Original Release Date: 10/1/2015
TLP: WHITE
The NJCCIC assesses with high confidence that vulnerabilities, exploits, and malware variants targeting the Android operating system (OS) will continue to proliferate as Android maintains a majority share of the global mobile device market and users increasingly rely on mobile devices for email, web browsing, banking, and shopping – both for professional and personal use. Additionally, as more organizations establish ‘bring your own device’ (BYOD) policies to reduce costs and increase connectivity, state-sponsored espionage groups and cybercriminals are likely to dedicate more resources to developing mobile exploits as a means to compromise user credentials, steal data, and to serve as an initial breach vector onto corporate networks. The threats targeting mobile devices range from various criminal schemes such as ransomware, exploits kits, and malvertising, to malicious applications that masquerade as legitimate software and stealthily exfiltrate user data, including phone call audio, text messages, photos, and emails. The NJCCIC recommends organizations and individual users implement strategies to mitigate the risk associated with the developing threat posed by mobile devices; this not only includes the patching of vulnerabilities and implementation of endpoint protections, but the training and awareness of best practices and the ability to recognize a potential threat.
Android is an open source, Linux-based, mobile OS marketed by Google Inc. and commercially available through a range of device manufacturers and mobile carriers. The Android OS reportedly powers more than one billion mobile devices, representing 82.8 percent of the global smartphone market. The OS runs on a wide variety of smartphones, tablets, televisions, wristwatches, and an increasing number of home automation devices. Android gained popularity with users and device manufacturers alike due to its affordability and openness, allowing for easy customization of the platform. Likewise, it appeals to application developers because of low barriers to entry into the Android application marketplace, Google Play. However, these characteristics are also advantageous to malicious actors who have capitalized on the ability to inject malicious code, develop malware, and carry out fraud schemes targeting the Android ecosystem.
The NJCCIC recommends that all Android OS users immediately apply patches and updates supplied by their network carriers and application developers. Users are urged to avoid downloading third-party applications from unauthorized sources, and avoid “rooting” their devices, which allows the user to retain administrative privileges and provides attackers with ample opportunity to control a device. Organizations operating with BYOD policies are urged to educate employees on mobile threats and vulnerabilities, implement monitoring and endpoint protection on all mobile devices, and establish the capability to remotely wipe lost or compromised devices.
Traffic Light Protocol: WHITE information may be distributed without restriction.