Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Resources
January 21, 2015
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SAN FRANCISCO–(BUSINESS WIRE)–RiskIQ, the company that enables organizations to maintain the integrity of their brands on websites and mobile app stores, today announced research findings on the prevalence of suspicious mobile apps related to banking. The company found that more than 40,000 (or 11 percent) of the 350,000 apps which reference banking in the world’s top 90 app stores contain malware or suspicious binaries.
CLICK TO TWEET: .@RiskIQ finds that more than 11 percent of #mobilebanking apps are suspicious http://bit.ly/1Enkt4J
“Mobile banking is now a way of life for most people. It also presents a lucrative opportunity for criminals to commit fraud. One of the easiest ways to steal a victim’s login and other personal information is using malware and apps with excessive permissions,” said Elias Manousos, CEO of RiskIQ. “These findings show that criminals are using look-a-like banking apps to distribute malware and capture data on the device in order to commit crimes. Policing app stores for malicious apps and taking them down is a never ending battle for banks, and any other brand that uses the mobile channel to interact with customers.”
Summary of Findings
The results were gathered by the RiskIQ platform, which continuously monitors mobile application stores and websites using software agents that emulate human behavior, to detect suspect applications, application tampering and brand impersonation. For this survey, RiskIQ inspected more than 350,000 apps in 90 mobile stores that referenced banking. Apps were labeled suspicious based on whether they contained malware or suspicious binaries identified by a consortium of 70 anti-virus vendors.
Of the more than 40,000 mobile apps listed as suspicious:
Meanwhile, of these 40,000 suspicious apps, the following number exhibited excessive permissions:
About RiskIQ RiskIQ enables organizations to maintain the integrity of their web and mobile properties by detecting and removing instances of malware, impersonation and defacement used to commit fraud and violate users’ privacy. The company’s SaaS platform performs continuous asset discovery, indexing and threat detection across the web, mobile app stores and social networks using software agents that emulate human behavior. RiskIQ is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and backed by Battery Ventures and Summit Partners. For more, visit www.riskiq.com.
Contacts Editorial Contact: Marc Gendron PR Marc Gendron, 781-237-0341 marc@mgpr.net