{"id":107978,"date":"2022-11-18T08:05:33","date_gmt":"2022-11-18T08:05:33","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=107978"},"modified":"2022-11-18T06:17:52","modified_gmt":"2022-11-18T06:17:52","slug":"it-threat-evolution-in-q3-2022-mobile-statistics","status":"publish","type":"post","link":"https:\/\/securelist.com\/it-threat-evolution-in-q3-2022-mobile-statistics\/107978\/","title":{"rendered":"IT threat evolution in Q3 2022. Mobile statistics"},"content":{"rendered":"
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data.<\/em><\/p>\n According to Kaspersky Security Network, in Q3\u00a02022:<\/p>\n Judging by the number of attacks on mobile devices, cybercriminal activity stabilized in Q3 2022 after a gradual drop in the previous quarters. Over the three months, Kaspersky products prevented a total of 5.6 million mobile malware, adware, and riskware attacks.<\/p>\n Number of attacks targeting users of Kaspersky mobile solutions, Q1\u00a02021\u00a0\u2014 Q3\u00a02022 (download<\/a>)<\/em><\/p>\n The new Triada Trojan, discovered inside a modified WhatsApp build<\/a>, was an interesting find. It was notable for spreading via ads inside the popular Snaptube app and through the Vidmate internal store. Once on a device, the Trojan decrypts and runs a payload, which downloads and runs further malicious modules. The modules can display ads, subscribe the user to paid services, or download and run other malicious modules. Besides that, the Trojan steals various keys from the legitimate WhatsApp, potentially hijacking the account.<\/p>\n The Harly<\/a> Trojan subscribers were another malware family spread via legitimate channels. These are published in Google Play under the guise of authentic apps, subscribing the unknowing user to paid services once installed. We have discovered 200 malicious applications of this type starting in 2020, and a total count of installations at the time of writing this report had exceeded 5 million.<\/p>\n <\/a><\/p>\n One of the most recently detected Harly-type apps in Google Play, with more than 50,000 installations.<\/em><\/strong><\/p>\n Google Play keeps getting new banking Trojans, such as new versions of the Trojan dropper that downloads and runs Sharkbot<\/a>.<\/p>\n Despite a general decline in the number of mobile attacks, we can see that cybercriminals are using increasingly smarter tricks to deliver malware to user devices.<\/p>\n In Q3 2022, Kaspersky detected 438,035 malicious installation packages, which is 32,351 more than in the previous quarter and down 238,155 against Q3 2021.<\/p>\n Number of detected malicious installation packages, Q3\u00a02021\u00a0\u2014 Q3\u00a02022 (download<\/a>)<\/em><\/p>\n Distribution of newly detected mobile malware by type, Q2 and Q3 2022 (download<\/a>)<\/em><\/p>\n Threats in the Trojan-Dropper class ranked first among all threats detected in Q3, with 26.28%, exceeding the previous quarter’s figure by 22.15 percentage points. Nearly half (45.33%) of all detected threats of that type belonged to the Ingopack family. These were followed by banking Trojan droppers from Wroba (41.24%) and Hqwar families (5.98%).<\/p>\n AdWare, the ex-leader, moved 2.5 percentage points down the rankings to second place with a share of 22.78%. A fourth of all detected threats of that class belonged to the Aldo family (25.64%).<\/p>\n Third place was taken by various Trojans with a cumulative share of 16.01%, which was 4.48 percentage points lower than in the previous quarter. Half of all detected threats of that class were objects from the Boogr family (50.16%).<\/p>\n Note that the malware rankings below exclude riskware or PUAs, such as RiskTool or adware.<\/em><\/p>\nQuarterly figures<\/h2>\n
\n
\n
Quarterly highlights<\/h2>\n
Mobile threat statistics<\/h2>\n
Distribution of detected mobile malware by type<\/h3>\n
Top 20 mobile malware programs<\/h3>\n