Android malware on the rise

There were 700,000 new Android malware samples spotted in the third quarter with attacks against this platform having increased by over 30 percent, a recent report said.


ISSSourcePart of the 30 percent increase is due to the discovery of the Android vulnerability that attackers can exploit to create malware that’s capable of bypassing digital signature validation, according to the McAfee third quarter 2013 threat report. Bad guys already started leveraging the flaw with a new family McAfee calls Exploit/MasterKey.A. 

“The efforts to bypass code validation on mobile devices, and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely,” said Vincent Weafer, senior vice president of McAfee Labs. 

“The industry must work harder to ensure the integrity of this digital trust infrastructure given these technologies are becoming even more pervasive in every aspect of our daily lives.”

In order to make their malware attacks more efficient, cybercriminals are turning more and more to digitally signed malware. In fact, the number of digitally signed malware samples increased by 50 percent, to over 1.5 million new samples. 

When it comes to virtual currencies, experts said illegal activities end up facilitated by the emergence of new currencies that allow cybercriminals not only to make transactions, but also to launder their proceeds.

Furthermore, as Bitcoin becomes more popular and more valuable, cybercriminals are turning more and more to the use of Bitcoin-mining malware.

The threat report also showed the global volume of spam increased by 125 percent.

The basis of the study comes from information from 500 multidisciplinary researchers spread out across 30 countries. The complete “McAfee Labs Threats Report: Third Quarter 2013” is available on the company’s website.

This article was originally published:

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security