By: Zuk Avraham, Joshua Drake, Yaniv Karta, Jimmy Shah
(To download the detailed report, click here)
Recently, Verizon published a report that says that malware on mobile is not an issue.
We strongly suggest Verizon and other enterprises not underestimate the scale of one percent. The sheer number of mobile devices deployed mean that one percent is a huge number. Attacks against the users within this one percent could be the first foothold of attacks like those we saw against Sony and can lead to an advanced attack on every single Fortune 500 company.
First, let’s examine the core problems with Verizon’s report.
Verizon looks at Apps as the sole vector of attacks
There is no mention of Network attacks (MITM, etc.) of any kind. There are two references to USB, but they are not descriptive.
1) Android and iOS Sandboxes Impact Protection, for the Good and Bad
2) Lack of Permissions
3) Targeted Attacks
4) No Visibility to Time-Bombs
5) Mobile Attack Vectors > Apps
WHAT OUR DATA SHOWS:
We examined these attacks on a subset of our business users and used over 200,000 business devices out of millions of licensed devices of our Enterprise Mobile Security solution. The numbers are quite disturbing. Out of the hundreds of communication providers in United States, we focused on the total sum of attacks on Verizon and AT&T.
b.) Of the total attacks, 18.2% happened on 3G/4G networks, on which Verizon and other carriers have better, yet still limited visibility
In conclusion, we think Verizon’s reporting on mobile attacks leaves much to be desired. A wide variety of attacks are happening. However, detecting them requires a variety of approaches. Even by using next generation methodologies, some attacks are still very difficult or impossible to detect. If you are interested, we are happy to speak with you and quickly show a few examples of attacks that can not be detected due to smartphone architecture and permission model. You might want to take us up on that offer before someone else, with malicious intent, does.
Zimperium’s detailed Threat Intelligence report can be downloaded below.
If you would like to get visibility into attacks that are happening in your organization, either through BYO devices or Corporate owned devices, request a demo of our products at www.zimperium.com/request-demo