected<\/h3>\n<p>No matter how unpleasant they may be, most invasions can be guarded against by following just a few rules:<\/p>\n<ul>\n<li>Install apps only from official stores, such as Google Play or the Amazon Store: It&#8217;s not a guarantee, but it considerably lowers your risk of permitting malware onto your device.<\/li>\n<li>In your device settings, disable installation of apps from third-party sources. This eliminates randomly downloaded threats that attempt to mimic system updates and the like.<\/li>\n<\/ul>\n<p> <a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-18007\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN-1024x711.jpg\" alt=\"\" style=\"max-width:320px\" \/><\/a> <\/p>\n<ul>\n<li>Make regular <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/18914\/\">backups<\/a><\/u> of important data from your device to the cloud, a USB flash drive, or an external hard drive.<\/li>\n<li>Always install operating system and application updates as soon as they become available \u2014 they patch vulnerabilities that criminals can exploit.<\/li>\n<li>Don&#8217;t click on suspicious links in e-mails, texts, or instant messages.<\/li>\n<li>Protect all mobile devices with a reliable antivirus utility. For example, the paid version of <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&#038;c=ww_kdailyplaceholder\" target=\"_blank\">Kaspersky Internet Security for Android<\/a> performs real-time analysis of apps, links, and Web pages, and blocks anything that looks suspicious or dangerous.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-two\/23350\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Fri, 03 Aug 2018 09:10:01 +0000<\/strong><\/p>\n<p>In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[10462,10469,12821,14147,3764,15902,714,11094,10438,10428,10752,19125],"class_list":["post-13001","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-android","tag-applications","tag-blockers","tag-cryptocurrencies","tag-malware","tag-miners","tag-security","tag-smartphones","tag-threats","tag-tips","tag-vulnerabilities","tag-wipers"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13001"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13001\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13001"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}