{"id":76959,"date":"2013-10-15T19:32:11","date_gmt":"2013-10-15T14:02:11","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=76959"},"modified":"2013-10-15T19:32:11","modified_gmt":"2013-10-15T14:02:11","slug":"the-top-20-android-malware-quick-heal-mobile-threat-report","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/the-top-20-android-malware-quick-heal-mobile-threat-report\/","title":{"rendered":"The Top 20 Android Malware &#8211; Quick Heal Mobile Threat Report"},"content":{"rendered":"<p>Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share (<em>source: www.androidcentral.com, report as of August 2013<\/em>).<\/p>\n<p>The open source nature of Android has made it the most popular mobile platform in the world. But as they say, every Dr. Jekyll has a Mr. Hide with it. The overwhelming popularity of the green droid, and its staggering market share has placed it on a mantlepiece in the house of hackers and cyber criminals. This is easily evident by the fact that 99.9% of new mobile malware that are spewed by hackers, are designed to target Android. And with the ever increasing use of mobile Internet, Android has easily attracted the attention of budding and seasoned malware authors.<\/p>\n<p><span style=\"color: #0b614b; font-size: 16px; font-weight: bold;\">A Quick Roundup of the top 20 Malware as Analyzed by Quick Heal Threat Research and Response Team<\/span><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware_detection_top.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76977 aligncenter\" alt=\"android_malware_detection_top\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware_detection_top.png\" width=\"525\" height=\"351\" \/><\/a><\/p>\n<p>1. <span style=\"color: #ff4000;\">Android.FakeRun.A<\/span><br \/>\nAndroid FakeRun.A is an Android Trojan horse. It is designed to display ads on the infected device, to earn money for the malware author.<\/p>\n<p>2. <span style=\"color: #ff4000;\">Android.NickySpy.A<\/span><br \/>\nAndroid.NickySpy.A is an Android Trojan that steals information from the infected device and sends it to a remote server.<\/p>\n<p>3. <span style=\"color: #ff4000;\">Android GingerMaster<\/span><br \/>\nAndroid GingerMaster is an Android Trojan horse. It is typically embedded in a fake version of popular games.<\/p>\n<p>4. <span style=\"color: #ff4000;\">Android.Nyearleaker.B<\/span><br \/>\nAndroid.Nyearleaker.B is an Android Trojan horse. This malware comes in the form a live wallpaper application that steals information from the victim&#8217;s device.<\/p>\n<p>5. <span style=\"color: #ff4000;\">Android.Ewalls.B<\/span><br \/>\nAndroid.Ewalls.B is an Android Trojan. It poses itself as a wallpaper application, and steals information from infected devices.<\/p>\n<p>6. <span style=\"color: #ff4000;\">Android.Obad.A<\/span><br \/>\nAndroid.Obad.A is a sophisticated Android malware that gains admin privileges. Once it gains admin rights, it cannot be removed manually from the compromised device.<\/p>\n<p>7. <span style=\"color: #ff4000;\">Android.Iconosis.A<\/span><br \/>\nAndroid.Iconosis.A is a Trojan horse designed to steal information from infected Android devices. Once installed, the malware collects the phone number and IMEI number of the compromised device.<\/p>\n<p>8. <span style=\"color: #ff4000;\">Android.Aplog.A<\/span><br \/>\nAndroid.Aplog.A is an Android Trojan. It is usually detected as a fake version of legitimate games; Temple Run is one of them.<\/p>\n<p>9. <span style=\"color: #ff4000;\">Android.FakeInst.AI<\/span><br \/>\nAndroid.FakeInst.AI is a Trojan. It can allow a hacker to manipulate SMSs and user location in the compromised Android device.<\/p>\n<p>10. <span style=\"color: #ff4000;\">Android.Fakebrows.A2aab<\/span><br \/>\nAndroid.Fakebrows.A2aab is an Android Trojan that disguises itself as a legitimate app.<\/p>\n<p>11. <span style=\"color: #ff4000;\">Exploit.Lotoor.Af<\/span><br \/>\nExploit.Lotoor.Af is an exploit design to gain root privileges on Android devices. Once installed, the exploit can gain complete privilege of performing any activity on the compromised device.<\/p>\n<p>12. <span style=\"color: #ff4000;\">Android.Fakelook.A5046<\/span><br \/>\nAndroid.Fakelook.A5046 is a back door. This malware hides itself from the Application List and collects the identity of the infected device.<\/p>\n<p>13. <span style=\"color: #ff4000;\">Android.Badao.A<\/span><br \/>\nAndroid.Badao.A is a Trojan. The malware is designed to manipulate the Short Messaging Service in infected devices.<\/p>\n<p>14. <span style=\"color: #ff4000;\">Android.Fakeapp<\/span><br \/>\nAndroid.Fakeapp is a Trojan horse designed for Android devices. The malware displays ads by downloading configuration files without the user\u2019s knowledge.<\/p>\n<p>15. <span style=\"color: #ff4000;\">Exploit.Zergrush.C48<\/span><br \/>\nExploit.Zergrush.C48 attacks any vulnerability present in the targeted Android device, to gain root privileges.<\/p>\n<p>16. <span style=\"color: #ff4000;\">Android.Downsms.A<\/span><br \/>\nAndroid.Downsms.A is an Android Trojan. Once installed, it sends SMSs to premium-rate numbers, and can write to external storage of the infected device.<\/p>\n<p>17. <span style=\"color: #ff4000;\">Android.MketPay.A<\/span><br \/>\nAndroid.MketPay.A is a Trojan. It is usually found repacked in legitimate applications available in many Chinese markets.<\/p>\n<p>18. <span style=\"color: #ff4000;\">Android.Tatus.A<\/span><br \/>\nAndroid.Tatus.A keeps a record of applications installed in the device, and sends this data to a remote server. It is a Trojan horse.<\/p>\n<p>19. <span style=\"color: #ff4000;\">Android.Opfake.E<\/span><br \/>\nAndroid.Opfake.E is a Trojan horse detected on Android devices. It comes bundled with a legitimate version of the Opera mobile browser.