Zscaler Report Highlights Growing Mobile, IoT, and OT Threats
A recent report by Zscaler, a cloud security company, has unveiled alarming trends in mobile threats targeting Android operating systems, as well as threats to IoT and OT devices. With mobile devices accounting for over 60% of global Internet traffic, financially-motivated mobile threats have surged by 111% in the past year.
A List of Mobile Malware Threats
Zscaler’s ThreatLabz has observed a 29% increase in banking mobile malware, with banking malware now comprising 20% of the total Android threat landscape. Some of the most prevalent banking malware families include Vultur, Hydra, Ermac, Anatsa, Coper, and Nexus, each designed to steal financial data and bypass security measures.
Spyware Threats Soar by More Than 100%
In addition to banking malware, spyware threats have also seen a significant uptick, with blocked transactions related to spyware rising by 100%. SpyLoan, SpinOk, and SpyNote are among the most common spyware families, targeting personal data and device information.
Geographically, India, the U.S., and Canada are the top targets for mobile malware attacks, impacting sectors such as technology, education, and manufacturing.
IoT and OT Threats
IoT and OT environments are increasingly under attack, with IoT malware attacks rising by 45% in the past year. Mirai and Gafgyt are the leading malware families targeting IoT devices, posing a risk for large-scale DDoS attacks.
The U.S. is the primary target for IoT malware attacks, followed by Singapore and the U.K. Manufacturing, transportation, and food industries are among the top sectors impacted by IoT threats.
What Will the Future Look Like?
Zscaler predicts that IoT and OT devices will continue to be prime targets for cyber threats, especially in the manufacturing sector. AI is expected to play a dual role in facilitating both sophisticated phishing campaigns and enhancing cybersecurity defenses.
How to Protect IoT and OT Devices
- Gain visibility on all IoT and OT devices in use.
- Keep systems and software updated and patched.
- Collect and analyze network logs for suspicious activity.
- Implement multi-factor authentication and device segmentation.
How to Protect Mobile Devices
- Install security applications on mobile devices.
- Avoid clicking on suspicious links and downloading unknown apps.
- Be cautious of immediate update requests after app installation.
It’s essential for organizations to stay vigilant and implement best practices to safeguard against evolving cyber threats. Stay informed, stay secure!