Publicat el Mobile Threat Report de F-Secure del primer trimestre del 2012, sobre els problemes de seguretat que afecten als dispositius mòbils… especialment en el món Android.
In Q1 2012, malware authors are focusing on improving their malware’s techniques in evading detection, as well as exploring new infection methods. Existing malware families such as DroidKungFu, GinMaster, and the Fakeinst umbrella family (which consists of Boxer, JiFake, SMSTado, FakeNotify, and OpFake) are adopting encryption and randomization techniques in order to evade detections. At the same time, some malware are also figuring out how to hide their data in an image file, as shown by FakeRegSMS.
Over the year, Android threats have continued to improve their techniques in evading detection and their methods of infection, yet, nothing much has changed in their operation in collecting profit. The majority of malware discovered in Android markets are SMS-sending malware that reap profit from sending messages to premium numbers. Most of these malware are found on third-party market stores, but occasionally, some do manage to wriggle their way into the official Android Marketplace (now integrated into Google Play).
Aquest gràfic mostra les amenaces mòbils amb ànim de lucre per trimestre: