Ransomware grows 24 per cent in Q1 2016

McAfee's Threats Report also revealed 21 consumer mobile apps could be a gateway for malicious activity

Mobile malware

McAfee's Threats Report has discovered 5,000 versions of 21 mobile applications that are being used to operate mobile collusion attacks on victims. The method entails using two or more apps to launch a more sophisticated attack.

Video streaming, health monitoring, and travel planning were the most popular apps discovered for launching such synchronised attacks and the method for hacks is intensified because customers are not updating the software on their devices, so security holes are not being closed. The company explained three different ways mobile collusion could be used by hackers.

Advertisement - Article continues below

Information theft involves using an app that has access to sensitive data collaborating with one that can send information to others, while financial theft sends information to an app that can make financial transactions or has access to a financial API.

Service misuse is the final type of attack. It utilises an app that can control a system service and take commands from another app to change how the phone operates, for example.

"Improved detection drives greater efforts at deception," said Vincent Weafer, vice president of Intel Security's McAfeeLabs group.

"It should not come as a surprise that adversaries have responded to mobile security efforts with new threats that attempt to hide in plain sight. Our goal is to make it increasingly harder for malicious apps to gain a foothold on our personal devices, developing smarter tools and techniques to detect colluding mobile apps."

Advertisement
Advertisement - Article continues below

Other insights from McAfee's report revealed ransomware has grown 24 per cent quarter-over-quarter, while mobile malware has increased by 17 per cent.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020

Most Popular

Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/server-storage/servers/355254/a-critical-flaw-in-350000-microsoft-exchange-remains-unpatched
servers

A critical flaw in 350,000 Microsoft Exchange remains unpatched

7 Apr 2020