Banking malware is on a rise and the percentage of
the wreckage it causes has risen up to 50%.
The viral banking malware usually is on the lookout
for payment data, credentials and of course, cash.
Development kits for mobile malware code are easily
available on underground portals and hence this issue is relevant.
The creators of mobile bankers henceforth allow the
fabrication of new versions of malware that could be distributed on an enormous scale.
Ramnit (28%), Trickbot (21%) and Ursnif (10%) are
apparently the most widely known types of the malware.
Mobile malware happens to be pretty difficult to
identify and equally so to deal with as they use similar malicious techniques
that are applied on computers.
The variants of the malware that were recurrently
identified by the anti-virus solutions were Android-bound Triada (30%), Lotoor
(11%) and Hidad (7%).
Turning the anti-malware off, using transparent
icons with empty application labels, delayed execution to bypass sandboxes, and
encrypting the malicious payload are a few of the evasion techniques being
employed, per sources.