Podec Trojan Marks Spike in Malware Distribution via Mobile Apps, Social Media

The unveiling of the Podec Trojan by Kaspersky once again demonstrates the risks involved with downloading mobile applications from untrusted or unofficial app stores.

One of the most interesting aspects here is that the main delivery mechanism for the Trojan appears to be cracked versions of popular mobile games. While this type of delivery method has been used before in traditional PC attacks, its use in a mobile environment shows the increasing importance of this platform as a target for extorting money from users.

The growing use of social media to entice victims is also a key concern here. Social media is one of the primary channels many mobile app developers use to advertise their latest products in a quick, convenient and cost effective way. Add to this the fact that many social media users have a false sense of security about what they are seeing and who it is coming from. This combination of factors means users may let their guard down or be more likely to click on links they otherwise wouldn’t, opening up the doors to malicious threats like Podec.

The key lessons to learn from this discovery are:

  1. Never install any app that come from non-trusted sources. For corporations, this means enforcing policies that block users from installing applications from non-approved sites.
  2. Always be wary of information shared through social media, especially if its origins or the original sharer is not someone in your immediate contacts list.

There is also a growing responsibility amongst social media platforms, phone manufacturers and even mobile operators to monitor more closely for these new types of threat and protect users by detecting and blocking them before they have the chance to infect mobile devices.

Thomas Fischer

Advanced Threat Protection - Building a Kill Chain Defense

Detect and stop targeted attacks with a data-centric approach that protects sensitive data regardless of the source of attack.

Download now

Related Articles
Report: Destructive Malware Used to Target Olympic Infrastructure

Researchers said Monday the Olympics were hit by new and destructive data-wiping malware last week.

Friday Five: 4/5 Edition

Employee theft at SMBs, fighting stalkerware, and a "hacker-proof" new cryptographic library - catch up on the week's infosec news with this roundup!

FBI Urges Vigiliance Around COVID-19 Scams, Malware

It’s been difficult keeping track of all the scams leveraging the COVID-19 pandemic to steal your money or your personal information. Now, the FBI is warning of increased attacks that target the supply chain and the healthcare industry in addition to “Zoom-bombing” style attacks.

Thomas Fischer

Thomas Fischer is global security advocate at Digital Guardian, based out of our EMEA headquarters in London. In addition to his role at Digital Guardian, Thomas is director of the BSides London conference.

Please post your comments here