How Did Mobile Cyber Threats Evolve in Q2 2024 According to Kaspersky?

September 4, 2024

The landscape of mobile cybersecurity is ever-changing, with new threats emerging and old ones evolving in sophistication. In the second quarter of 2024, Kaspersky Security Network reported significant findings about the state of mobile threats. This article delves into these insights, highlighting key statistics, trends, and regional-specific threats that shaped mobile security in this period.

Overview and General Statistics

Key Figures

The mobile threat environment in Q2 2024 was marked by a high volume of cyberattacks. Kaspersky Security Network reported blocking over 7 million attacks on mobile devices. Among these, 367,418 were malicious installation packages, demonstrating a significant breadth of threats. Notably, 13,013 were identified as mobile banking Trojans, which pose a severe risk to financial security by targeting personal banking data. In addition, 1,392 mobile ransomware Trojans were detected, underlining the persistence of ransomware as a critical threat to mobile users.

RiskTool software emerged as the predominant threat during this quarter, accounting for 41% of all detected threats. These tools are designed to perform various potentially unwanted or harmful actions on the user’s device. Despite being categorized as less harmful than traditional malware, their significant detection rate emphasizes the sheer volume of intrusive software aimed at compromising user experience and privacy on mobile devices.

RiskTool Software

RiskTool, a common mobile threat, accounted for a substantial proportion of detected mobile threats, largely due to its prevalence in performing unauthorized actions. This software is typically embedded in legitimate-looking applications, making it difficult for average users to identify and remove. While it may not always perform overtly malicious actions, RiskTool software can significantly degrade the device’s performance and invade user privacy by collecting and sharing personal data.

The overwhelming detection of RiskTool software illustrates the constant threat it poses to mobile users worldwide. It’s crucial for mobile device users to be aware of these risks and take appropriate measures, such as using reliable security solutions and being cautious about the apps they download. This section underscores the necessity of heightened vigilance and educated choices in app selection to mitigate the risks associated with this pervasive threat.

Quarterly Trends

Attack Patterns and Volume

A significant trend observed in Q2 2024 was the overall increase in attacks compared to the previous year, despite a slight decrease from Q1 2024, totaling nearly 7.7 million attacks. This indicates a sustained period of high activity within the mobile threat landscape. Notably, the decline in adware activity was particularly significant, with families such as AdWare.AndroidOS.HiddenAd experiencing a remarkable drop in activity. Such reductions in adware could suggest improved detection rates or shifts in criminal focus towards other, potentially more lucrative, forms of malware.

The evolving patterns of attacks reveal that threat actors continually adapt their strategies in response to the changing cybersecurity landscape. The decline in adware signifies a potential strategic retreat or reallocation of resources by cybercriminals, possibly in favor of advancing more difficult-to-detect malware types. These insights reinforce the importance of dynamic and adaptable security solutions that can respond effectively to shifting threat patterns and volumes.

New Malware Versions

The detection of new versions of Mandrake spyware marked a concerning development during the second quarter. Mandrake spyware, known for its advanced obfuscation techniques, was found to be distributed via Google Play, underscoring the persistent challenge of securing major app distribution platforms. This spyware’s sophistication allows it to evade traditional security measures, making it particularly challenging to detect and mitigate.

The appearance of such advanced spyware within trusted app stores highlights the evolving threat landscape’s complexity and the increasing need for both users and security providers to stay ahead of threat actors’ techniques. The Mandrake spyware’s resurgence serves as a critical reminder of the vulnerabilities present in even the most seemingly secure digital environments. The necessity for robust security measures and constant vigilance cannot be overstated in the wake of these developments.

Re-Emerged Threats

The IOBot banking Trojan notably re-emerged, particularly targeting users in Korea, adding another layer of concern. This Trojan is notorious for employing sophisticated methods to bypass Android’s security protections, allowing it to extend permissions and facilitate the installation of additional malware. The resurgence of IOBot highlights the persistent and evolving nature of mobile banking threats, which remain a significant vector of attack for cybercriminals.

IOBot’s reappearance emphasizes the dynamic nature of mobile threats, with previously subdued threats resurfacing with enhanced capabilities. The Trojan’s ability to circumvent established security barriers presents a daunting challenge for security professionals and end-users alike. This resurgence underlines the critical need for continuous improvements in mobile security strategies and technologies to stay ahead of such sophisticated and adaptable threats.

Mobile Threat Statistics

Detection Trends

The number of Android malware samples detected fell to levels similar to Q2 2023, totaling 367,418 installation packages. This decline suggests a temporary stabilization in the volume of detected threats or improvements in malware detection efficiency. However, the period also saw a decline in detected AdWare packages and a concurrent rise in RiskTool packages, indicating a possible shift in the types of threats being distributed.

