Mobile Threat Landscape Report
Mobile Threat Landscape Report
Mobile Threat Landscape Report
MOBILE THREAT
LANDSCAPE
REPORT
A COMPREHENSIVE
REVIEW OF MOBILE
MALWARE TRENDS
MOBILE THREAT LANDSCAPE REPORT 2
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
TABLE OF CONTENTS
3 INTRODUCTION 22 TARGETED ADVERSARY GROUPS
23 THREAT OUTLOOK
4 KEY FINDINGS IN THIS REPORT 23 Mobile Device Security
23 Infection Vectors
INTRODUCTION
As a result of changes in the way people use and protect their devices,
malicious actors have increasingly sought to diversify the way they attempt
to compromise their targets and achieve their objectives. This diversification
includes the development of malware for mobile devices, which often do not
have access to the same level of security monitoring as desktop computers
and servers. In fact, the successful compromise of mobile devices provides
more extensive access to large amounts of personal data, as they often
aggregate multiple data sources (such as email accounts) along with
mechanisms for authenticating with other services as part of two-factor
authentication (2FA) capability. Furthermore, many devices can also provide
the geographic location of their owners through access to global positioning
service (GPS) hardware and cell tower information. This density of personal
information offers an attractive target to a range of adversaries, leading to
an uptick in both targeted and commercial mobile malware families.
2
alware targeting mobile banking is likely to remain prolific,
M
supported by an active underground industry of developers operating
mobile “malware-as-a-service” subscription models to complement
their desktop offerings.
3
Targeted adversary groups continue to develop mobile malware
variants, typically as ports of established malware families.
Development capability has proliferated to less-skilled groups due
to the accessibility of proof-of-concept mobile malware variants.
4
Mobile malware running on the Android operating system is the most
prevalent at this time, driven by the ease of installing new
applications from third-party sources.
5
The current maturity level of mobile security solutions lags behind
that of traditional platforms, leading to longer potential attacker dwell
times on compromised mobile devices.
MOBILE THREAT LANDSCAPE REPORT 5
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Despite the wide variety of mobile malware families observed in the wild, most
can be categorized into one of five major types, as defined below. While some
actor motivations are obvious, based on the capabilities of the tools they
deploy, further discussion on the typical objectives of threat actor classes is
provided in the Users of Mobile Malware section of this report.
MOBILE THREAT LANDSCAPE REPORT 6
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Listing of device information such as manufacturer, model, operating system
version, and International Mobile Equipment Identity (IMEI)/International
Mobile Subscriber Identity (IMSI) numbers, which can be used to uniquely
identify the device and associated user
Sending SMS messages for command and control (C2) exfiltration
or propagation
Enabling GPS logging and the transmission of device location according
to GPS values
Enabling front and rear facing cameras to capture images and videos
Some of this functionality can have multiple uses. For example, the interception
of SMS messages can be used either for general information gathering, or as
a way to intercept 2FA tokens sent using this service in order to compromise
external services.
The majority of mobile RATs used by targeted adversary groups for intelligence
collection purposes are custom-developed, and are often a variant of malware
families deployed against desktop computers. However, there is also an
active market for commercial RAT offerings that provide a similar range of
capabilities aimed at a wider group of paying customers. Some of these tools
are offered on criminal forums for a recurring fee, often with support contracts,
although this class of malware is typically used to enable financially motivated
information collection. In these cases, the RAT may also provide plugins that
create web page “overlays” to intercept user credentials, usually for online
banking services. This functionality is detailed further in the Banking Trojans
section of this report.
SPOUSEWARE / STALKERWARE
In addition to the proliferation of mobile malware for sale on criminal forums, “legal” commercial spyware puts RAT
functionality into the hands of the public, to be used wherever someone has physical access to the mobile device.
This surveillance software is also referred to as “spouseware” or “stalkerware,” due to its frequent use against
personal contacts. It significantly lowers the barrier to entry for deploying malicious software and should
be considered part of any mobile device threat model.
On the opposite end of the market, several commercial entities have created
sophisticated mobile RATs that are supported by professional device
exploitation operations and C2 infrastructure administration services. Apart
from the full operational management chain, what distinguishes these
companies from other mobile RAT developers is their continual maintenance
and patching of their malware, as well as producing variants written for
non-Android operating systems such as Apple iOS. While the Apple mobile
ecosystem is not immune to malicious software, there are barriers to the
development and deployment of potentially malicious software that complicate
the typical deployment techniques (detailed further in Distribution Mechanisms)
often employed to install Android-based RATs. However, remote software
exploits or physical access to the devices is often required to install these
RATs, which in turn significantly increases the cost of deployment.
