Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Mobile threats in March 2014

April 3, 2014

Russian anti-virus company Doctor Web continues to analyse statistics collected by its Dr.Web Anti-virus for Android. They showed that in March 2014 the Dr.Web Anti-virus detected 7,866,900 malicious or unauthorized applications on the devices.

The greatest number of malicious and potentially unwanted programs—334,212—was detected by Dr.Web for Android on March 13, 2014. On the opposite end of the spectrum, March 11 accounts for the fewest number of malware incidents—244,478. The daily average was roughly 250,000 threats.

Most often, Dr.Web for Android detected various kinds of adware designed to help generate profits from free Android apps: Adware.Revmob, Adware.Airpush and Adware.Leadbolt, among other programs. Android.SmsBot.42.origin, intended mainly for the covert distribution of SMS messages to premium numbers, was the most frequently detected program. An application with similar functionality — Android.SmsSend.1088.origin — ranked second. The ten most common threats discovered on mobile devices by Dr.Web in March are presented in the table below.

Threat name%
1Android.SmsBot.42.origin3,24
2Android.SmsSend.1088.origin, Android.SmsSend.4581,80
3Android.SmsSend.315.origin1,75
4Android.SmsSend.1123.origin1,66
5Android.SmsSend.859.origin1,52
6Android.Spy.83.origin1,39
7Android.SmsBot.45.origin1,33
8Android.SmsSend.466.origin1,23
9Android.SmsSend.939.origin0,94
10Android.SmsSend.758.origin0,91

Dr.Web Anti-virus for Android includes a special component—the Security Auditor. It is designed to search for various operating system vulnerabilities that can be exploited by hackers or malicious software to carry out attacks on Android-powered devices. The Dr.Web anti-virus can identify several such loopholes. One of them—Master Key—is the flaw in Android security routines that makes it possible to install unsigned applications from packages containing files with identical names. Two other vulnerabilities—Extra Field and Name Length Field—can theoretically allow attackers to include in a tampered apk package a Trojan executable that will successfully pass automatic verification during installation. Thus, the potential danger exists for a malignant application to penetrate a device without the OS detecting it as a threat.

As of March 31, 2014, Dr.Web identified the vulnerability Name Length Field on 80.19% of protected devices, and the vulnerabilities Extra Field and Master Key were found on 48.56% and 46.95% of devices, respectively (sometimes several vulnerabilities are found on a single device). The pie charts below provide information about Android versions affected by the vulnerabilities.

dia

dia

dia

Thus, today, vulnerabilities are most frequently identified in Android 4.1.2 and 4.0.4, with version 4.1.2 being one of the most common (it is installed on devices belonging to 27.16% of Dr.Web users). Version 4.0.4 only ranks third in popularity (21.14% of devices). It is surpassed by Android 2.3.3-2.3.7. According to statistics collected by Doctor Web, most Android firmware containing vulnerabilities is found on mobile devices from a renowned Korean manufacturer. Mobile phones and tablets from obscure Chinese companies rank second; in third and fourth place, respectively, are devices from a popular Taiwanese firm and another well-known South Korean company.

Devices can also get infected if their users fail to comply with security rules. According to our statistics, 49.74% of users adjusted operating system settings to enable the option to install applications from unknown sources. 14.8% of users enabled the USB debug mode, which could potentially result in a total data breach.

3.89% of users use rooted devices with administrator privileges, which also opens up unlimited opportunities for malicious programs when they reach the smart phone or tablet. And 13.3% of devices use third-party Android firmware, the kind that is typically distributed by numerous Chinese manufacturers. Such firmware also provides malware with extra opportunities, and users often do not even know about the risks.

Doctor Web will continue to closely monitor the spread of malware for Android and inform users about the potential dangers.

Protect your Android handheld with Dr.Web now

Buy online Buy via Google Play Free of charge

Learn more with Dr.Web

Virus statistics Virus descriptions Virus monthly reviews Laboratory-live

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040