
Cybercriminals are foregoing attacks on mobile devices to focus on the more dangerous and profitable theft of users’ banking and gaming credentials, as well as other personal data, according to the latest findings of cybersecurity solutions provider Kaspersky.
Last year, Kaspersky detected more than 95,000 new mobile banking Trojans, but the number of attacks using such malware remained similar.
In addition, the share of Trojans – malicious programs capable of executing remote commands – doubled, reaching 8.8 percent in 2021, according to Kaspersky’s Mobile Threats report.
Significantly, the number of attacks on mobile users worldwide has been declining, hitting 46 million in 2021 compared to 63 million in 2020.
Experts attribute this development, in part, to the wave of attacks seen at the beginning of lockdown as users were forced to work from home.
That period also saw increased use of various video conferencing and entertainment apps, increasing the volume and spread of attack opportunities.
Now that the situation has stabilized, cybercriminal activity declined as a result.
Still, Kaspersky experts believe it is too early to relax.
In 2021, 3.5 million malicious installation packages were detected, leading to 46.2 million attacks worldwide.
Moreover, 80 percent of attacks were carried out by malware rather than adware (software that intrusively displays ads), or RiskTools (malicious programs with various functions such as concealing themselves from the screen).
Furthermore, the number of attacks using banking Trojans, programs designed to steal users’ banking credentials to later exploit them and drain targets’ bank accounts, have kept up the momentum.
There were 2.367 million attacks in 2021, only 600 thousand fewer than in 2020.
Attackers also actively upgraded their banking Trojans, with Kaspersky detecting more than 95,000 new versions last year – many with improved capabilities.
For example, the Fakecalls banking Trojan is now capable of dropping calls whenever users try to contact the bank, replacing audio recordings with prepared answers from the operator.
This way, users are tricked into thinking that they are talking to a real bank employee or the standard robot answering machine, and they unwittingly share sensitive information with the attackers. Other malware act more subtly.
The Sova banking Trojan is capable of stealing users’ cookies, thereby gaining access to personal accounts in mobile banking apps, without necessarily knowing login and password information.
In 2021 cybercriminals also went after mobile gaming credentials – these are often sold later on the darknet or used to steal in-game goods from users.
The first mobile Trojan of the Gamethief type stole credentials from the mobile version of PlayerUnknown's Battlegrounds (PUBG).
“Indeed, there have been fewer mobile attacks in general, however, the attacks we are still seeing have become more complex and harder to spot," warned Tatyana Shishkova, Kaspersky security researcher.
"Cybercriminals tend to mask malicious apps under the guise of legitimate applications, which can often be downloaded from official app stores;" she explained.
On top of that, with mobile banking and payment apps becoming even more widespread, there is a higher chance of cybercriminals targeting these more actively.
"Staying cautious and careful on the internet and avoiding downloading unknown apps is good practice, but I also strongly recommend using a reliable solution. When it comes to the security of finances, in particular, it is better to be safe than sorry,” Shishkova warned.
It is safer to download apps only from official stores like Apple App Store, Google Play, or Amazon Appstore.
Apps from these markets are not 100 percent failsafe, but at least they get checked by shop representatives and there is some filtration system — not every app can get onto these stores.
Users should check the permissions of apps that you use and think carefully before permitting an app, especially when it comes to high-risk permissions such as Accessibility Services.
The only permission that a flashlight app needs is to the flashlight (which doesn’t even involve camera access).
A reliable security solution can help users detect malicious apps and adware before they start behaving badly on your device.
iPhone users have some privacy controls provided by Apple, and users can block app access to photos, contacts, and GPS features if they think these permissions are unnecessary.
Users need to update their operating system and important apps as updates become available. Many safety issues can be solved by installing updated versions of software.