MOBILE THREAT LANDSCAPE REPORT 8
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
The high cost of developing and running such operations make these
capabilities best suited for nation-state customers. This comes at an obvious
financial benefit to the companies offering the services, as well as providing a
level of state-sanctioned acceptance that allows them to operate with relative
freedom outside of certain legal constraints. Examples of mobile RATs offered
by such companies include:
Table 1.
Example of Commercial Mobile RAT Offerings
Assessed
Company RAT Name OS Compatibility
Release Date
Android, iOS, Windows
Remote Control
Hacking Team Mobile, BlackBerry, 2009
System (RCS)
Symbian
Although some deployment operations of this type may involve using zero-
day exploits to silently install their malware on target devices, some groups
also take the more traditional route of packaging their malware to make it
seem legitimate. For example, the group responsible for the Exodus malware
took extensive steps to register with Apple as an enterprise developer, using
the identity of a possible cover company called Connexxa S.R.L., allowing
them to distribute a version of their malware for iOS devices.
Finally, there are mobile RATs that are offered free-of-charge to the public at
large. Many of these have been published allegedly for educational purposes
or to enable “adversary simulation,” but as they are often provided with a
full suite of tools to assist in “Trojanizing” existing mobile applications and
controlling infected machines, they are also an attractive proposition for low-
skilled attackers to use in active campaigns. For example, AndroRAT provides
a “binder” that automatically includes malicious code in user-provided,
legitimate Android Package (APK) files such as WhatsApp, which can then be
sent to targets in a variety of ways.
MOBILE THREAT LANDSCAPE REPORT 9
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Figure 1.
AndroRAT Client GUI
These RATs also assist malicious actors in the development of their own
capabilities, as the source code is either freely offered or easily recovered
using decompilation processes. The recovered code base can then be
adapted or extended to suit a malware developer’s requirements, as well as
modified to evade antivirus detection — for instance, the STATIC KITTEN
adversary has used AndroRAT as a basis for early versions of their mobile
malware capability. These freely available mobile RATs have been able to
jump-start an industry of campaigns against a broad spectrum of targets and
spurred by a variety of motivations.
BANKING TROJANS
Banking Trojans are a popular subset of mobile malware that specifically target
mobile banking services for financial gain. In recent years, the enthusiastic
adoption of mobile devices and their ability to deliver banking services has
made them attractive targets for criminal groups.
The primary use of most banking Trojans is to deploy “overlays” that are
shown on the user’s screen when they attempt to access mobile banking
services on their devices. These overlays place invisible input boxes over
legitimate logon panels in order to intercept, log and then pass on user
credentials to the real banking service to maintain expected functionality. The
developers of these Trojans will often add compatibility for additional banking
services or provide updates to existing overlays if the targeted applications
change their layout; this in itself is a revenue-generating process, as the
developers charge a recurring fee for access to updated overlays, motivating
them to continue supporting their tools over extended periods of time.
MOBILE RANSOMWARE
Ransomware is malicious software that seeks to deny victims the full use
of their computing devices and/or data until a ransom has been paid to the
attacker, typically using a digital currency. The majority of ransomware strains
targeting desktop machines operate by encrypting data files found on the
hard drive, and preventing access to a user’s documents, photographs, and
other media files. As with other classes of criminal malware, the concept
of ransomware has been replicated within the mobile environment to take
advantage of the wide adoption of mobile devices.
MOBILE THREAT LANDSCAPE REPORT 11
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
CRYPTOMINING MALWARE
A further adoption of traditional revenue generation schemes applied to
mobile devices is the introduction of cryptomining. This involves the covert
execution of calculations that generate digital money (cryptocurrency) for
the malicious actor. Cryptomining can be performed either directly through
Trojan code hidden in otherwise legitimate-looking applications, or via
JavaScript code executed using the device’s web browser. In both cases,
Trojanized applications have been observed on the Google Play store that
embed cross-platform mining frameworks, such as CoinMiner and Coinhive,
to generate Monero currency without the knowledge of the user. It’s worth
noting that cryptomining via mobile devices is inefficient due to the reliance
on battery power, which is rapidly consumed by the calculations performed
by the device, as well as the lack of algorithm optimization for mobile central
processing units (CPUs). However, the vast number of potential victim devices
available may still represent an attractive target to less skilled malware
developers.
appeared to have peaked between 2017 and 2018, correlating with record
highs in the valuation of digital currencies. While the profit generated by this
class of malware is likely to have been reduced due to an overall downturn
in the current trading rate of the major digital currency such as Monero,
CrowdStrike® Intelligence assesses that Trojanized mobile applications will
continue to embed cryptomining code due to the relatively low development
requirements and risk incurred by the malware authors.
