All the latest UK technology news, reviews and analysis

Android users under siege as banking Trojan threat grows

23 Apr 2014
Google Android Malware

Android users remain under siege from mobile malware with more than 99 percent of all threats targeting the platform, according to Kaspersky Labs.

The firm revealed its first quarter attack stats in a detailed blog post in which it recounted some of the major threats from the start of the year, such as The Mask malware and Icefog APT it uncovered.

Furthermore, Kaspersky reported a huge surge in mobile malware threats. One notable rise was the number of banking Trojans in the market, as they almost doubled from 1,321 to 2,503 in the quarter.

The trend continues from data gathered across 2013 by Kaspersky that found that mobile banking malware was the fastest-growing threat facing mobile users.

Russia is by far the most targeted country, with 88.85 percent of all banking Trojans aimed at devices in the country. Russian devices also receive 48.9 percent of other mobile malware threats, such as adware or spyware, making it the most frequently targeted country.

The UK is fifth on the overall list of most frequently targeted countries, with 2.79 percent of all threats hitting devices in the country. India is second with 5.23 percent, Kazakhstan third with 4.55 percent, and Ukraine is fourth with 3.27 percent.

The map below gives a clear indication of the nations that pose the biggest risk, and those that are the safest.

Data from Kaspersky showing mobile malware threats by nation

Countries where users face the greatest risk of mobile malware infection, Q1 2014 (the percentage of all attacked unique users)

Overall in the quarter, the firm said that its Kaspersky Security Network (KSN) data showed it had blocked a total of over one billion malicious attacks on computers and mobile devices with 81 million unique URLs recognised as malicious.

The data comes a day after Verizon revealed that the vast majority of all security incidents at companies can be traced to just nine basic attack methods, with certain sectors more prone to certain attack types.

Verizon said it hoped that data would help companies focus on the specific threats they face to more successfully defend their networks, systems and data.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

Tech gifts for Christmas 2014

Is a new tablet on your wish list this festive season, or have they become yesterday’s fad?

Popular Threads

Powered by Disqus
iPhone 6 is available in silver gold and space grey

iPhone 6 video review

The best iOS handset to date

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

IT Infrastructure Support - Edinburgh - Permanent

IT Infrastructure Support Technician , based in Edinburgh...

Endur Business Analyst - Oil and Gas

Oil & Gas Trading House - ETRM Business Analysts...

SharePoint Consultant (*Future Decoded headline sponsor)

SharePoint Consultant (*The coolest Tier 1 MS Gold Partner...

Senior Oracle Finance Consultant

Senior Oracle Finance Consultant required for a large...
To send to more than one email address, simply separate each address with a comma.