Trend Micro shines light on growing number of malicious Android apps

Security vendor flags rise in malicious Android apps during first six months of 2013.

Android phone users should tread carefully when downloading apps, as figures suggest the number of malicious apps for the platform will hit the one million mark this year.

According to figures from security vendor Trend Micro, the first six months of 2013 saw a surge in the number of malicious Android apps, as hackers continue to set their sights on Google's increasingly popular mobile operating system.

It is very difficult for patches to reach all users in an effective timeframe.

Its figures suggest the number of malicious Android apps has increased by 350,000 during the first half of 2013, and now totals 718,000.

In light of this, the security firm said it expects there to be more than a million malicious Android apps before the end of the year.

"Malware has even been found on the official Google Play store, making security software no longer a nice-to-have for Android handset owners, but an increasingly essential tool to prevent malicious downloads," said Trend Micro in a statement.

JD Sherry, vice president of technology and solutions at Trend Micro, said the fractured nature of the Android ecosystem makes it hard for users to protect themselves from threats.

"It is very difficult for patches to reach all users in an effective timeframe. In some cases, users will never get the patches as vendors leave their customers at risk of attack," claimed Sherry.

"Until we have the same urgency to protect mobile devices as we have to protecting PCs, this very real threat will continue to grow rapidly.

"At the rate this malware is accelerating almost exponentially we appear to be reaching a critical mass," Sherry added.

As well as mobile threats, the company's Q2 Threat Report also flagged a marked rise in online banking malware, from 113,000 infections to 146,000, as well as an increased prevalence of malicious toolkits being traded on the black market.

Many of these are being offered online free of charge or as part of a two-for-one deal, the company claims.

"Making toolkits more affordable in this way will increasingly democratise the means to launch attacks and cause havoc for internet users and businesses," the company claimed.  

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021