<\/p>\n<p>20. <span style=\"color: #ff4000;\">Android.Ksapp.C<\/span><br \/>\nAndroid.Ksapp.C is an Android Trojan. It steals sensitive information and sends the gathered information to a remote server.<\/p>\n<p><span style=\"color: #0b614b; font-size: 16px; font-weight: bold;\">Android Malware Detection by Quick Heal<\/span><br \/>\n<strong>Total malicious programs detected<\/strong> &#8211; <strong>4,31,397<\/strong><br \/>\n<em>Adware <\/em>\u2013 94%<br \/>\n<em>Malware <\/em>\u2013 2%<br \/>\n<em>Potential unwanted programs (PUP)<\/em> \u2013 4%<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware_detection.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76978 aligncenter\" alt=\"android_malware_detection\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware_detection.png\" width=\"461\" height=\"327\" \/><\/a><\/p>\n<p><span style=\"color: #0b614b; font-size: 16px; font-weight: bold;\">Growth of Android Malware<br \/>\n<\/span>The following graph gives a brief overview on the growth of Android malware, as observed by Quick Heal Threat Research and Response Team.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware-_detections_statistics.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-77072 aligncenter\" alt=\"android_malware-_detections_statistics\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_malware-_detections_statistics.png\" width=\"570\" height=\"310\" \/><\/a><\/p>\n<p><span style=\"color: #0b614b; font-size: 16px; font-weight: bold;\">Some Quick Facts about Mobile Security<\/span><\/p>\n<p><strong>#<\/strong> Most Android apps ask for too much permission even to perform their basic operations.<\/p>\n<p><strong>#<\/strong> Many cyberattacks on mobile phones occur through compromised applications or exploited mobile web browsers.<\/p>\n<p><strong>#<\/strong> Since 2012, malware that target the Android platform has shot up by 600%.<\/p>\n<p><strong>#<\/strong> Reportedly, Jelly Bean seems to have a tighter security compared to the previous versions of the Android OS. However, about 50% of <a href=\"https:\/\/blogs.quickheal.com\/4-ridiculously-easy-steps-to-keep-your-android-safe\/\" target=\"_blank\">Android devices<\/a> are running some or the other version of this OS.<\/p>\n<p><strong>#<\/strong> Android malware has already hit the one million mark. This is in stark contrast with PC malware, which took almost a decade to reach this level.<\/p>\n<p><strong>#<\/strong> Smishing is a variant of phishing, where phishers use SMSs to trick their targets. It is an identity theft scheme that attempts to steal sensitive information from the victim. This is done either by tricking the victim into visiting a fake website or call a phone number. In some cases, smishing scams also attempt to drop malware on targeted devices.<\/p>\n<p><strong>#<\/strong> Mobile users are more susceptible to phishing attacks than desktop users. This is because, people readily read text or email messages as soon as they hit the inbox.<\/p>\n<p><span style=\"color: #0b614b; font-size: 16px; font-weight: bold;\">Android Apps Sources<\/span><br \/>\nIt is always a safe bet to install Android apps from the Google Play Market or from their official sources. But, if you take a look at the following data, you might get a hint behind the explosion of Android malware in the last few years.<\/p>\n<p><span style=\"color: #ff4000; font-style: italic; font-family: Georgia;\">According to a study done by AV-Comparatives, third party Android stores play host to around 7,000 dangerous mobile apps.<\/span><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_apps_distribution_channels.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76968 aligncenter\" alt=\"android_apps_distribution_channels\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/android_apps_distribution_channels.png\" width=\"589\" height=\"339\" \/><\/a><\/p>\n<p>Time and tide waits for none, neither does technology. It keeps moving on with an ever increasing pace. And where technology goes, cyber crime follows. In this report, we presented to you an analysis of the top 20 malware plaguing the Android platform. And that is the just the tip of the iceberg. Malware authors are hell-bent on developing more sophisticated and nefarious malware. Although there is no silver bullet to deal with this situation, taking the right precautionary measures, using a reliable <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.quickheal.platform.advance.blue\" target=\"_blank\">mobile antivirus solution<\/a>, and keeping ourselves aware of information security should place us at a safer spot.<\/p>\n<p>In our next blog post, we will discuss how these Android malware work. So, stay tuned!<\/p>\n<p><em>Blog Post Acknowledgement: Quick Heal Threat Research and Response Team.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share (source: www.androidcentral.com, report as of August 2013). The open source nature of Android has made it the most popular mobile [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,24,354,60],"tags":[380,674,675,676,677,678,679],"class_list":["post-76959","post","type-post","status-publish","format-standard","hentry","category-android","category-malware","category-mobile-security-2","category-smartphone","tag-android-malware","tag-google-apps","tag-malware-families","tag-quick-heal-mobile-security","tag-sms-trojan","tag-threat-report","tag-top-android-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/76959"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=76959"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/76959\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=76959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=76959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=76959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}