{"id":62299,"date":"2018-02-07T13:00:40","date_gmt":"2018-02-07T21:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=62299"},"modified":"2019-01-29T13:05:51","modified_gmt":"2019-01-29T21:05:51","slug":"sp-mobile-android-even-bigger-opportunity-attackers-windows-pcs","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2018\/02\/sp-mobile-android-even-bigger-opportunity-attackers-windows-pcs\/","title":{"rendered":"Mobile Android Is an Even Bigger Opportunity for Attackers Than Windows PCs"},"content":{"rendered":"<p>Mobile Android is now a bigger threat opportunity than Windows PCs \u2013 in terms of shipments, usage, installed base and the number of vulnerable targets.<\/p>\n<p>According to <a href=\"http:\/\/gs.statcounter.com\/os-market-share\" rel=\"nofollow,noopener\" >Statcounter<\/a>, at the end of 2017, the leading mobile operating system, Android OS, was the most used global operating system, surpassing usage of 17 other operating systems, including Windows. Android had surpassed Windows shipments a few years ago, reaching 1.9 billion by the end of 2017 \u2013 nine times the shipments of traditional PCs according to <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3816763\" rel=\"nofollow,noopener\" >Gartner<\/a>. There are now 2.7 billion Android-based smart devices in use, compared to an estimated 1.5 billion Windows devices.<\/p>\n<p>Historically, cybercriminals simply did not have enough vulnerable mobile devices out there to make significant attacks worthwhile. That\u2019s changed. Cybercriminals are in it for the money; and they look for the most vulnerable targets, in the greatest quantity, that will take the least amount of effort to breach and have the highest potential for monetary gain.<\/p>\n<p>This building of mobile threat has been foreseen for some time. In 2006, roughly six months before the release of the first iPhone, <a href=\"http:\/\/www.cs.virginia.edu\/~robins\/Malware_Goes_Mobile.pdf\" rel=\"nofollow,noopener\" >Scientific American<\/a> warned about the perils of mobile malware and noted mobile malware growth at that time roughly paralleled that of computer viruses in the first two years after the first PC virus, \u201cBrain,\u201d was released in 1986.<\/p>\n<p>In 1988, computer experts dismissed viruses as inconsequential, vastly underestimating how quickly malware could grow in prevalence, diversity and sophistication. In their 2006 article, Scientific American also warned about making the same mistakes with mobile, pointing out that the bigger the target, the greater the attraction for malicious programmers and that smartphones would soon make up most of the world\u2019s computers (now true).<\/p>\n<p>Outdated Windows devices have proven to be a significant security risk. About <a href=\"https:\/\/www.mirror.co.uk\/tech\/how-many-computers-still-running-10425650\" rel=\"nofollow,noopener\" >140 million<\/a> active Windows PCs are still running Windows XP, a 14-year-old operating system that Microsoft stopped updating in 2014. The massive WannaCry cyberattack last year exploited a security hole in the Windows XP operating system.<\/p>\n<p>But in comparison, Android has about one billion of the 2.7 billion active devices running outdated operating systems. That\u2019s about seven times the amount of vulnerable XP devices.<\/p>\n<p>Mobile devices do have had some advantages over Windows security-wise, so maybe that will help stall the pace of infection and attack going forward. Applications are more tightly controlled by OS leaders, like Apple and Google, and users must provide permission to allow access to core phone functions. There are fewer malicious actors adept in mobile software. But counter to that is the more casual attitude of subscribers towards security of their mobile devices and the fact that mobile devices have billing mechanisms built in, leading to SMS fraud.<\/p>\n<p>Most mobile subscribers don\u2019t apply even the basic security passwords, and even fewer install device protection. Permissions in new apps are requested and granted broadly by impatient subscribers. The monetary incentives are also getting sweeter for cybercrime. Use of mobile for financial transactions is growing. The <a href=\"https:\/\/www.gsma.com\/mobilefordevelopment\/sotir\" rel=\"nofollow,noopener\" >GSMA<\/a> estimated that the industry processed 22 billion financial transactions in 2016 and identifies mobile technology as key to transforming access to financial services in emerging markets for hundreds of millions of people.<\/p>\n<p>Our Unit 42 threat intelligence team has been analyzing threat trends and reporting on the last four years of new Android malware evolution. Check out their latest research on Android threats.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/09\/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions\/\">Android Toast Overlay Attack: \u201cCloak and Dagger\u201d with No Permissions<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/unit42-spydealer-android-trojan-spying-40-apps\/\">SpyDealer: Android Trojan Spying on More Than 40 Apps<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-new-trend-android-adware-abusing-android-plugin-frameworks\/\">A New Trend in Android Adware: Abusing Android Plugin Frameworks<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/02\/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom\/\">New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-google-play-apps-infected-malicious-iframes\/\">Google Play Apps Infected with Malicious IFrames<\/a><\/li>\n<\/ul>\n<p>Will the threat landscape for mobile networks and devices reach the attack volume witnessed with Windows devices and enterprise networks? We believe the answer is \"yes,\" and we think the trend is well underway.<\/p>\n<p>For mobile network operators, the growing number of attacks threatens their own infrastructure as well as their subscribers. Malware-infected devices can be recruited into botnets and turn against mobile infrastructure to degrade network availability. The full visibility provided by Palo Alto Networks Next-Generation Security Platform is essential as it allows mobile network operators to monitor building threats, identify already infected devices and determine appropriate action.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/mwc2018\"><div style=\"max-width:100%\" data-width=\"601\"><span class=\"ar-custom\" style=\"padding-bottom:33.28%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-62314 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/02\/PAN_MWC-18_Social-Suite_blog_600x200.png\" alt=\"PAN_MWC-18_Social-Suite_blog_600x200\" width=\"601\" height=\"200\" \/><\/span><\/div><\/a><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><a href=\"http:\/\/go.paloaltonetworks.com\/mwc2018\">Connect with us at Mobile World Congress in Barcelona<\/a><\/strong><\/span><\/p>\n<p>Want to learn what we\u2019re doing to help secure the new hyper-connected world that we live in? Connect with our mobile network specialists or reserve your seat at one of our speaking sessions at Mobile World Congress in Barcelona.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile Android is now a bigger threat opportunity than Windows PCs. What mobile network operators need to know about the current mobile threat landscape <\/p>\n","protected":false},"author":336,"featured_media":28659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6717,1097],"tags":[172,234,209],"coauthors":[3480],"class_list":["post-62299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-services","category-service-providers","tag-android","tag-mobile","tag-threat"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/05\/blog-service-providers-banner-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/62299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=62299"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/62299\/revisions"}],"predecessor-version":[{"id":62356,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/62299\/revisions\/62356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/28659"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=62299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=62299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=62299"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=62299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}