Please enable JavaScript.
Coggle requires JavaScript to display documents.
MOBILE DEVICE VULNERABILITIES - Coggle Diagram
MOBILE DEVICE VULNERABILITIES
WORM
INTRODUCTION
A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
METHOD
■ Independently
■ Directives from the malware authors
■ Over mobile networks by exploiting OS vulnerabilities
■ Sending mass emails with infected attachments to users’
contacts
■ Without any human interaction
CONSEQUENCES
■ Cause harm to their host networks by;
● Consuming bandwidth
● Overloading web servers
● Slowing or halting other tasks
● Uncontrolled replication consumes system resources
SOLUTION&PREVENTION
■ Avoid public or unsecured Wi-Fi channels which can act as a
vector through which worms can travel.
■ Avoid clicking login links embedded in emails, and instead visit
the site directly and login through there.
■ Never download files from unknown sources.
ROOKIT
INTRODUCTION
Rootkit malware is a collection of software designed to give malicious actors control of a computer network or application.
Once activated, the malicious program sets up a backdoor exploit and may deliver additional malware.
such as ransomware, bots, keyloggers or trojans.
METHOD
Spread by hiding in software
■ May appear to be legitimate
■ Can provide legitimate functions
■ Trick users giving the rootkit permission to be installed
CONSEQUENCES
Symptoms of a rootkit infection are:
■ antimalware protection stops working.
■ Windows settings change independently, without any action by
the user.
■ Background images changing or disappearing in the lock screen.
■ Pinned items changing on the taskbar.
■ Slow performance or high CPU usage.
■ Browser redirects.
SOLUTION & PREVENTION
Organizations and users can be protected from rootkits by;
■ Latest anti-malware programs can detect and remove rootkits
hiding in a system.
■ Regularly patching vulnerabilities in software, applications and
OS.
■ Updating virus definitions.
■ Avoiding suspicious downloads.
■ Performing static analysis scans
TROJAN HORSE
INTRODUCTION
○ It is designed to appear or disguised as a legitimate software.
○ Spread by program to trick users into downloading and installing malware.
METHOD
spreading Trojan horses is through seemingly unthreatening emails and email attachments. Trojan horse developers frequently use spamming techniques to send their emails to hundreds or thousands of people
CONSEQUENCES
■ Create a backdoor of your computer.
■ Gives malicious users access to your system.
■ Allowing confidential or personal information to be compromised.
■ Steal data, install more malware, modify files, monitor user activity,
use the computer in botnets, and anonymous internet activity by the
attacker
SOLUTION & PREVENTION
■ Install trusted internet security - install easy-to-use cybersecurity software.
Keep up to date - keep your system’s software up-to-date.
Be alert to email attachments - be cautious about attachments in
any unexpected emails.
BOTNETS
INTRODUCTION
○ Also known as a zombie army.
○ Botnet: from the words ‘robot’ and ‘network’.
METHOD
■ Spread by sending copy of it from compromised devices to other
devices via text messages and e-mail messages
.
Spambots – render advertisements on websites
Web spiders – scrape server data
CONSEQUENCES
■ Take advantage of unpatched exploits
■ Provide hackers with root permissions over
Compromised mobile device
Make phone calls
Access contacts and photos
SOLUTION & PREVENTION
Websites can guard against bots with CAPTCHA tests verify
users as human.
Only download apps from trusted and reputable app stores
Be careful with the e-mails you receive