2019 Mobile Threat Landscape Report by Crowdstrike

Overview

Below is an outline for the 2019 Mobile Threat Landscape Report from Crowdstrike. If you’re a member, then you can log into the Library and view it in your browser using the email address you signed up with. PS. Only members can successfully log in.

  • Click HERE to log into the library (Members only).
  • Folder: Books and Guides > Security Docs

If you are having issues logging in, please check the following help guide, HERE.

 

Outline

1. Introduction

2. Key Findings In This Report

3. Mobile Malware Overview

4. Types Of Mobile Malware

4.1.1. Remote Access Tools
4.1.2. Spouseware/Stalkerware
4.1.3. Banking Trojans
4.1.4. Mobile Ransomware
4.1.5. Cryptomining Malware
4.1.6. Advertising Click Fraud

5. Distribution Mechanisms

5.1.1. Trojan Applications
5.1.2. App Store Distribution
5.1.3. Phishing-Enabled Distribution
5.1.4. Distribution Via Compromised Websites
5.1.5. Distribution Via Compromised Operating System Images
5.1.6. Compromised Source Code
5.1.7. Software Exploitation
5.1.8. Loss Of Physical Control

6. Users Of Mobile Malware

6.1.1. Deployment Motivations
6.1.2. Financial Gain
6.1.3. Banking Trojans
6.1.4. Intelligence Gathering
6.1.5. Disruption
6.1.6. Targeted Adversary Groups
6.1.7. Threat Outlook
6.1.8. Mobile Device Security
6.1.9. Infection Vectors
6.1.10. Evolving Threat Classes
6.1.11. Remote Access Tools
6.1.12. Banking Trojans
6.1.13. Access Facilitation
6.1.14. Ransomware
6.1.15. Cryptomining
6.1.16. Geographic Variations In The Threat Landscape
6.1.17. Insider Threat/Accidental Exposure

7. Recommendations

8. About Crowdstrike

 

-----

Next steps:

This article was contributed by Jason Jacobs from Guyana. Jason is a member of the Caribbean CSPA. 

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.