Please enable JavaScript.
Coggle requires JavaScript to display documents.
Mobile Device Vulnerabilities - Coggle Diagram
Mobile Device Vulnerabilities
Trojan Horse
A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Consequences
Keylogging
Data Corruption
Remote Access (Backdoor)
Prevention and Solution
Install a good antivirus
Regularly backup data
Keep all software systems up to date
Spread
program to trick users into downloading and installing malware
Botnets
Cyber criminals use botnets to launch spam e-mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare.
spread
Spread by sending copy of it from compromised devices to other
devices via text messages and e-mail messages.
Consequences
Compromised mobile device
Make phone calls
Access contacts and photos
Prevention and Solution
Websites can guard against bots with CAPTCHA tests verify
users as human.
Only download apps from trusted and reputable app stores
Be careful with the e-mails you receive
Worm
The main objective of this stand-alone type of malware is to endlessly reproduce itself and spread to other devices. Worms may also contain harmful and misleading instructions. Mobile worms may be transmitted via text messages SMS or MMS and typically do not require user interaction for execution.
spread
Independently
Directives from the malware authors
Over mobile networks by exploiting OS vulnerabilities
Consequences
Consuming bandwidth
Overloading web servers
Slowing or halting other tasks
Prevention and Solution
vector through which worms can travel.
Avoid clicking login links embedded in emails, and instead visit
the site directly and login through there.
Rootkit
Rootkits are malware that stealthily achieve their goals by modifying operating system code and data, and have long been a problem for desktops. However, smart phones expose several unique interfaces, such as voice, GPS and battery, that rootkits can exploit in novel ways.
spread
May appear to be legitimate
Can provide legitimate functions
Trick users giving the rootkit permission to be installed
Consequences
Pinned items changing on the taskbar.
Slow performance or high CPU usage.
Browser redirects.
Prevention and Solution
Updating virus definitions.
Avoiding suspicious downloads.
Performing static analysis scans.