Mobile

Mobile Malware – Hype or Threat? – analysis

Mobile Malware – Hype or Threat?  – analysis

Mobile Malware – Hype or Threat? – analysis

note:

I wrote this article in 2006.

You’ve certainly seen the constant speculation about whether or not mobile malware is the kind of threat that some vendors are accusing of inflating. Malware authors have this unique attitude to follow the trend, understand when the approach becomes mature enough to think about how to reset it, and then suddenly completely change their technologies – resulting in P2P, IM, email and, yes, Skype as the “next big thing” in Type of malware scene for weekly media articles.

It’s all cyclical, not rocket science that needs a reverse engineer to explain and dazzle you with advanced assembly experience.

There are incentives for malware authors to encrypt mobile malware, specifically the marketing of the mobile malware itself, which happened in mid-2006 with the release of RedBrowser. Among the main points I mentioned in “Malware – future trends“Research I released at the beginning of 2006. The ugliest things are the easiest to show as always.

The nature of mobile voting and purchasing power, let’s not mention, can literally spark your imagination about potential violations.

Why does the end user start asking the representative of the mobile operator about the availability of mobile antivirus scanners? Because he could have been a victim of viral market development art

Industry key points:

– More people own mobile phones then they own a PC – this does not mean that they are all smartphones running Symbian or Windows Mobile

– More than 300 commonly detected malware samples, recalling the concept of malware family in the PC malware world. These are all from the Cabir family, have spread to code online and have a bunch of script kids who feed FUD while watching Takedown and inspire themselves to eavesdrop on someone’s mobile communications while they “go” in the park

the truth

– Antivirus vendors are marketing myopia, they simply fell in love with their products, and we all know that once you fall in love it’s hard to become as practical as you were before – sweet pain

The majority of known portable malware comes from the publicly available Cabir Proof of Concept (PoC) code, and this is the propagation routine inside. The current threat is nothing more than a family of mobile malware, and there is no such thing as a perfect family

Malware authors are too busy playing the cat-and-mouse game efficiently and taking advantage of the 1B reach of internet users around the world.

– The end user must confirm the unknown Bluetooth connection, if it is in discoverable mode, it must confirm the execution of the executable from an unknown source

– Since Symbian and Windows Mobile dominate the mobile operating system space, a vulnerability in the systems is critical

Antivirus signatures are reactive security protection

I once argued about the myth of antivirus vendors sharing every sample of malware they encounter, between the “usefulness” of virus signatures in today’s open source malware and on-demand malware.

How do you protect yourself?

– Be familiar with mobile malware basics

– Do not install apps from untrusted sources while on the go

Do you need a personal antivirus scanner for your mobile phone? No, I’m not, but mobile operators need it at the gateway level, and the rest is just a mobile operator that differentiates its offering, position itself as a conscious company, and drives growth in the market – whether revenue is about spending on more malware research and development For mobile, or market development with other products is up to the sellers themselves.

Your network operator should be responsible for limiting the spread of potential epidemics, charge a fee for a slight modification of the Cabir PoC Deployment Module, and bring us back to the same old issue with open source malware, or demand malware and antivirus utility signatures and freshness of updates. My view, the responsibility for dealing with public and family mobile malware, that we see today, should go to my mobile operator, not to infect me and spread death further.

The average mobile user will start enjoying one provider’s brand more, if they are talked into about the serious risks posed by mobile malware – from a marketing standpoint, they will spread the word further while trying to let the other one realize it. As a tech-savvy individual with a great voice scanner on a few hundred people.

Despite this, targeted attacks have huge potential, while the mass transmission of mobile malware could lead to the mobile operator blocking it directly, relying solely on the end user to fulfill their responsibilities. All you need is to try to spread mobile malware on a large scale, and then you will witness your operator use its proprietary powers to shock and amaze you to know how.

Wise investments aren’t always the ones that seem most proactive, but they are the ones that take advantage of momentum.

Remember that the best marketers not only respond profitably to consumer needs, but also create new markets. It is the unspoken rule of the game.

What’s Next? Antivirus software for your gaming device and music player, as well as for your IPv6 compatible refrigerator? Sure, but in the very long term. In the meantime, be aware, do not panic, and try to base your concerns on objective and unbiased sources only.

Stay tuned!

*** This is a security blog shared by the blogger network of Dancho Danchev’s Blog – Information Security Knowledge Flows composing Dancho Danshev. Read the original post at: https://ddanchev.blogspot.com/2022/10/mobile-malware-hype-or-threat-analysis.html



#Mobile #Malware #Hype #Threat #analysis

مقالات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

زر الذهاب إلى الأعلى
سيتات آورج 2022 سيتات آورج 2022