Many industry pundits have predicted a rise in mobile fraud over the past five-plus years, making this a top concern in mobile security. While I don’t believe that predicting the future is very difficult, I do believe getting the timing of predictions correct is much more challenging.

Fraud will eventually hit any new channel or payment type introduced. So while most of us agree fraud will become a very large problem, we’re not quite sure when. Given some recent developments, it seems we’re getting closer to a significant rise in mobile fraud. The question of how real these threats are is more of a matter of when than if; fraudsters will find a way to exploit mobile.

Deploying Mobile Security

How we deploy and manage mobile is very different compared to the security environment we had with PCs and laptops. While we may see a few instances of individuals bringing their own computer to work, the majority of our traditional computer equipment is still purchased, configured, deployed and managed by the organization. This means that IT has the opportunity to create a profile on that computer and then lock it down, making it much easier to manage.

In the mobile world, many devices are brought into the enterprise by the end user, and they are not as interested in upgrading the OS or adding applications to their PC as they are their mobile device. The users own the devices and have the ability to configure and upgrade them as they desire.

With mobile, OS upgrades and patches happen frequently: In fact, end users are typically scrambling to implement them as soon as they are released. Add to this the fact that applications can be added for free or for a minimal charge and you have a device that is constantly changing and very difficult for IT to manage.

Handling Security Challenges

With the challenges of managing the device comes the opportunity for malicious actors to use these devices as an entry point to the enterprise.

Mobile security is also challenged by jailbroken and rooted devices. These are devices that have been altered to gain additional access to their underlying configuration and operating system. By doing this, end users render much of the security built into these devices useless. That could potentially allow a cybercriminal to manipulate the device more freely.

As an enterprise, you want to be aware of these devices and take steps to prevent them from accessing your environment and data. Jailbroken and rooted devices have no place in the enterprise and significantly increase your risk.

Staying Clear of the Train Tracks

According to the Monthly Mobile Threat Roundup report from IBM Security Trusteer, the sophistication and expanding capabilities of mobile malware is impressive — in a bad way. The fact that mobile attacks are now reaching the sophistication of PC tactics indicates that cybercriminals are focusing on the mobile channel with similar intensity as the online channel.

As Tyler Shields, formerly of Forrester Research, recently shared, mobile attacks will increase when the business value of those attacks approaches that of online strikes — that is, when cybercriminals get a similar return on their investment.

Listen in as Shields provides his insights on the rising threat of mobile fraud in the video series linked below. And listen now, before that mobile fraud train comes roarin’ around the bend!

more from Endpoint

IOCs vs. IOAs — How to Effectively Leverage Indicators

Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners and operational teams to appropriately leverage indicators of compromise (IOCs) and indicators of attack (IOAs) for an effective monitoring, detection and response strategy. Inexperienced security […]

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogramming, with a particular focus on its implementation […]