This balancing act between different types of malware points to evolving strategies among cybercriminals, who might be leveraging tools that can evade detection while still achieving their intended malicious goals. The statistics present a nuanced picture where the raw number of threats may fluctuate, but the underlying risk remains significant, necessitating sustained vigilance and innovative detection methods.

Specific Threats

One of the more disturbing trends noted in this period was the increased prevalence of RiskTool.AndroidOS.Fakapp, often masquerading as explicit content. These apps typically collect device information and open arbitrary URLs provided by a server, thus facilitating further malicious activity. The deceptive nature of such threats highlights the lengths to which cybercriminals will go to lure victims and expand their reach.

Despite the rising number of RiskTool.AndroidOS.Fakapp installation packages, the data did not show a proportional increase in the number of actual user encounters with this threat. This discrepancy may indicate that while the deployment of these packages is widespread, their actual impact might be limited by improved user awareness or timely detection and mitigation by security solutions. Nonetheless, the persistent presence of such threats underscores the continuing risk they pose and the need for ongoing cybersecurity efforts.

Malware Detection Rankings

Frequent Threats

DangerousObject.Multi.Generic and DangerousObject.AndroidOS.GenericML both made a reappearance at the top of the rankings for detected mobile malware. These general threats, identified through cloud verdicts, underscore the continuing efficacy of widespread detection methods in identifying potentially harmful software. The recurrence of these threats in detection rankings demonstrates the ongoing attempts by cybercriminals to exploit vulnerabilities using well-known techniques.

The persistent detection of such generalized threats highlights the importance of maintaining robust and comprehensive mobile security measures. These findings suggest that while new and sophisticated threats are continually emerging, traditional forms of malware remain prevalent. Thus, ensuring that security measures are comprehensive and adaptable remains a pivotal component of effective cybersecurity strategy.

Specific Malware Cases

One noteworthy threat that continued to trouble users was the Fakemoney Trojan, which deceptively promises easy cash rewards to lure victims. By exploiting users’ desire for quick financial gain, this Trojan underscores the effectiveness of social engineering in spreading malware. Similarly, pre-installed Dwphon Trojans and modified versions of WhatsApp containing Trojan-Downloader.AndroidOS.Agent.ms modules were detected frequently, indicating a trend towards embedding malicious code within legitimate applications.

These specific malware cases exemplify the diverse tactics employed by threat actors to infiltrate mobile devices. By integrating malicious components into widely-used apps, cybercriminals can maximize their reach and impact. The ongoing presence of such threats in detection rankings highlights the importance of continuous monitoring and analysis to identify and mitigate emerging threats effectively.

Region-Specific Malware Activity

Turkey and Banking Trojans

Turkey continued to face significant challenges from banking Trojans, with threats such as Tambir, BrowBot, and Hqwar maintaining their active status. These Trojans often exploit vulnerabilities in the local banking infrastructure, posing substantial risks to Turkish users. The persistent nature of these threats in Turkey highlights the specific targeting of regional financial systems by cybercriminals, indicating a high level of sophistication and strategic planning.

The ongoing activity of these banking Trojans in Turkey underscores the need for enhanced cybersecurity measures within the financial sector. This includes not only robust technical defenses but also increased user awareness and education about the risks associated with mobile banking. By understanding and addressing the unique threat landscape, stakeholders can better protect users from these region-specific malware threats.

Indonesia and UdangaSteal Trojans

In Indonesia, the UdangaSteal Trojans saw significant activity, particularly through social engineering tactics such as deceptive wedding invitations. This method of distribution highlights the innovative and culturally relevant strategies employed by cybercriminals to lure victims. By exploiting common social practices and celebrations, these Trojans can spread more effectively, causing substantial harm to unsuspecting users.

The prevalence of UdangaSteal Trojans in Indonesia serves as a reminder of the importance of social awareness in cybersecurity efforts. Recognizing and mitigating the impact of culturally tailored threats requires a comprehensive approach that includes both technological defenses and community education. By addressing both aspects, security measures can be more effective in protecting users from these sophisticated and region-specific threats.

Brazil and FakePay

In Brazil, the FakePay Trojan emerged as a significant threat, simulating payment processes to deceive users. This particular threat reflects the diverse tactics used by cybercriminals to exploit specific cultural and economic contexts. By presenting fake payment interfaces, the FakePay Trojan can extract sensitive financial information from users, posing severe risks to their financial security.