The click fraud process is enabled through the creation of hidden HTTP
requests to specific advertising resources associated with the actor. Although
this technique is a reimplementation of activity seen on desktop devices for
many years, the large potential installed base and geographic distribution of
mobile devices can provide extra challenges for companies looking to detect
this type of fraud using statistical analysis methods.
While malware designed to perform click fraud may not represent an obvious
or direct threat to the owner of the device, the procedure can cause financial
loss because of the use of mobile data required to load the link and the
subsequent landing pages required to register the advertising impression for
payment. A second-order effect may be the increase in device battery usage
similar to that which occurs with cryptomining malware.
DISTRIBUTION MECHANISMS
TROJAN APPLICATIONS
APP STORE DISTRIBUTION
The simplest Trojan distribution technique uses the offer of free tools or
popular, legitimate applications as carriers for the malware. These Trojans
are uploaded to app stores in large numbers to take advantage of volume
distribution in much the same way that spammers rely on a small percentage
of respondents from the millions of emails they send in each run. Some
of these campaigns can result in vast numbers of installs, which is further
amplified by applications that are prominently featured in stores. Often
this is due to algorithms that select popular or trending software for wider
user consideration. In one example disclosed by a security researcher, 13
applications created by a developer called “Luiz O Pinto” were downloaded
over 560,000 times after they were added to the Google Play store. While
they purported to be driving simulation games, when opened, they instead
downloaded an additional APK (Android package) to display advertisements
to the user each time the device was unlocked.
MOBILE THREAT LANDSCAPE REPORT 14
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Figure 2.
Luiz O Pinto Malware Featured in Google Play Store
Official app stores for the two most popular mobile operating systems —
Google Android and Apple iOS — take slightly different approaches to their
developer verification and application submission processes, leading to
different levels of risk that a user might download a Trojan app. While Apple
requires developers to register in order to submit their applications to the
App Store (including paying a fee), the open source nature of Android is far
less restrictive about who can develop for their platform and be featured in
the Google Play store. This has prompted a larger volume of submitted apps,
increasing the complexity of a detailed verification process in comparison
with Apple’s offering.
PHISHING-ENABLED DISTRIBUTION
A popular method for coercing users into installing malicious applications is to
send them links to APK files hosted on attacker-controlled websites, normally
achieved through either SMS or email spam messages sent to large groups
of targets. Figure 3 shows how operators of the banking Trojan Exobot have
distributed links to the fake mobile banking app that enables website overlays
and credential stealing on infected devices.
Figure 3.
Exobot SMS Phishing Infection Chain
MOBILE THREAT LANDSCAPE REPORT 16
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
SOFTWARE EXPLOITATION
While the distribution of Trojan applications is the most common form of
deployment mechanism for mobile malware, there are limited circumstances
where a malicious actor may develop or procure remote exploits for typical
software installed on target devices, and then use them to install their
payloads without user interaction. An example uncovered in May 2019 was
the disclosure of a vulnerability in the WhatsApp chat application (designated
identifier CVE-2019-3568) that enabled attackers to gain remote code
execution on target devices through a specially crafted series of secure
real-time transport protocol (SRTCP) packets. When successfully executed,
this could facilitate the download and installation of malware without the
user’s awareness or consent. Although exploits of this class are relatively
rare compared to the larger attack surface seen on desktop machines
and servers, their existence demonstrates that even strict adherence to
not downloading untrusted applications may not be sufficient to avoid
compromise for certain classes of targets.
MOBILE THREAT LANDSCAPE REPORT 18
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
So far, this report has focused on typical types of mobile malware and how
they may be placed on a victim’s device — describing the “what” of the
current threat landscape. The following section addresses some of the
aspects of “why” mobile malware is used and “who” are some of the notable
users of these capabilities. Of course, while it is not possible to fully define
every possible use case and threat actor currently operating within this attack
class or seeking to develop similar capabilities, this section examines some
notable cases that demonstrate the threat to mobile devices and their users.
DEPLOYMENT MOTIVATIONS
FINANCIAL GAIN
Arguably the most prevalent use case for the development and deployment
of mobile malware is to facilitate financial gain on the part of the criminal
actor. At the lowest end, passive revenue generation via cryptomining or ad
fraud may have only a minor impact on infected devices through increased
mobile data usage and battery power consumption. However, the adoption
and growth of mobile banking has made these devices an attractive and
valuable target for criminals, who have built whole operational frameworks to
automate accessing victims’ online bank accounts and transferring funds to
other accounts under their control.
