Did you know?
In 2012, malware discoveries
grew more than 123% from the
previous year with the majority
of the infections on Android
Devices.
The most common ways to
exploit the Android Operating
System were through
application repackaging,
malicious web addresses, and
SMS phishing emails. This
resulted in approximately 32.8
million Android devices being
infected in 2012, a 200%
increase from the previous
year.
Three Easy
Steps To Stay
Protected
1. Only download applications
from trusted sources Most
trusted is Androids “Google
Play” or IOS “App Store”
2. Always update device to
latest Firmware/operating
system
3. Never click unfamiliar links If
it looks suspicious, instead
inform IT Help Desk
MALWARE BE
GONE !
Stay Protected From
Mobile
Malware
What is
Malware
?
Malware is software used or programmed by attackers to
disrupt computer operations, gather sensitive
information, or gain access to private computer systems.
Cybercriminals use mobile devices to gain access to the user’s confidential, personal, and
financial information. Therefore, hackers embed malware on mobile devices to gain access to
that information.
Why is Mobile Malware growing so rapidly?
1.Mobile devices are perfect for cyber criminals!
Since many people now use phones and tablets to access information, cyber
criminals hack them instead of desktops.
2.SPAM, SPAM, SPAM
In the past, malware tactics such as SPAM and Phishing emails dominated the
web and today users are prone to those same problems on their mobile devices.
3.Trustworthy mobile applications are hard to identify.
What are the types of Mobile Malware?
Trojan Program installed on device via untrustworthy application
Trojans can take usernames, passwords, bank information, etc..
Rootkit
Malware that activates every time system boots up and is hard to detect
Rootkits, allow installation of hidden files, user accounts, etc..
Examples of Mobile Malware
Zeus in the Mobile (Zitmo)
Forwards text messages to other numbers
Steals usernames, passwords, bank information, etc.
DroidKungFu
Installs a backdoor in the Android OS and gives the originator full control of device
~Shaibriel Mack, Student
~Aaron Alter, IT Help Desk & User Services Support