Improvements in security file scanners are causing malware authors to deviate from the traditional malware installation routine. It’s no longer enough for malware to rely on dropping copies of themselves to a location specified in the malware code and using persistence tactics like setting up an autostart feature to ensure that they continue to run. […]
Our client, Chris Roberts, a founder of the security intelligence firm One World Labs, found himself detained by the FBI earlier this week after tweeting about airplane network security during a United Airlines flight. When Roberts landed in Syracuse, he was questioned by the FBI, which ultimately seized a number of his electronic devices. EFF attorneys now represent Roberts, and we’re working to get his devices back promptly.
43% of malware send SMS messages. This includes cases of SMS Fraud, but also spyware which forward incoming SMS to another phone number.
56% of malware implement a SMS receiver, i.e amechanism notifying them when there is an incoming SMS message. This istypically how spyware read and process incoming SMS.
20% actually retrieve the current geolocation. Note we rule out over 140 advertisement or development kits from our statistics. So, those 20% do not
take into account geolocation retrieved by third party kits: thepercentage would be far higher. Also, those 20% correspond to the exactcases where the malware calls functions like getLatitude(), getLongitude(). This is more precise than measuring the number oftimes coarse or fine permissions are requested as applications mayrequest a permission and yet never use it.
8.6% malware ask to be notified whenever an outgoing call is about to be placed.