{"id":13801,"date":"2018-08-03T05:10:01","date_gmt":"2018-08-03T09:10:01","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-two\/13801\/"},"modified":"2020-04-02T16:07:38","modified_gmt":"2020-04-02T10:37:38","slug":"mobile-malware-part-two","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-two\/13801\/","title":{"rendered":"Mobile beasts and where to find them \u2014 part two"},"content":{"rendered":"<p>In the <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-1\/22770\/\" rel=\"noopener noreferrer nofollow\">last installment<\/a><\/u> of this story about mobile miscreants, we discussed relatively harmless malware that can find its way onto your smartphone or tablet. Today, we will talk about some far more dangerous beasts that are much more likely to leave you out of pocket or phoneless.<\/p>\n<h2>Mobile ransomware<\/h2>\n<p>As we\u2019ve said before, people are so reliant on their smartphones that if access is denied, they will walk over hot coals to get it back. Knowing that, malicious developers create mobile ransomware Trojans to block victims\u2019 devices and demand money to restore access.<\/p>\n<p>Like its desktop cousin, mobile ransomware is divided into two types: blockers and encryptors. As the names suggest, encryptors encrypt files and blockers block access \u2014 most often by overlaying the screen with a dodgy banner or demanding a PIN.<\/p>\n<p>Incidentally, mobile malware often encrypts <em><em>and<\/em><\/em> blocks. That, for example, is how a certain modification of our old friend, the <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mobile-ransomware-2016\/12491\/\" rel=\"noopener noreferrer nofollow\">Svpeng<\/a><\/u> Trojan, earns its scratch.<\/p>\n<p>Whereas desktop blockers have all but disappeared (they are easy to bypass), on mobile devices they are snowballing. For example, 83% of detected ransomware <u><a target=\"_blank\" href=\"https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/\" rel=\"noopener noreferrer\">in 2017<\/a><\/u> came from the Congur family of Trojans, which locked victims\u2019 devices with a PIN.<\/p>\n<p>Like desktop blockers, mobile versions typically accuse the user of having violated some law \u2014 usually by viewing pornography \u2014 and demand payment of a penalty, supposedly to a government agency. Needless to say, the money goes to the attackers. Such malware is most often distributed through porn sites, adding credibility to the accusation in the eyes of some victims.<\/p>\n<h3>Mobile wipers<\/h3>\n<p>Once more, the clue is in the name: Wipers wipe all files from a victim\u2019s device. For ordinary scammers trying to make money by collecting ransom, wiping user data makes no business sense. Instead, wipers tend to be used in corporate or political knife fights.<\/p>\n<p>Wipers are encountered far less often on mobile gadgets than on PCs. And even when they do appear on handheld devices, most often they are acting in concert with some other nasty trick. For example, malware under the name <u><a target=\"_blank\" href=\"http:\/\/news.softpedia.com\/news\/mazar-bot-android-malware-can-erase-your-phone-s-data-except-if-you-re-russian-500349.shtml\" rel=\"noopener noreferrer nofollow\">Mazar<\/a><\/u> is able not only to delete data, but also to turn a mobile phone into part of a <u><a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/botnet-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">botnet<\/a><\/u> \u2014 a network used for cyberattacks. But we\u2019ll cover the topic of two-in-one pests another time.<\/p>\n<h3>Mobile miners<\/h3>\n<p>If your smartphone suddenly starts to heat up, slow down, and drain battery quickly, the most likely culprit is a hidden cryptocurrency miner \u2014 these pests, well, secretly mine cryptocurrency for someone else at your expense.<\/p>\n<p>It\u2019s possible to get <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/google-play-hidden-miners\/21882\/\" rel=\"noopener noreferrer nofollow\">infected<\/a><\/u> even in official app stores: such programs are well disguised as bona fide applications fulfilling the specification in the description, all the while mining virtual coins in the background for their creators. Meanwhile, apps downloaded from third-party sources do their best to impersonate system applications. Sometimes, the malware even pretends to be an application to update Google Play itself, for example, <u><a target=\"_blank\" href=\"https:\/\/www.newsbtc.com\/2018\/03\/30\/hiddenminer-mines-monero-on-android-devices-while-protecting-itself-from-discovery-and-removal\/\" rel=\"noopener noreferrer nofollow\">HiddenMiner<\/a><\/u>.<\/p>\n<p>Although miners do not steal your money or wipe your files, the risk should not be underestimated: Excessive load can cause the device not only to slow down and discharge too quickly, but also to overheat catastrophically.<\/p>\n<h3>How to stay protected<\/h3>\n<p>No matter how unpleasant they may be, most invasions can be guarded against by following just a few rules:<\/p>\n<ul>\n<li>Install apps only from official stores, such as Google Play or the Amazon Store: It\u2019s not a guarantee, but it considerably lowers your risk of permitting malware onto your device.<\/li>\n<li>In your device settings, disable installation of apps from third-party sources. This eliminates randomly downloaded threats that attempt to mimic system updates and the like.<\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/05\/18155007\/unknown-sources-EN.jpg\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"750\" class=\"aligncenter size-large wp-image-13336\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/05\/18155007\/unknown-sources-EN.jpg\" alt=\"\" style=\"max-width:320px\"><\/a><\/p>\n<ul>\n<li>Make regular <u><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/18914\/\" rel=\"noopener noreferrer nofollow\">backups<\/a><\/u> of important data from your device to the cloud, a USB flash drive, or an external hard drive.<\/li>\n<li>Always install operating system and application updates as soon as they become available \u2014 they patch vulnerabilities that criminals can exploit.<\/li>\n<li>Don\u2019t click on suspicious links in e-mails, texts, or instant messages.<\/li>\n<li>Protect all mobile devices with a reliable antivirus utility. For example, the paid version of <a href=\"https:\/\/www.kaspersky.co.in\/mobile-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____ccbe3384bb4e1385\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> performs real-time analysis of apps, links, and Web pages, and blocks anything that looks suspicious or dangerous.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.<\/p>\n","protected":false},"author":2484,"featured_media":13802,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196,9],"tags":[105,106,466,2172,36,2136,97,45,527,268,511],"class_list":{"0":"post-13801","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-android","10":"tag-applications","11":"tag-blockers","12":"tag-cryptocurrencies","13":"tag-malware-2","14":"tag-miners","15":"tag-security-2","16":"tag-smartphones","17":"tag-threats","18":"tag-vulnerabilities","19":"tag-wipers"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-two\/13801\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-part-two\/11554\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-part-two\/6085\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-part-two\/15856\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-part-two\/14135\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-malware-part-two\/13252\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-part-two\/16650\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-part-two\/16065\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-part-two\/21025\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-two\/5172\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-two\/23350\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-part-two\/10787\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-part-two\/10677\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-part-two\/9563\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-part-two\/17411\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-two\/12246\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-malware-part-two\/21226\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-part-two\/23811\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-part-two\/17088\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-two\/20714\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-part-two\/20714\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=13801"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13801\/revisions"}],"predecessor-version":[{"id":20126,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13801\/revisions\/20126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/13802"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=13801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=13801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=13801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}