{"id":103636,"date":"2021-08-12T10:00:19","date_gmt":"2021-08-12T10:00:19","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=103636"},"modified":"2021-08-16T14:36:37","modified_gmt":"2021-08-16T14:36:37","slug":"it-threat-evolution-q2-2021-mobile-statistics","status":"publish","type":"post","link":"https:\/\/securelist.com\/it-threat-evolution-q2-2021-mobile-statistics\/103636\/","title":{"rendered":"IT threat evolution in Q2 2021. Mobile statistics"},"content":{"rendered":"
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data.<\/em><\/p>\n In Q2 2021, according to data from Kaspersky Security Network:<\/p>\n Android’s own security has changed dramatically since the first devices were released with Android 1.6 Donut when it became the most dominant OS on the market. The development of Google Play Protect is worth highlighting, and the rights of apps have since been severely restricted, as now they have to request all permissions from users explicitly. Moreover, the security subsystem was moved to a separate updatable component, independent of the device manufacturer. Yet there is one thing both the old 1.6 version and the latest Android 11 have in common which significantly compromises the operating system’s security: the freedom to install apps from third-party sources. It’s great in terms of OS user-friendliness \u2014 I use it myself almost every day \u2014 but it gives all sorts of cybercriminals a real “window of opportunity” from a security point of view. It’s also the reason why third-party distribution platforms for Android apps have mushroomed. These platforms offer the most diverse range of downloads, from popular apps clones to different types of malware. However, the platform is not the only danger. The client working with it can also be to blame for loading and installing apps into the system similar to the official Google Play client.<\/p>\n In Q2 2021, we discovered<\/a> that the popular APKPure app has been infected by a malicious module. The developers implemented an unverified advertisement SDK, which downloaded Trojans to users’ devices without them knowing. In other words, a Trojan dropper found a way into the program together with the SDK. The malware’s next move depended on the Android OS version it managed to infect. Users with relatively recent versions would get off more lightly with just some annoying advertising and subscriptions, but devices running older versions were in for a plethora of threats such as the xHelper mobile Trojan<\/a>.<\/p>\n This review will conclude with a chart depicting mobile threats detected on devices with installed Kaspersky security solutions.<\/p>\nQuarterly figures<\/h2>\n
\n
Quarterly highlights<\/h2>\n