Kaspersky: PH ranks 3rd in SEA with most Android mobile malware attempts

Kaspersky data from January to September 2019 show the Philippines placed third among Southeast Asian (SEA) countries with the highest Android mobile malware attempts detected and blocked by the cybersecurity company. The Philippines has been in the same spot since 2017 next to list-toppers Indonesia and Malaysia, respectively.

Recent figures show there are 82.52% Android mobile users in the country from September 2018 to September 2019.

The statistical data for this report came from all Kaspersky mobile security solutions, not just Kaspersky Mobile Antivirus for Android. Ranking excludes countries with fewer than 25,000 active users of Kaspersky mobile security solutions over the reporting period.

Have you read “Number of users hit by financial malware grew by 7% in H1 2019“?

According to the cybersecurity company’s security researchers, 98% of mobile malware are designed for the Android OS. This puts Android mobile users, who use banking and shopping apps, at high risk of downloading malware themselves without knowing it.

Kaspersky has been monitoring malware attempts against its users who use Android devices in SEA and found that malware attempts have been increasing. Banking and ransomware Trojans were the top malware detected in the region.

Banking Trojans

Trojans are one of the most dangerous species in the malware world.

Banking Trojans steal money from mobile users’ bank accounts that are linked to their bank cards and apps. These types of malware are popular with hackers because they provide a direct route into other people’s accounts.

Clueless users unwittingly download mobile banking Trojans disguised as legitimate apps. Once a banking app is launched, the Trojan displays its own interface overlaying the banking app’s interface. As a user inputs credentials, the malware steals the information. Most cases also show that mobile banking Trojans intercept SMS messages from banks with confirmation codes or information about withdrawals.

On the other hand, ransomware Trojans steal users’ files and demands ransom from its victims. The type of malware that targets Android mobile devices is called Blockers, which are so named because they block access to the infected device. It deems the files inaccessible and blocks the entire mobile system. An infected Android device will have a screen overlayed with a dodgy banner or demanding a PIN.

Usually, ransomware gets into an Android device when its user opens a malicious attachment, clicks on a suspicious link, installs apps from third-party app stores or clicks on an ad even on a legitimate website.

Increased attempts

In the Philippines, there have been 30 attempts to install mobile ransomware in Android devices of Kaspersky mobile solution users in nine months this year compared to just 15 last year. There were already 49 attempts in nine months this year to install mobile banking malware detected in Android devices of Kaspersky customers in the country compared to 46 instances in 2018.

The top five mobile Trojans monitored to have been attempting to infect Android devices of Kaspersky mobile security users in the Philippines for two consecutive years are the following:

From Kaspersky data, it shows that Filipino Android mobile users are targets of Hiddapp mobile malware. This malware family uses advertising as its main monetization method. It secretly downloads ads on to the infected device, displaying as many ads as possible to the Android device user. These Trojans can hide in the system folder which makes them difficult to remove. If the user detects the adware app, the Trojan will prevent the app from being deleted and instead re-install it at the first opportunity.

The Boogr family are Trojans assigned to files recognized as malicious by Kaspersky’s machine-learning tools. The fourth top mobile malware Dvmap is an extremely dangerous Trojan as they use superuser privileges to carry out their malicious activity. They place their components in the device which the Android user only has read access to so these types of malware cannot be removed using regular system tools. The fifth top mobile malware Agent family covers a wide range of Trojan specimens from various developers.

Dropper

In 2018, Filipino Android users got a lot of the Dropper mobile malware family, which displays persistent ads and steals money through SMS subscriptions. The Dropper is designed to bypass detection and used by cybercriminals to wrap all sorts of payloads such as banking Trojans, ransomware and adware.

The Triada has similar characteristics as with the menacing Dvmap.

“We can see that attempts to infect Kaspersky mobile users year on year is quite going down in SEA and we attribute that to the growing awareness of the public about protecting their mobile data,” said Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky. “The Philippines is hands-down an Android country and combined with the Filipinos’ very strong interest in digital activities, we understand why at No. 3 overall in the region, Filipino Android users remain to be among cybercriminals’ targets.”

“We should remember that all users must exert effort in protecting their smartphones especially as they use it increasingly for critical transactions such as online shopping and online banking. With the BYOD being a trend embraced in the country, we also encourage businesses to pay attention to how their employees protect their devices, especially those being used for corporate purposes. For this, we continue working with local partners like Smart and Home Credit in the Philippines to help make mobile security more affordable and accessible to more Filipinos.” Yeo added.

Kaspersky suggests the following ways to spot and avoid Android malware:

  • Download apps only from official stores such as Google Play. It won’t provide a full security guarantee, but the risk of encountering a Trojan is considerably lower. Apps from third party marketplaces are exactly where hackers plant their malware-ridden apps.
  • Block the installation of software from third-party sources in the device settings. This eliminates randomly downloaded threats that attempt to mimic system updates and the like. Go to Android settings, choose Security and uncheck/disable the “Unknown Sources” box.
  • Remember to install system and application updates — they patch vulnerabilities that criminals can exploit.
  • Think hard before clicking on dubious links in email or text messages.
  • Pay attention to permissions requested by apps during installation. Be discerning about whether they match the purpose of the app. Granting the wrong permissions can send sensitive data off to third parties.
  • Be wary of a free antivirus trial as it could be malware-in-disguise that can attack mobile devices. Affordable Android security software is available from trusted vendors and effectively does the job of blocking malicious apps.

1 reply »