September 5, 2016 By Michael Ambrose 2 min read

August has been an eventful month for mobile security. We saw product launches, new threats and some snippets providing insight into upcoming trends. Here is a roundup of the top five headlines from last month.

Apple Cuts Down Trident Exploits With Security Update

This news made headlines all across the world. Although most publications spun a negative side of this story, I prefer to see the glass half-full.

So what happened here? Miscreants were trying to jailbreak devices through a malicious link delivered through a text message. But this attack was aimed at delivering a notorious spyware, Pegasus, which has been used for high-level corporate espionage.

This attack was three-pronged, thus the new name Trident. Infosecurity Magazine noted that it delivered the spyware through three different routes:

  1. A kernel base mapping vulnerability that leaks info, revealing the kernel’s location in memory;
  2. A kernel-level flaw enabling an attacker to install spyware on the device; and
  3. A Safari Webkit bug that encourages a user to click on a link that would allow an attacker to compromise the device.

What makes this malware so dangerous that Apple patched it within 10 days of being notified? The malware allows a remote attacker to monitor emails, texts, location, browsing history, device settings, phone calls, calendar records and anything else a victim may do on the device.

Twitter-Controlled Android Botnet

In August, a new Android botnet, known as Twitoor to some, used Twitter to infect devices instead of a traditional server.

The botnet is delivered through a malicious link in a message. It receives commands from the targeted Twitter account, enabling it to steal information and install additional malware. If the Twitter account is reported and blocked, the botnet is smart enough to simply switch to another Twitter account, thus making it very difficult to trace.

This is a significant development since cybercriminals can be expected to leverage this method in the future to compromise devices through other social media platforms, such as Facebook, LinkedIn and SnapChat.

Samsung Launches Galaxy Note 7: A New Era of Mobile Security

This launch from Samsung was significant because it introduced new device-level security features for the first time: Mobile devices can now scan users’ eyes to grant access. While they are not yet capable of retina scans, iris scans are the next best thing. Samsung is taking security to the next level. Now it is up to Apple to respond with its September launch.

Quadrooter Strikes: Over 1 Billion Android Devices Vulnerable

Security researchers uncovered Quadrooter, a set of vulnerabilities that affect Android devices running Qualcomm chipsets, in August. The attack is carried out through software that talks to the chipset and the OS. By exploiting these, the attacker can gain access to the device and steal data and communication that goes through it. The only fix is a security patch that the service providers can send to affected customers.

Google Password Fill

Google constantly strives to improve security on its Android devices. To help in that effort, the company developed something similar to single sign-on, called YOLO, or You Only Log in Once. It launched a password security open source API with the hopes that the industry’s top security companies can contribute to developing this further.

By doing so, Google aimed to eliminate the threat that attackers use to lock down controls behind security PIN screens. This is something to look forward to with next flavor of Android 7.0 Nougat.

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today