New Point of Sale malware increases online banking vulnerability
Quick Heal Technologies has released its Quaterly Threat Report (QTR). The report offers a detailed look back
the top malware samples, malware threats and upcoming security trends and takeaways from the quarter over the Windows and Android platforms. With 17 million customers
more than 112 countries worldwide, Quick Heal receives real-time global virus signature updates for desktops and mobile devices over multiple platforms and operating systems.
The key findings of Quick Heal Threat report Q2, 2015 for Android is that Quick Heal Threat Research Labs received 500,000 Android malware samples per month for the second quarter of 2015. This represented a growth of 16% over Q1, 2015. Out of these detected samples, 170 new Android malware families and 232 new variants of existing malware families were detected. Analysis of several pre-installed apps on new devices has also led the Quick Heal Threat Research Labs to conclude that many devices are equipped with spyware right from the factory. Whereas, Android Adware continues to dominate the malware charts with a 67% stake in the detected samples count, highlighting how malicious and intrusive ads are primary propagation methods. The most prominent Android sample from Q2 was Android. Airpush. G, which is a form of Android Adware. This sample constituted a whopping 49% of all detected samples
Over the Windows platform, Quick Heal detected around 65 million malware samples per month in the second quarter of 2015. New Point of Sale (PoS) malware families have also been found in Q2 2015 and these steal credit/debit card details from PoS terminals of merchants. Threat authors have moved their attention to the banking sector and common banking Trojans are expected to make use of spear phishing emails, social engineering tactics.