The activity of FakePay in Brazil emphasizes the need for localized cybersecurity strategies that take into account the unique threat landscape of each region. Understanding the specific methods used by cybercriminals in different contexts allows for more effective detection and mitigation. This approach ensures that security measures are tailored to address the unique challenges faced by users in various regions, enhancing overall protection.

Threats in Thailand and India

Thailand encountered the EvilInst Trojan, which is notorious for covertly sending paid text messages. This form of attack not only incurs financial costs for the users but also compromises their privacy and security. Meanwhile, in India, Rewardsteal Trojans dominated the threat landscape, stealing banking data using fake monetary giveaway schemes. These Trojans exploit the users’ desire for financial gain, similar to the Fakemoney Trojan.

The persistent presence of these threats in Thailand and India highlights the diverse range of tactics employed by cybercriminals. To effectively combat such threats, a multi-faceted approach is necessary, incorporating both advanced technical defenses and comprehensive user education. By understanding the specific challenges faced by users in these regions, cybersecurity efforts can be more effectively tailored to mitigate the impact of these region-specific threats.

Mobile Banking Trojans

Installation Packages

The number of mobile banking Trojan installation packages remained consistent over the last three quarters, indicating a constant level of threat. This consistency suggests that while new threats are continually emerging, the overall prevalence of mobile banking Trojans remains a persistent risk to users. The stability in the number of installation packages underscores the need for ongoing vigilance and robust security measures to protect against these threats.

With mobile banking becoming increasingly popular, the threat posed by banking Trojans is significant. These Trojans can compromise sensitive financial information, leading to substantial financial losses for users. By maintaining constant vigilance and employing advanced security measures, users can better protect themselves from these relentless threats, ensuring the security of their financial transactions and personal data.

Notable Banking Trojans

Among the top threats, Trojan-Banker.AndroidOS.Mamont.aq emerged as a new top player, reflecting the dynamic nature of mobile banking malware. Alongside Mamont.aq, Trojans such as UdangaSteal.b and GodFather.m saw considerable activity, indicating their continued threat. These Trojans employ sophisticated techniques to infiltrate mobile devices and exfiltrate sensitive banking information.

The dynamic and evolving nature of these threats highlights the importance of continuous monitoring and updating of security solutions. By staying ahead of emerging trends and threats, security providers can better protect users from the evolving landscape of mobile banking Trojans. The detection of these notable threats underscores the need for advanced and adaptive security measures to protect users from the persistent and sophisticated risks posed by mobile banking Trojans.

Mobile Ransomware Trojans

General Trends

The second quarter of 2024 saw a decline in detected mobile ransomware installation packages compared to Q1 2024, aligning with levels from the previous year. This decrease could suggest that efforts to combat ransomware are having some success. However, the fluctuations in activity among various ransomware families indicate that the threat remains significant and ever-changing.

Mobile ransomware continues to pose a severe risk to users, often locking them out of their devices or encrypting their data until a ransom is paid. The ongoing challenge of ransomware highlights the importance of regular data backups, robust security measures, and user awareness to mitigate the impact of these attacks. By staying vigilant and prepared, users can better protect themselves from the ongoing threat of mobile ransomware.

Active Ransomware Families

The realm of mobile cybersecurity is constantly evolving, with new threats emerging and existing ones becoming more sophisticated. In the second quarter of 2024, the Kaspersky Security Network revealed substantial findings regarding the state of mobile threats. This article explores these revelations, shedding light on crucial statistics, emerging trends, and region-specific threats that defined mobile security during this timeframe.

Mobile threats have become increasingly complex, demanding more advanced protective measures. The Kaspersky report highlighted a rise in malicious software, phishing attacks, and vulnerabilities that specifically target mobile devices. One of the significant trends observed was the increase in ransomware targeting smartphones and tablets, where attackers encrypt user data and demand payment for its release.

Additionally, the report underscored geographical variations in mobile threats. Certain regions experienced a higher incidence of specific types of attacks, reflecting the varied tactics cybercriminals employ based on local behaviors and technological adoption rates. For instance, regions with higher smartphone penetration saw more sophisticated phishing schemes, while areas with developing tech infrastructures faced simpler, yet effective, malware campaigns.

Overall, these insights emphasize the need for continuous advancements in mobile cybersecurity measures to protect users from the ever-evolving landscape of digital threats. Understanding these trends and regional nuances can help in developing more robust security frameworks, tailored to address the unique challenges presented by mobile threats in different parts of the world.

Subscribe to our weekly news digest!

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for subscribing.
We'll be sending you our best soon.
Something went wrong, please try again later