Subscribe Now

* You will receive the latest news and updates on the Canadian IT marketplace.

Trending News

Blog Post

Cyber criminals targeted Android devices more than any other in 2013, says Fortinet

Cyber criminals targeted Android devices more than any other in 2013, says Fortinet 

“FortiGuard Labs detected over 1,800 new distinct families of viruses in the past year, and the majority of those are targeting Google’s Android platform,” said Axelle Apvrille, senior mobile antivirus researcher, FortiGuard Labs, Fortinet. “Looking at the growth of Android malware, we can see that there is much to be concerned about in 2014. The growth shows no signs of slowing; in fact, the growth seems to be accelerating. As more Android-based devices are purchased and taken online, the opportunities for attackers to infect increases as well.”

ZeroAccess was the most “prolific” botnet of the year, according to Fortinet, and was responsible for 88.65 per cent of reported incidents in 2013.

It was followed by Andromeda at 3.76 per cent and Jeefo at 3.58 per cent.

Fortinet also reported that India was responsible for 22.66 per cent of the world’s spam, which China following at 18.39 per cent, Belarus at 12.40 per cent, and Russia at 10.27 per cent.

In terms of PC malware, ZeuS emerged as the most predominant trojan of 2013, with Fortinet reporting that there were over 20 million attempts to infect FortiGate-protected networks.

“While ZeuS was often used as a financial trojan, a significant number of ZeuS infections were used to deliver and execute the Cryptolocker ransomware,” said Richard Henderson, security strategist, FortiGuard Labs, Fortinet, in a release. “Cryptolocker put a new spin on ransomware in that it used uniquely generated cryptographic key pairs to fully encrypt the contents of a victim’s computer, and any mapped drive the victim had the ability to write to. Cryptolocker would then inform the victim they had a short period of time to pay a significant ransom — sometimes as much as a few hundred dollars, and typically only paid using the Bitcoin cryptocurrency — before the encryption key used to encrypt the victim’s computer was deleted, making the victim’s files completely unrecoverable.”

Related posts