Mobile Banking Trojans Reach All-Time High
Mobile banking Trojans topped the list of cyber threats in the second quarter of the year, according to research by Kaspersky Lab
The number of installation packages for modifications for mobile banking Trojans peaked at more than 61,000 – an all-time high – in the second quarter of 2018, researchers at Kaspersky Lab have reported.
These modifications are aimed at helping cyber attackers avoid detection by security systems and to expand their arsenal.
The second-quarter peak is more three times greater than the previous quarter and more than double the number of installations recorded in the first quarter of 2017.
Mobile banking Trojans are designed to steal money directly from mobile users’ bank accounts. This type of attack is attractive to cyber criminals looking for an easy profit, researchers said.
The malware is typically disguised as a legitimate banking app to lure people into installing it. Once the app is launched, the Trojan displays its own interface, which is designed to steal any credentials entered.
In the second quarter, the greatest contribution to the number of Trojans was made by the creators of Trojan Hqwar, with about half of the new modifications discovered relating to this malware, followed by Trojan Agent with about 5,000 packages.
The top three countries with the biggest share of people targeted by mobile banking malware as a proportion of all mobile malware were the US (0.79%), Russia (0.7%) and Poland (0.28%).
According to Kaspersky Lab researchers, the explosion in the number of banking Trojans could be part of a global trend for mobile malware growth, as the overall number of mobile malware installation packages also rose, by more than 421,000 compared with the previous quarter.
“There is a great cause for concern regarding mobile security, judging by our evaluation of the threat landscape in the second quarter of this year,” said David Emm, principal security researcher at Kaspersky Lab.
“Cyber criminals are constantly creating new modifications to their malicious software to make it more sophisticated and discreet – and thus harder for cyber security firms to detect.”
According to Emm, this is yet another wake-up call for the industry. “Consumers should be vigilant and extremely cautious, especially in the coming months, as the trend continues to grow,” he said.
Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 215,762 user computers in the second quarter, up more than 5% on the previous quarter.
Source: computerweekly

Latest Jobs
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Head of Penetration Testing, UK based, Flexible location.
- United Kingdom
- Upto £100,000 plus excellent benefits
-
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
-
- Technical Security Analyst. Immediate opportunity,
- Newcastle upon Tyne
- 48000
-
Technical Security Analyst. Immediate opportunity, Technical Security Analyst needed to join a specialist security team. This role will require travel into the office in a hybrid model once industry returns back to the working environment. The Security Analyst must be commutable to Newcastle upon Tyne. This is an Immediate opportunity. An essential requirement of the role is to be able to engage with internal stakeholders so a blend off technical hands on analytical and consultative communication skills. The role will include, but not be limited to; managing and handling incidents end to end, log review, incident analysis, escalation, vulnerability assessment, Automation, Malware Analysis, Threat intelligence, etc All details kept in confidence. https://calendly.com/chris-holt/call-with-chris-holt-dcl-search