Ransomware grows 24 per cent in Q1 2016

McAfee's Threats Report also revealed 21 consumer mobile apps could be a gateway for malicious activity

Mobile malware

McAfee's Threats Report has discovered 5,000 versions of 21 mobile applications that are being used to operate mobile collusion attacks on victims. The method entails using two or more apps to launch a more sophisticated attack.

Video streaming, health monitoring, and travel planning were the most popular apps discovered for launching such synchronised attacks and the method for hacks is intensified because customers are not updating the software on their devices, so security holes are not being closed. The company explained three different ways mobile collusion could be used by hackers.

Information theft involves using an app that has access to sensitive data collaborating with one that can send information to others, while financial theft sends information to an app that can make financial transactions or has access to a financial API.

Service misuse is the final type of attack. It utilises an app that can control a system service and take commands from another app to change how the phone operates, for example.

Advertisement - Article continues below

"Improved detection drives greater efforts at deception," said Vincent Weafer, vice president of Intel Security's McAfeeLabs group.

"It should not come as a surprise that adversaries have responded to mobile security efforts with new threats that attempt to hide in plain sight. Our goal is to make it increasingly harder for malicious apps to gain a foothold on our personal devices, developing smarter tools and techniques to detect colluding mobile apps."

Other insights from McAfee's report revealed ransomware has grown 24 per cent quarter-over-quarter, while mobile malware has increased by 17 per cent.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019