Have any question?

Text or Call (954) 573-1300

Blog

LSeven Solutions Blog

LSeven Solutions has been serving the Fort Lauderdale area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Botnets and Zombie Phones

Once considered impossible, the threat of malware on mobile devices is becoming a serious reality. Malware used to just be a plague to PC's, however, in the last few years we have seen a rise in Mobile Malware specifically the threat of Mobile Botnets.

From a Malware/Botnet perspective, mobile devices are increasingly more attractive than traditional PC's. For instance, the ubiquitous use of Mobile Devices in todays world makes for perfect stepping stones for malicious attacks. Our general reliance and dependence on our cell phones and tablets means every day more personal information is being stored on these devices, such as banking information, credit card numbers, email and social media accounts.

Mobile devices, by design, have a wide array of communication technologies available to them. These technologies make it incredibly easy for malware to propagate itself. 3G and 4G, along with WiFi connectivity maintain a fairly constant internet connection for most devices. This connectivity makes it easier to trick a user into downloading infected software. Many times the software in question is a legitimate application that is bundled with or infected by malicious code which can modify your phone to provide root or administrator access to your device.

Once compromised, the Malware can then use the internet connectivity or SMS (texting) capabilities of the device to communicate with other "members" of the Botnet, Specifically the Command and Control Server. Once this communication is established, data can then be harvested or attacks can be coordinated. Further, Mobile Botnets can create a decentralized control network in which the Command and Control Server needs to issue instructions to only a few compromised devices. From there, those devices will propagate instructions to other devices in a Peer to Peer fashion. A Cloud-like structure can also be established using the compromised devices to transparently process attack and command data.

Protections can be put into place for your mobile device. If your mobile device supports it, you can install antivirus software. Smartphone antivirus is still in its infancy and can cause older models to slow down considerably, so mobile best practices may be more effective. Do not download software from untrustworthy sources including third-party app marketplaces. Be sure to inspect the privileges of any app you are about to install. Ask yourself: Does it really need SMS capability, or system privileges? Lastly, if the app looks suspicious, or the site you get it from doesn't look legitimate do NOT download it.

Malware on mobile devices is a growing problem today and certainly will continue to grow in the future. The processing power and array of communication technologies on mobile devices make it easy for malware to spread. Be sure to use your best judgment when downloading applications and keep your security software up to date. If you need support implementing a mobile security plan or policy, don't hesitate to contact our help desk or call at (954) 573-1300 and set up a consultation.

Is it Time to Ditch Windows XP?
Why Small Businesses Need to Properly Manage Activ...
 

Comments

No comments made yet. Be the first to submit a comment
<br />
<b>Warning</b>:  Attempt to read property /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 20
Guest"/>
Already Registered? Login Here
Friday, 22 November 2024

Warning: Undefined variable $registration in /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 57

Warning: Undefined variable $registration in /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 91

Captcha Image

Customer Login

Customer Feedback

News & Updates

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

Learn more about what L7 Solutions can do for your business.

L7 Solutions
7890 Peters Road Building G102,
Plantation, Florida 33324