BANKING TROJANS
There is a wide range of mobile malware designed to capture banking credentials to facilitate theft, with additional
families being offered for sale on criminal forums on a regular basis. In late March 2019, a new malware family
called Gustuff began being distributed to targets in Australia via an SMS spam campaign. Gustuff gets victims to
enter their credentials by triggering push notifications sent by the fake banking app, and using a mechanism called
automatic transfer system (ATS) to pass captured credentials on to the legitimate applications afterwards. At the
time of this writing, overlays for over 100 financial institutions in the U.S., Australia, Poland, India and Germany are
provided by the malware.
MOBILE THREAT LANDSCAPE REPORT 20
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Mobile devices have also been adopted as part of the security landscape by
acting as the second factor in 2FA schemes used to secure services such
as banking and email accounts. This approach causes additional challenges
for credential interception malware installed on desktop machines. Therefore
malware authors have begun targeting the mobile devices to collect 2FA
tokens produced as part of challenge-response authentication protocols.
INTELLIGENCE GATHERING
As previously discussed, the installation of RAT malware on mobile devices
provides access to a large amount of high-resolution victim data, including
but not limited to:
Device information
Contact information
Email/message contents
MOBILE THREAT LANDSCAPE REPORT 21
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Such tools may also be used to facilitate further monitoring of victims using
external collection capabilities. For example, 2FA tokens may be intercepted
to provide remote access to cloud-based services such as email accounts,
while access to IMEI and IMSI numbers could potentially allow for alternative
target correlation and data collection using indigenous signals intelligence
(SIGINT) programs operated by sophisticated state actors.
DISRUPTION
Another use case for mobile malware could be to support an operation that
seeks to disrupt business operations as part of a wider attack against a
company or sector. During targeted ransomware attacks against traditional
computing assets, for example, companies may fall back to using mobile
devices with email and document data stored on cloud services in order to
maintain a level of business continuity. While the scenario is hypothetical at
the time of this writing, it is possible that adversaries may seek to incorporate
pseudo-ransomware that implements PIN-lock techniques alongside
ransomware targeting traditional computing devices, to amplify the effect of
the attack, whether it is financially or politically motivated.
Table 2.
Examples of Targeted Adversary Mobile Malware
Earliest
Actor Malware Observed Targeting Motivation
Date
Targeting of military forces in
FANCY BEAR X-Agent variant 2013
regional conflict areas
Unknown PANDA
Targeting of protestors
with possible
Unnamed Android associated with the Umbrella
connections to 2014
and iOS malware Revolution/Occupy Central
Ministry of State
movements in Hong Kong
Security (MSS)
THREAT OUTLOOK
MOBILE DEVICE SECURITY
The initial development and increased distribution of mobile malware in
recent years appears as a tacit acknowledgement by a range of malicious
actors of not only the general shift in user computing, but also the utility of
mobile devices as a source of intelligence or financial gain. As with malware
designed to target desktop machines, there is a continual battle between
defenders and attackers seeking to maintain or subvert the security of these
devices. This has resulted in an ever-increasing set of malware capabilities
that have been developed to ensure that malicious actors can continue to
achieve their objectives.
INFECTION VECTORS
While the loading of malicious applications from untrusted sources is likely
to remain the most prevalent source of infection in the mobile threat space,
this mechanism typically relies on targeting devices that allow this type of
installation process. Mobile operating systems that do not allow installation
from outside their application store ecosystems need to be “jailbroken” by
their users before they are able to accept third-party apps. This severely
limits the availability of targets susceptible to such attacks.
MOBILE THREAT LANDSCAPE REPORT 24
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
Criminal actors are also unlikely to reduce their development of mobile RATs
in the future, due to the financial opportunities they continue to present.
While the facilitation of banking theft is an obvious motivation, data collection
provided to an attacker through the interception of email credentials can yield
numerous benefits, including the takeover of third-party accounts. In addition,
many developers of criminal RATs tend to operate at a lower level of personal
risk, as they merely offer malware for rent through subscription processes
instead of leveraging the tools themselves.
BANKING TROJANS
The vibrant development community built around the creation and sale of
mobile banking Trojans shows no sign of slowing down, as the potential
benefit from successful infections can be particularly lucrative. As with many
criminal enterprises, most operational complexities and security issues
stem from the process of transferring and laundering money so that the
identity of the thieves remains unknown. However, the majority of banking
Trojan developers offset this risk by selling their capabilities via subscription.
These subscriptions are maintained through the continual development and
improvement of banking app overlays, ensuring that their customer base
continues to invest in capabilities that allow them to maintain access to a
wide pool of potential targets. While some Trojans may fall out of favor or be
removed from public sale (such as Red Alert Bot), CrowdStrike Intelligence
frequently observes new families being introduced in underground criminal
forums, and it assesses that this process will continue into the future.
