• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Mobility, News, Physical Security

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

New strains of mobile malware are recording audio and video, tracking location and destroying or wiping data, according to Proofpoint.

March 10, 2022 Zachary Comeau Leave a Comment

Mobile Malware
stock.adobe.com/Yingyaipumi

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report.

This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware are recording audio and video, tracking location and destroying or wiping content and data, according to the report.

Android phones, due to the more open approach to app stores and the ability to sideload apps from anywhere on the internet, are more susceptible to compromise.

While many strains of mobile malware aim to give attackers control of the device or the ability to steal sensitive information and credentials, newer strains are allowing hackers to record conversations, including both audio and video from the device.

In addition, destructive malware that can wipe data from a device has also been seen in the wild recently, Proofpoint says.

Much of this malware is delivered via phishing, including via SMS text message, designed do trick the user into inputting credentials on a fake login page. Other malware hides in the background to steal credentials once certain apps, usually finance related, are activated.

Proofpoint highlighted several prevalent strains of mobile malware, mostly impacting Europe and Asia, including FluBot, which spreads by accessing the infected device’s contact list and sending the information back to a command-and-control (C&C) server, which then instructs the devices to send malicious messages to those contacts.

The malware can also access the internet, read notifications, make voice calls and delete apps.

Proofpoint also highlighted TeaBot, which the company calls a “multifunctional Trojan” capable of stealing credentials and streaming an infected device’s screen to the attacker. Like FluBot, it spreads via SMS message and uses keylogging to intercept Google Authenticator codes.

TangleBot, meanwhile, is a piece of malware thought to be spreading through a collaboration between the two aforementioned malware families. It lures victims into clicking on a software update notification and once compromised, can control devices, overlay other mobile apps and steal camera and audio feeds.

Other mobile malware capable of stealing financial data, controlling the affected device and spying on the user are Moqhao, BRATA and TianySpy, according to the report. 

Like with the desktop, an antivirus app is just part of the solution when it comes to protecting against mobile malware. Since most compromise begins with some form of social engineering and phishing, users should be aware of what a mobile phishing attempt looks like.

Tagged With: Cybersecurity, Malware, Mobile

Related Content:

  • Google Password Manager Google Updates Password Manager For Unified Experience
  • VMware vSphere+ vSAN+ VMware Releases vSphere+ and vSAN+ to Enhance On…
  • Microsoft Cybersecurity Architect Expert Microsoft Adds New Expert-level Cybersecurity Architect Certification
  • Microsoft Basic Auth Prepare: Microsoft Begins Disabling Basic Auth in Exchange…

Free downloadable guide you may like:

  • Windows 11Blueprint Series: Upgrading to Windows 11

    Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted to provide many benefits, including some important security enhancements, when and how to roll out the upgrade will vary significantly by organization.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Uber Advanced Technologies Group Drives its Business Forward

The guiding principle for the new Uber meeting room redesign was “invisible comfort” to ensure that everyone could maximize productivity.

Windows 11
Blueprint Series: Upgrading to Windows 11

Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted...

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.