Malicious mobile programs are on the rise, having seen a 3.1-fold increase since the first quarter and a 10.8% increase from Q2.
Kaspersky Lab’s IT Threat Evolution report for the third quarter of 2015 found that 323,374 new malicious mobile programs were detected. That’s in addition to 1.6 million malicious installation packages, and 2,516 mobile banker trojans. On the other hand, SMS trojans decreased, accounting for only 6.2% of mobile threats during the quarter.
Kaspersky found that during the quarter, displaying intrusive advertisements to consumers remained the main method of profiting from mobile threats. So, mobile adware continued to increase and accounted for more than half of all detected mobile threats. Some of these mobile attack methods are using super-user privileges (root access) to conceal their presence in the systems folder, making it very difficult to combat them.
The report also found that there were 5.68 million notifications about attempted malware infections to steal money from users via online access to bank accounts. This trend has slightly decreased from the previous quarter, which showed 5.9 million notifications. In addition, Kaspersky Lab solutions blocked almost 626,000 attempts to launch malware capable of stealing money via access to consumers’ online banking, which is 17.2% lower than in the previous quarter.
The statistics also show that consumers in Austria were attacked by banking trojans more than any other region: About 5% of all Kaspersky Lab users in Austria faced this threat during the quarter. Singapore, last quarter’s leader, was moved to second place (4.2%) and 3% of users in Turkey were under threat (third).
Most of the countries in the geographical top 10 list of banking malware attacks during the quarter have a significant number of online banking users. Of the malware used to target online banking users, Trojan-Downloader.Win32.Upatre was the most prevalent, being used in 63.1% of attempted attacks to steal users’ payment details.
In Q3, the Kaspersky Lab Global Research and Analysis Team (GReAT) researched a number of sophisticated cyber-espionage campaigns. Amongst others, these included investigating the Turla group, which makes use of satellite communications to manage its command-and-control servers’ traffic for subsequent operations, the Darkhotel APT, which infiltrates hotel Wi-Fi networks to place backdoors on target computers, and new activity of the Blue Termite APT, which focuses on stealing information from organizations in Japan.
Kaspersky Lab also worked on a joint investigation with the Dutch National High Tech Crime Unit (NHTCU) and Panda Security, resulting in the arrest of two suspects, who are believed to be involved in the CoinVault ransomware attacks.
And finally, 75.4 million unique URLs were recognized as malicious by web antivirus components: This is 16% higher than in Q2.
“The developments in Q3 demonstrate that the global threat landscape is continuing to evolve at a fast pace,” said David Emm, principal senior security researcher at Kaspersky Lab’s Global Research and Analysis team. “Malicious mobile programs are on the rise and in countries where online banking is popular, people are at considerable risk from trojans looking to target them. With 5.6 million cases of attempted theft from online bank accounts, and cyber-criminals continually developing sophisticated attacks, the use of high-quality cybersecurity products has never been more important. It’s vital that all those using the internet—both individuals and organizations—protect themselves from these growing threats.”