ACCESS FACILITATION
The adoption of mobile devices as a second factor in 2FA schemes has
marked them as a new target of opportunity for malicious actors who seek
to gain access to accounts and services protected by these mechanisms.
Although the ever-present nature of mobile devices offers greater
convenience to users when compared to legacy 2FA tokens, built-in network
connectivity dramatically increases their attack surface. As more corporate
MOBILE THREAT LANDSCAPE REPORT 26
A COMPREHENSIVE REVIEW OF 2019 MOBILE MALWARE TRENDS
RANSOMWARE
Mobile ransomware is relatively easy to implement and therefore provides
malicious actors with opportunities for financial gain with a minimal outlay of
resources. The majority of mobile ransomware strains are likely to be PIN-lock
variants that prevent access to the device without payment, as opposed to
crypto-ransomware that encrypts files on a device.
Although many ransomware variants target single users, there are indications
that the model may also be adopted by organized criminal actors, possibly
in response to customer or affiliate requirements. For example, PINCHY
SPIDER’s recruitment of an APK reverse engineer, along with individuals
skilled in lateral propagation techniques, suggest that they may be seeking
to adapt their services to target corporate environments, possibly including
mobile platforms.
CRYPTOMINING
Due to the low-revenue nature of cryptomining on non-specialized mobile
CPU hardware, this threat class was likely to have been a reasonable source
of criminal income only during periods where cryptocurrency valuations were
Previous observations of at the peaks — observed between 2017 and 2018. The subsequent crash in a
ransomware being used number of digital currency markets has reduced the overall value in operating
as a cover for disruption such campaigns; this is evidenced by the discontinuation of the CoinHive
campaigns in the traditional mineware service in February 2019 due to profitability issues. Although it is
computing sector indicate likely that some lower skilled malicious actors will continue to operate in this
that malicious actors space by creating margins on the basis of large malware install bases, it is
may attempt to apply this unlikely to represent a significant threat in the overall mobile landscape.
approach to mobile devices,
as well. Despite this, cryptomining performed by some legitimate applications as an
alternative to including advertisements or requiring an outright purchase may
still continue, although this approach is harder to categorize as malware in a
traditional sense.
There is near domination of the market between Google Android and Apple
iOS platforms, therefore it is likely that almost all malware will be designed
to operate on one of these two operating systems, despite some malware
supporting Windows Mobile and the defunct RIM/Blackberry OS. While
some of these variants are likely to be highly targeted commercial malware
designed to cover a portfolio of targets, including those in emerging markets,
the economics of software development and return-on-investment for
malware authors suggest this approach will stay consistent for some time.
RECOMMENDATIONS
The ubiquitous, global use of mobile devices and the amount of corporate
data so many of them hold mean that mobile threats will continue to
proliferate. Just as certainly, both nation-state and eCrime groups
Flaws in operating system will continue to innovate and refine their mobile attacks to evade your
software can be exploited organization’s security defenses. CrowdStrike recommends that all
by malicious actors to organizations consider the following measures to help better secure the
install mobile malware mobile devices connecting to sensitive corporate data every day:
and escalate operating
privileges to obtain 1. Download applications from trusted sources such as official app
greater access to data and stores: The majority of mobile malware is distributed from third-party
capabilities on the device. sources that do not perform comprehensive checks of the applications
they provide. This provides opportunities for malicious actors to include
unwanted code contained within Trojanized applications. Official sources
such as the Apple App Store and Google Play Store provide some level
of verification on the apps they provide, limiting the risk of exposure to
mobile malware. However, numerous instances of malware have still been
distributed via these official channels, even though apps were subjected
to checks, and users need to be wary of the applications they download;
gaming and mobile banking applications are particularly popular carriers
of malicious code.
ABOUT CROWDSTRIKE
CrowdStrike® Inc., a global cybersecurity leader, is redefining security for
the cloud era with an endpoint protection platform built from the ground up
to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-
agent architecture leverages cloud-scale artificial intelligence (AI) and
offers real-time protection and visibility across the enterprise, preventing
attacks on endpoints on or off the network. Powered by the proprietary
CrowdStrike Threat Graph®, CrowdStrike Falcon correlates over two
trillion endpoint-related events per week in real time from across the globe,
fueling one of the world’s most advanced data platforms for security.
© 2019 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo,
CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by
CrowdStrike, Inc. and registered with the United States Patent and Trademark
Office, and in other countries. CrowdStrike owns other trademarks and service
marks, and may use the brands of third parties to identify their products and
services.