Published By - Brian Curtis

Lookout Mobile Threat Report

Lookout Mobile Security

What is a mobile threat?

Mobile threat is Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices. We divide these into several categories: application-based threats, web-based threats, network-based threats and physical threats.

Mobile threat actors are increasingly becoming more proficient and prolific, increasing the sophistication of their attacks.

At the same time, employees are accessing work data through their mobile devices on a daily basis. Over 60% of employees across the globe say they access their organization’s customer, partner, and employee data on their mobile device, according to a new Lookout survey. It’s more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage.

This whitepaper Includes :

  • JadeRAT A mobile advanced persistent threat (mAPT) that may be connected to a government sponsored group.
  • FrozenCell An mAPT that masquerades as fake updates to chat apps like Facebook and WhatsApp.
  •  xRAT An mAPT associated with the high-profile Xsser / mRAT malware.
  • Igexin An advertising software development kit (SDK) that could spy on victims through otherwise benign apps.
  • SonicSpy Surveillanceware that was found in the Google Play Store, capable of silently stealing data.

JadeRAT operators have a significant degree of control over compromised devices. The malware supports over 60 commands that allow operators to retrieve sensitive information and profilevictims. This includes location, contacts, accounts, call logs, text messages, and more

FrozenCell masquerades as fake updates to chat apps like Facebook, WhatsApp, Messenger,LINE, and LoveChat. Once installed on the device, the threat can record calls, geolocate a device, exfiltrate images, download and install additional apps, retrieve contacts, and more.

xRAT is an mAPT with extensive data collection functionality and the ability to remotely run a suicide function to avoid detection. The malware is associated with the high-profile Xsser / mRAT malware, which made headlines after targeting both iOS and Android devices of pro-democracy Hong Kong activists in late 2014.

Want to learn more about mobile threats?

Download Resource

Leave a Reply

Your email address will not be published. Required fields are marked *

Show Buttons
Share On Facebook
Share On Twitter
Share On Linkedin
Hide Buttons