Previous Page  49 / 96 Next Page
Information
Show Menu
Previous Page 49 / 96 Next Page
Page Background

Mitigating

Mobile Threats

The Check Point survey also

shows that 68 percent of respondents

say malware protection is the key

capability required for an effective

mobile threat defense solution,

followed by reporting and monitoring

(64 percent) and ease of deployment

(58 percent) close behind. PCs and

laptops are different animals than

smartphones and tablets, so it’s

no surprise that keeping these

devices protected requires a differ-

ent approach than traditional net-

work security often provides. The

report data also highlighted that

more visibility across mobile es-

tates is needed in order to ensure

better security.

This news comes as mobile

malware volumes continue to sky-

rocket – mobile ransomware alone

has doubled its infections in the last

year. It’s also getting smarter. Con-

sider HummingWhale, a new variant

of the HummingBad malware, which

has been found hiding in more than

20 apps on Google Play. It includes

new, cutting-edge techniques that al-

low it to perform ad fraud better than

ever before. In this case, the infected

apps were downloaded several mil-

lion times by unsuspecting users

before the Google Security team re-

moved them from Google Play.

HummingWhale’s command and

control server (C&C) provides fake

ads and apps to the installed mal-

ware, which presents them to the

user. Once the user tries to close

the ad, the app, which was already

downloaded by the malware, is up-

loaded to the virtual machine and

runs as if it is a real device. This

action generates the fake refer-

rer ID, which the malware uses to

generate revenues for the perpetra-

tors. HummingWhale also conducts

further malicious activities, such

as displaying illegitimate ads on a

device, and hiding the original app

after installation.

“When you look at how rapidly

we’re changing and evolving this

digital transformation with everything

going to the cloud and everything

being accessible via mobile, and

mobile overtaking the desktop, and

the Internet of things and all of these

great technologies, our data is going

places we never imagined it would go

before,” said Meyer. “It also means

we’re more interconnected than we

ever have been before. Shadow IT

is creating all kinds of problems, and

BYOD is creating even more prob-

lems, and security is losing control.

Most organizations’ security posture

is based on a physical, static, manual

approach – but that doesn’t work in

today’s environment.”

He added, “Organizations are driv-

ing their businesses forward and it’s

all about being more dynamic and

responsive. And that’s great, but we

also have to think about the security

implications of that.”

o

March - April, 2017

|

Channel

Vision

49