• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Mobility, News, Physical Security

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

New strains of mobile malware are recording audio and video, tracking location and destroying or wiping data, according to Proofpoint.

March 10, 2022 Zachary Comeau Leave a Comment

Mobile Malware
stock.adobe.com/Yingyaipumi

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report.

This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware are recording audio and video, tracking location and destroying or wiping content and data, according to the report.

Android phones, due to the more open approach to app stores and the ability to sideload apps from anywhere on the internet, are more susceptible to compromise.

While many strains of mobile malware aim to give attackers control of the device or the ability to steal sensitive information and credentials, newer strains are allowing hackers to record conversations, including both audio and video from the device.

In addition, destructive malware that can wipe data from a device has also been seen in the wild recently, Proofpoint says.

Much of this malware is delivered via phishing, including via SMS text message, designed do trick the user into inputting credentials on a fake login page. Other malware hides in the background to steal credentials once certain apps, usually finance related, are activated.

Proofpoint highlighted several prevalent strains of mobile malware, mostly impacting Europe and Asia, including FluBot, which spreads by accessing the infected device’s contact list and sending the information back to a command-and-control (C&C) server, which then instructs the devices to send malicious messages to those contacts.

The malware can also access the internet, read notifications, make voice calls and delete apps.

Proofpoint also highlighted TeaBot, which the company calls a “multifunctional Trojan” capable of stealing credentials and streaming an infected device’s screen to the attacker. Like FluBot, it spreads via SMS message and uses keylogging to intercept Google Authenticator codes.

TangleBot, meanwhile, is a piece of malware thought to be spreading through a collaboration between the two aforementioned malware families. It lures victims into clicking on a software update notification and once compromised, can control devices, overlay other mobile apps and steal camera and audio feeds.

Other mobile malware capable of stealing financial data, controlling the affected device and spying on the user are Moqhao, BRATA and TianySpy, according to the report. 

Like with the desktop, an antivirus app is just part of the solution when it comes to protecting against mobile malware. Since most compromise begins with some form of social engineering and phishing, users should be aware of what a mobile phishing attempt looks like.

Tagged With: Cybersecurity, Malware, Mobile

Related Content:

  • Security Awareness Training Security Awareness Training Needs to Change. Here’s Why.
  • Google Bard, OpenAI, ChatGPT, Generative AI Google Begins Making Its AI Chatbot Bard Available
  • Bing Image Creator Microsoft Begins Rolling Out DALL∙E-Based Image Creator in…
  • Businessman meeting and training character vector design, corporate LMS training The Big-Picture Benefits of A Corporate LMS Investment

Free downloadable guide you may like:

  • Four IT Trends That Will Define 2023Expert Series: Four IT Trends That Will Define 2023

    Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations emerging from each.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Four IT Trends That Will Define 2023
Expert Series: Four IT Trends That Will Define 2023

Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations ...

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.