How PC Threats Go Mobile

The discovery (and subsequent media coverage) of the mobile malware OBAD shows that mobile threats continue to be a serious concern for users.  Just like Windows malware, mobile malware are also becoming more sophisticated, both in technique and deployment. This confirms one of our 2013 security predictions.

OBAD exploits an Android vulnerability to avoid detection and uninstallation. OBAD’s propagation method is notable because of its use of Bluetooth, a routine previously seen in Symbian malware.

FAKEAV mobile malware routines now include pop-up windows and messages about “infected” apps. Rather than show persistent notifications, mobile ads now lead users to web threats.

These refinements take advantage of characteristics of the current mobile landscape. Android vulnerabilities are exploited because Android fragmentation makes it difficult to address vulnerabilities. This concern on Android’s update issues may contribute to the growing concerns about mobile malware, making it easy for users to become victims of mobile FAKEAV.

Our latest monthly mobile report discusses these emerging threats, issues affecting or influencing these threats, and what you can do to help secure your devices better.

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

How PC Threats Go Mobile

Read more: How PC Threats Go Mobile

Story added 28. June 2013, content source with full text you can find at link above.