Botnets Evolving to Mobile Devices

  /     /     /  
Publicated : 22/11/2024   Category : security


Botnets Evolving to Mobile Devices


Millions of mobile devices are now making requests in whats described as an attack on the economy.



Botnets have tended to hide in the nooks and crevices of servers and endpoint devices. Now a growing number are hiding in the palms of users hands. Thats one of the conclusions of a new report detailing the evolving state of malicious bots.
Mobile Bots: The Next Evolution of Bad Bots examined requests from 100 million mobile devices on the Distil network from six major cellular carriers during a 45-day period. The company found that 5.8% of those devices hosted bots used to attack websites and apps – which works out to 5.8 million devices humming away with activity that their owners know nothing about.
The volume was a surprise, says Edward Roberts, senior director of product marketing at Distil Networks. The research team even took another sampling run to verify the number, he says. In all, one in 17 network requests was a bad bot request, Roberts says,
Another significant step in the evolution of these bots is their use. The traditional use of botnets is as an engine for distributed denial-of-service (DDoS) attacks or spam campaigns. These mobile bots, though, seem to be focused on a different sort of attack.
Its an attack on the economy, Roberts says, describing the activity in which bots repeatedly scrape prices from a retail site so that a competitor can constantly match or undercut the price.
Another activity for these mobile bots is hunting through brand loyalty sites looking for login information so that premium products or points can be harvested for the botnet owner. A side effect of this type of activity is much lower traffic volume than that often seen in bot-infected devices.
We only see an average of 50 requests a day from these devices, Roberts says. The activity is low and slow and highly targeted. In this targeted activity, the nature of a cellular-connected device comes into play, as the IP address will change every time the device moves from one cell to another.
The one thing that hasnt evolved is the way in which the devices become infected,
the report points out
. Tried-and-true infection mechanisms, including malicious file attachments in email, infected files behind website links, and drive-by infections that use redirected links, are all commonly found. As with desktop and laptop computers, the researchers recommend anti-malware software and user education as primary defenses against infection and botnet recruitment.
Related content:
10 Tips for More Secure Mobile Devices
Duo Securitys Trusted Endpoints Integrated with Sophos Mobile
Why CISOs Need a Security Reality Check
Phishing Threats Move to Mobile Devices
 
 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the
conference
 and
to register.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Botnets Evolving to Mobile Devices