Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

2/13/2020
12:40 PM
50%
50%

Apps Remain Favorite Mobile Attack Vector

Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.

Cybercriminals targeting mobile devices most frequently use apps to break in, as seen in 79% of mobile-focused attacks in 2019 and 76% of those in 2020 so far, Pradeo Labs researchers found.

The data comes from its 2020 "Enterprise Mobile Threat Landscape" report, which says 10% of 50,000 Android devices host zero-day malware and 3,890 host known malware. In a company mobile fleet of 50,000 iOS devices, only 55 host a zero-day malware. Researchers warn against "leaky and intrusive applications" and emphasize how mobile apps can perform unwanted actions because of external libraries they host: 79% of mobile apps embed third-party libraries.

"Android devices tend to exfiltrate more data than iOS ones, but still, both overly process the data they are granted access to," researchers say in the report. Both operating systems most often leak user files, contact information, location data, and audio or video recordings.

Network attacks have increased by 4% in the past year, researchers report, a trend driven by ongoing growth of man-in-the-middle attacks across North America and Asia. In the former, 15,605 devices connected to unsafe Wi-Fi hotspots; in the latter, 19,750 devices did the same. Four percent of devices in North America, and 9.28% in Asia, have faced a man-in-the-middle attempt.

Attacks targeting the operating system of mobile devices has slightly decreased; they now represent 8% of attacks. Researchers report 54% of Android devices run an outdated operating system, compared with 23% of iOS devices.

Read more details here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Chaos & Order: The Keys to Quantum-Proof Encryption"

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7263
PUBLISHED: 2020-04-01
Improper access control vulnerability in ESConfigTool.exe in ENS for Windows all current versions allows a local administrator to alter the ENS configuration up to and including disabling all protection offered by ENS via insecurely implemented encryption of configuration for export and import.
CVE-2020-7066
PUBLISHED: 2020-04-01
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_he...
CVE-2020-11445
PUBLISHED: 2020-04-01
TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855.
CVE-2020-7064
PUBLISHED: 2020-04-01
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
CVE-2020-7065
PUBLISHED: 2020-04-01
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.