As smartphone viruses creep closer to U.S. shores, malicious programmers behind them have become more ingenious, according to a report issued Tuesday by computer security firm McAfee. Predictably, itโs all about the money โ that is, hackers are learning how to turn your smartphone into cash for them.
One year ago, state-of-the-art smartphone viruses tricked the gadgets into dialing pricey international phone numbers or sending premium texts routed through accounts controlled by hackers, not unlike old-fashioned 1-900 toll call scams. But a new crop of sophisticated mobile phone viruses are worming their way into consumersโ handset software and enabling criminals to send themselves cash directly without a phone ever leaving your pocket.
โThe type of threat is really evolving,โ said Adam Wosotowsky, a threat researcher for McAfee Labs who helped prepare the McAfee Threats Report. For example, a new crop of mobile viruses intercept two-factor authentication codes sent as text messages by banks, cracking a system that has long been considered safe. Some phone viruses are smart enough to collect passwords and launch mobile bank apps, the report says.
Researchers are also discovering much more sophisticated infection ploys from mobile virus writers, said Wosotowsky. Rather than shoe-horning malicious code into existing apps, some are even writing mobile malware from scratch. In one instance, McAfee found an online dating app that was completely fake, and designed only to infect a usersโ phone.
โEven if the apps donโt really work, most users donโt bother uninstalling apps after they go on a download binge, so it works (for the virus writer),โ he said.
โThis Is a Robbery!โ
The McAfee report also found an explosion of โransomwareโ viruses, both on PCs and mobile phones. With ransomware, a computer criminal infects a usersโ gadget and makes it lock up, then demands the user pay $50 or $100 for software that allegedly cleans the infection. Often, users who pay up find their machines are still infected. McAfee said it found 320,000 different ransomware programs last quarter, double the amount from last year. That must mean ransomware is working for criminals; warnings issued by Scotland Yard, the FBI and other international agencies also show the extent of the ransomware problem.
The Android platform remains the most attractive target for mobile phone hackers, Wosotowsky said. The firm uncovered more than 17,000 Android viruses in the second quarter of this year, and expects 2013 to bring twice as many such viruses as 2012.
Googleโs Android platform is more โopen,โ than Appleโs iPhone โ Android users can download and install new apps from anywhere, while iPhone users must use Appleโs App Store โ making Android a better platform for hackers. The target is bigger, too. Worldwide, Androidโs new shipment market share is now 80 percent, compared to iPhoneโs 13 percent, according to IDC.
Non-English speaking Android users, particularly in Asia, are the easiest targets for mobile virus writers, because they are much more likely to use third-party app sites instead of Googleโs Play store. But American users shouldnโt take much comfort in that. Virus writers have upped their game in delivery mechanisms designed to hit Americans. Earlier this year, a mobile virus named NotCompatible attacked 10,000 U.S. phones daily, according to security firm Lookout. Its trick: Using clever spam that appeared to come from a friend to fool recipients into clicking on a link and agreeing to download a malicious app.
In most attacks, hackers download a legitimate phone app, edit it to include a dangerous payload, and then upload it to an app store. What appears to be an innocent game for kids can be turned into a Trojan horse that intercepts every phone keystroke, and can now even initiate banking transfers without user intervention.
Such attacks can be lucrative. A malicious program named Eurograbber is blamed for stealing $47 million from 30,000 bank accounts this way, according to a report by security firm F-Secure.
And even if smartphone users avoid clicking on booby-trapped spam e-mails and downloading apps from rogue locations, theyโre not entirely in the clear. Another disturbing trend: so-called cross-platform hacking, in which computer criminals infect a userโs PC with a virus, then use that PC to leap onto a victimโs smartphone the next time itโs attached via USB cable. Because the phone has a trust relationship with the PC, it allows installation of the bogus app.
โKeep in mind your online identity involves all your machines,โ Wosotowsky said. โWhen you connect them together, they can infect each other. โฆ Weโre going to start seeing cross-over there.โ
You can spot a possible hack by monitoring your credit regularly. You can pay for a monitoring service, or you can use the free Credit Report Card to watch your credit.
Red Tape Wrestling Tips
- Stick with app stores you know. Googleโs Play store and Appleโs App Store arenโt fool-proof, but they are close. Donโt be tempted to try apps you find other places online, even if the invitation comes from a friend. Having your phone hacked can be a lot more devastating than having your PC hacked; itโs not worth tempting fate.
- Donโt allow an app you download to trigger a download of another app thatโs outside the standard app stores. Even if you trust the first app, such escalation is a new trick from virus writers, Wosotowsky said.
- If you are infected by ransomware, donโt pay! That probably wonโt fix your computer. Go to another computer and find fix-it tools from reputable antivirus firms. (Donโt fall for โfixesโ posted by other hackers.)
โEvery aspect of our day to day life is online now, with mobile phones,โ Wosotowsky said. โWe are going to see lot more of malware targeted in that direction.โ
Image: iStockphoto
You Might Also Like
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams