Mobile Malware infographic

1
Knowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more? Read the full report at bluecoat.com/mobile-malware Call - 1-866-30-BCOAT Email - [email protected] Copyright © 2015, Blue Coat Systems, Inc. All Rights Reserved. Blue Coat and the Blue Coat logo are registered trademarks of Blue Coat Systems, Inc. KNOW THY MOBILE ENEMY. The Basics Complete Anonymity Ransomware & Fear • Advanced cryptographic threats that hold files hostage • Ransom is due within a strict time limit before files become permanently inaccessible • Assailants demand untraceable ransom payment (Bitcoin) • Attackers use Tor network to hide destination of payment • .onion addresses often used in ransom demands • Most aren’t likely to report ransomware acquired from embarrassing sources (ie. porn) • Often payment doesn’t mean the bad guys uphold their end of the bargain RANSOMWARE Accept INFORMATION LEAKAGE How Ransomware Starts • Installing risky mobile apps from insecure websites Every Move is Monitored IMEI Identifier Broadcast Within Mobile Network Personal Privacy Threats • Often results from app designers who don’t encrypt or do it wrong • Can lead to cloned phones where service is hijacked • Utilize GPS satellite systems to create digital “breadcrumbs” showing activity • Reveal where people live, work, socialize, etc. using social networking options Network + Security + Cloud Know where you’re going: Use “press-and-hold” technique to reveal true destinations of links. SAFETY TIPS Seek visibility solutions that extend to mobile. Protect guest Wi-Fi with intelligent data-access policies. Warn users about risks, including: • Surfing for porn • Downloading apps from unofficial sources • Searching for free/cracked versions of apps • Jail-breaking your phone • Connecting to free or unsecured networks With mobile usage at an all time high, malware specifically designed for smartphones has become more prevalent and sophisticated. We’re here to help. The Basics • Often poses as antivirus software • Similar to adware or spyware • Millions of variations already exist How PUS Starts • Users allow permission because attack poses as antivirus software Signs of a PUS Attack • Sudden increase in junk SMS texts • Data stolen from your contacts list and shared with third parties POTENTIALLY UNWANTED SOFTWARE (PUS) Mobile malware can take on many different forms: Porn at 36% Users now have one device for everything— chances of personal use impacting business networks are higher than ever. #1 Suspicious WebAd networks/large networks driving users to malnets #2 TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE

Transcript of Mobile Malware infographic

Page 1: Mobile Malware infographic

Knowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more? Read the full annual report at bluecoat.com/XXXXXXXKnowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more?

Read the full report at bluecoat.com/mobile-malware

Call - 1-866-30-BCOATEmail - [email protected]

Copyright © 2015, Blue Coat Systems, Inc. All Rights Reserved.

Blue Coat and the Blue Coat logo are registered trademarks of Blue Coat Systems, Inc.

KNOW THY MOBILE ENEMY.

The Basics Complete Anonymity Ransomware & Fear

• Advanced cryptographic threats that hold �les hostage • Ransom is due within a strict time limit before �les become permanently inaccessible

• Assailants demand untraceable ransom payment (Bitcoin)

• Attackers use Tor network to hide destination of payment • .onion addresses often used in ransom demands

• Most aren’t likely to report ransomware acquired from embarrassing sources (ie. porn)

• Often payment doesn’t mean the bad guys uphold their end of the bargain

RANSOMWARE

Accept

INFORMATION LEAKAGE

How Ransomware Starts • Installing risky mobile apps from insecure websites

Every Move is Monitored IMEI Identifier Broadcast Within Mobile Network

Personal Privacy Threats

• Often results from app designers who don’t encrypt or do it wrong

• Can lead to cloned phones where service is hijacked

• Utilize GPS satellite systems to create digital “breadcrumbs” showing activity • Reveal where people live, work, socialize, etc. using social networking options

Network + Security + Cloud

Know where you’re going: Use “press-and-hold” technique to reveal true destinations of links.

SAFETY TIPSSeek visibility solutions that extend to mobile. Protect guest Wi-Fi with intelligent data-access policies.Warn users about risks, including:

• Sur�ng for porn

• Downloading apps from unof�cial sources

• Searching for free/cracked versions of apps

• Jail-breaking your phone

• Connecting to free or unsecured networks

With mobile usage at an all time high, malware specifically designed for smartphones has become more prevalent and sophisticated. We’re here to help.

The Basics

• Often poses as antivirus software • Similar to adware or spyware • Millions of variations already exist

How PUS Starts

• Users allow permission because attack poses as antivirus software

Signs of a PUS Attack

• Sudden increase in junk SMS texts • Data stolen from your contacts list and shared with third parties

POTENTIALLY UNWANTED SOFTWARE (PUS)

Mobile malware can take on many different forms:

Porn at 36%

Users now have one device for everything—chances of personal use impacting business networks are higher than ever.

#1 Suspicious WebAd networks/large networks driving users to malnets

#2TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE