GAO, RSA: Malicious Mobile Apps Almost Triple - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile // Mobile Devices
06:13 PM
Connect Directly

GAO, RSA: Malicious Mobile Apps Almost Triple

More cyber criminals are jumping on the mobile bandwagon, say reports from the RSA and the Government Accountability Office. As a result, companies who embrace the bring-your-own-device trend could be giving hackers access to corporate communications.

It's not surprising that lines for the latest iPhone went down the block.

Unfortunately, as more consumers choose mobile phones over PCs and laptops, cyber criminals are following right behind.

Malicious software targeting mobile devices has increased from 14,000 to 40,000 in a year, according to a new report released by the Government Accountability Office. Criminals are succeeding for myriad reasons. In addition to consumers unknowingly downloading malicious apps, many phones don't have passwords, or the two-factor authentication is misused. Operating systems are not updated, and wireless transmissions are sometimes not encrypted.

Another recent report, from RSA, said cyber criminals are less likely to write malicious code for apps in Apple's App Store because it is more regulated than Android's Google Play. According to the report, the openness of the Android app store is making "Android the most heavily-targeted mobile operating system, with Android apps by far the most widely-used vehicle for spreading mobile malware."

The BYOD trend isn't helping, either. Companies who allow employees to bring their own devices might be allowing cyber criminals to gain access to corporate communications.

One tip-off that an app is malicious, according to the RSA report, is if it requires a long list of permissions before it will install. A legitimate app usually only needs one or two permissions.

Another way criminals sneak malicious code onto a phone is by packaging their malware with legitimate apps. Consumers also should keep an eye out for apps such as SMS sniffers, said the report. These are apps that collect private SMS text messages. Another kind of malicious app, known as spyware, is used to collect personal information.

To be fair, the Android app store has several features that are helping make it more secure, said the report, such as Remote Application Removal and Google Bouncer. But as hackers do, security analysts Jon Oberheide and Charlie Miller found their way around Google Bouncer pretty easily.

Hat tip to Network World.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2021 Outlook: Tackling Cloud Transformation Choices
Joao-Pierre S. Ruth, Senior Writer,  1/4/2021
Enterprise IT Leaders Face Two Paths to AI
Jessica Davis, Senior Editor, Enterprise Apps,  12/23/2020
10 IT Trends to Watch for in 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/22/2020
White Papers
Register for InformationWeek Newsletters
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Flash Poll