A big week in security attacks an analysis. Below is the report on Android malware attacks and the big story this week is the attacks by the Syrian Electronic Army on DNS impacting The New York Times, Twitter and HuffPost though probably other companies were impacted but not reporting them.
Thanks to Public Intelligence for their report DHS-FBI Bulletin: Threats to Mobile Devices Using the Android Operating System. “Android is the world’s most widely used mobile operating system (OS) and continues to be a primary target for malware attacks due to its market share and open source architecture. Industry reporting indicates 44 percent of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread-which were released in 2011 and (U) Malware Threats to Mobile Operating Systems, 2012 have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The following are some known security threats to SMS (Text Message) Trojans represent Sends text messages to premium-rate nearly half of the malicious applications numbers owned by criminal hackers circulating today on older Android OS. Rootkits are malware that hide their Logs the user’s locations, keystroke loggers, and existence from normal forms of detection passwords without the user’s knowledge. In late 2011, a software developer’s rootkit was discovered running on millions of mobile devices. Fake Google Play applications that enable malicious actors to browse and download steal sensitive information, including music, books, magazines, movies, financial data and log-in credentials.” Notice all the rest of the attacks on Windows Mobile, iOS, Blackberry and others are hardly 2%.
Click on image for TECHtionary under “V” for virus you will find the indepth animated tutorial on all kinds of viruses.
Since Viruses, Worms, Spyware, Malware and other attacks may result from poor Security and Admission Control Policies; let’s review some of the potential types of attacks. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, etc.
A Virus is program that changes data on a computer without consent. This tutorial will review:
– Boot Sector viruses – programs that attack the boot or startup sector of the computer
– Parasitic viruses – programs that attach themselves to email or other programs
– Worms – programs which can duplicate or replicate themselves across computers or via email to other networks
– Macro viruses – programs that use common software commands called macros (copy, paste, delete) to replace existing functions in word processing, spreadsheets, presentation programs
– Trojan Horses – programs that are something other than what they appear to be
– Backdoor Trojan Horses – programs that enter as one program and take control of the computer or program
– Polymorphoric viruses – program that mutates into another program.
Like with any other new technology new forms of viruses and other harmware will emerge. As with other hazards the question one should ask is what is the manufacturer doing about it rather than the user having to worry about it.