One of the most interesting aspects here is that the main delivery mechanism for the Trojan appears to be cracked versions of popular mobile games. While this type of delivery method has been used before in traditional PC attacks, its use in a mobile environment shows the increasing importance of this platform as a target for extorting money from users.
The growing use of social media to entice victims is also a key concern here. Social media is one of the primary channels many mobile app developers use to advertise their latest products in a quick, convenient and cost effective way. Add to this the fact that many social media users have a false sense of security about what they are seeing and who it is coming from. This combination of factors means users may let their guard down or be more likely to click on links they otherwise wouldn’t, opening up the doors to malicious threats like Podec.
The key lessons to learn from this discovery are:
- Never install any app that come from non-trusted sources. For corporations, this means enforcing policies that block users from installing applications from non-approved sites.
- Always be wary of information shared through social media, especially if its origins or the original sharer is not someone in your immediate contacts list.
There is also a growing responsibility amongst social media platforms, phone manufacturers and even mobile operators to monitor more closely for these new types of threat and protect users by detecting and blocking them before they have the chance to infect mobile devices.
Advanced Threat Protection - Building a Kill Chain Defense
Detect and stop targeted attacks with a data-centric approach that protects sensitive data regardless of the source of attack.
Related ArticlesFriday Five: 5/8
Nintendo suffers a server breach, a new phishing campaign targets the financial industry, and more - catch up on the week's news with the Friday Five.Report: Destructive Malware Used to Target Olympic Infrastructure
Researchers said Monday the Olympics were hit by new and destructive data-wiping malware last week.Friday Five: 11/3 Edition
Catch up on all the week's InfoSec news with this roundup!