HummingBad. Stagefright. QuadRooter.
Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend – one that our research team encounters daily – is illustrated in the Gartner Market Guide for Mobile Threat Defense (http://APO.af/xHieRt) Solutions.*
This rise in the sophistication and volume of mobile malware and continued exposure to unknown vulnerabilities demonstrates how Android and iOS devices simply aren’t secure on their own.
According to the Check Point 2016 (https://www.CheckPoint.com) Security Report mobile devices pose massive risks for organisations. Some of the key takeaways include:
- Employees mix business with personal use and 1 in 5 mobile devices are infected
- One in five employees will be the cause of a company network breach through either malware or malicious Wi-Fi
- Mobile security lags behind mobile adoption as users discover new ways of engaging while on the go
The Mobile Threat Defence Market is Growing Rapidly
Mobile malware and vulnerabilities aren’t all that different than their cousins in the PC world. We’ve seen how today’s mobile malware imitates techniques introduced by PC malware. According to the 2016 Security Report the five major categories of attacks and vulnerabilities challenging the mobile device space are:
- System Vulnerabilities
- Root Access and Configuration Changes.
- Repackaged or Fake Apps
- Trojans and Malware
- Man-in-the-Middle AttacksAs mobile threats develop, more companies should adopt mobile security solutions designed to keep pace with this evolution.
Is your business ready for the next mobile breach? Find out!
According to Gartner, “by 2018 fewer than 15% of organisations will have mobile threat defense (MTD) in place, which is an increase from fewer than 5% today.” We believe if the number of organizations implementing MTD solutions triples by 2018, it becomes that much harder for cybercriminals to infiltrate and exploit mobile devices, and gives them even less motivation to do so.
- Learn More: CISO’s Guide to Mobile Threat Prevention (http://APO.af/C8H82s)
- Watch: How Check Point Mobile Threat Prevention Works (http://APO.af/I32gO4)
The time to act is now. If organisations don’t do something soon to stop mobile malware in its tracks, we’ll soon face a problem on a much wider scale, like the one we encounter already for PCs today.
Organisations Need Across-the-Board Protection
Cybrercriminals focus on three main vectors to conduct attacks on mobile devices:
- Networks: Network attacks allow cybercriminals to handpick their targets, minimizing the potential risk of discovery and focusing their efforts only on the specific objective. Cybercriminals can easily set up a fake hotspot, or hijack an existing one.
- Apps: App-based attacks provide cybercriminals with the greatest capabilities, enabling them to compromise virtually any target. Malicious apps can be found in a number of Both the Apple App Store and Google Play have been contaminated with malware. The situation is even worse in third-party app stores which have even less control over the apps they host.
- Device: Both iOS and Android are riddled with exploits developers constantly struggling to patch. These exploits exist everywhere, from the kernel through the chipsets to the OS. From the moment an exploit is discovered to the moment it is patched, cybercrminals can use it to attack defenseless users.
Accordingly, Gartner says “MTD solutions provide security at one or more of these four levels:
- Device behavioral anomalies —MTD tools provide behavioral anomaly detection by tracking expected and acceptable use patterns.
- Vulnerability assessments —MTD tools inspect devices for configuration weaknesses that will lead to malware execution.
- Network security —MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.
- App scans —MTD tools identify “leaky” apps (meaning apps that can put enterprise data at risk) and malicious apps, through reputation scanning and code analysis.”
Check Point Mobile Threat Prevention (http://APO.af/u0qi2j) combats threats all four of these levels to help keep mobile devices and data safe. It uses static and dynamic threat analysis to detect malicious and leaky apps. It detects and blocks jailbreak or root attempts which can undermine a device’s built-in protections, and it blocks network attacks and malicious network connections.
With billions of new connections formed every minute, the world is more globally linked than ever. Innovations like cloud, mobility and IoT are changing the way we deploy, the way we consume, and the way we secure technology. More and more malware is being put into our ecosystem that traditional security techniques are powerless to prevent. Given this, staying a leader requires being one step ahead of things you cannot see, know or control – and preventing attacks before they happen. Organisations need to do everything in their power to ensure that they are as secure as possible. Some of the best practices to protect your mobile business are:
- Educate your workforce
- Define your risk tolerance
- Enforce basic hygiene
- Separate work and personal data
- Invest for an uncertain future
For the modern enterprise advanced threat prevention, mobile device protection and segmenting a network are all critical components in order to secure themselves.
*Gartner Market Guide for Mobile Threat Defense Solutions, John Girard, Dionisio Zumerle, Published: 28 July 2016
Distributed by APO on behalf of Check Point Software Technologies Ltd..