mobile malware infographic
TRANSCRIPT
Knowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more? Read the full annual report at bluecoat.com/XXXXXXXKnowledge is power. Now that you’re aware of the mobile malware that’s out there, you can take precautions to keep your network safe. Want to know more?
Read the full report at bluecoat.com/mobile-malware
Call - 1-866-30-BCOATEmail - [email protected]
Copyright © 2015, Blue Coat Systems, Inc. All Rights Reserved.
Blue Coat and the Blue Coat logo are registered trademarks of Blue Coat Systems, Inc.
KNOW THY MOBILE ENEMY.
The Basics Complete Anonymity Ransomware & Fear
• Advanced cryptographic threats that hold �les hostage • Ransom is due within a strict time limit before �les become permanently inaccessible
• Assailants demand untraceable ransom payment (Bitcoin)
• Attackers use Tor network to hide destination of payment • .onion addresses often used in ransom demands
• Most aren’t likely to report ransomware acquired from embarrassing sources (ie. porn)
• Often payment doesn’t mean the bad guys uphold their end of the bargain
RANSOMWARE
Accept
INFORMATION LEAKAGE
How Ransomware Starts • Installing risky mobile apps from insecure websites
Every Move is Monitored IMEI Identifier Broadcast Within Mobile Network
Personal Privacy Threats
• Often results from app designers who don’t encrypt or do it wrong
• Can lead to cloned phones where service is hijacked
• Utilize GPS satellite systems to create digital “breadcrumbs” showing activity • Reveal where people live, work, socialize, etc. using social networking options
Network + Security + Cloud
Know where you’re going: Use “press-and-hold” technique to reveal true destinations of links.
SAFETY TIPSSeek visibility solutions that extend to mobile. Protect guest Wi-Fi with intelligent data-access policies.Warn users about risks, including:
• Sur�ng for porn
• Downloading apps from unof�cial sources
• Searching for free/cracked versions of apps
• Jail-breaking your phone
• Connecting to free or unsecured networks
With mobile usage at an all time high, malware specifically designed for smartphones has become more prevalent and sophisticated. We’re here to help.
The Basics
• Often poses as antivirus software • Similar to adware or spyware • Millions of variations already exist
How PUS Starts
• Users allow permission because attack poses as antivirus software
Signs of a PUS Attack
• Sudden increase in junk SMS texts • Data stolen from your contacts list and shared with third parties
POTENTIALLY UNWANTED SOFTWARE (PUS)
Mobile malware can take on many different forms:
Porn at 36%
Users now have one device for everything—chances of personal use impacting business networks are higher than ever.
#1 Suspicious WebAd networks/large networks driving users to malnets
#2TOP TWO INFECTION VECTORS MIXING BUSINESS WITH PLEASURE