The report shows that the government, operators and related companies have achieved certain results in combating harassment calls, harassing calls, and the number of spam messages has declined; information security threats have presented four major trends; various types of Trojans are important information security risks on the Android platform. Mining Trojans, ransomware programs have seen rapid growth in number and variety in recent years;
Multi-party cooperation to combat telecommunication harassment has achieved initial success
According to the report, traditional phishing websites, harassing phone calls, junk messages, and other information security issues still affect Android users' common problems. In the year of 2017, 360 mobile phone guards intercepted 2.88 billion attacks on various phishing websites and intercepted mobile phone-based interception. According to the classification of the website, it can be found that the highest proportion of gambling gaming is 73.2%. Other types that account for higher levels include false shopping (9.2%), false recruitment (6.6%), financial securities (5.9%), and counterfeit drugs (1.6% ) And phishing ads (1.4%) types of phishing sites.
It is worth mentioning that 360 mobile phone guards intercepted 38.09 billion harassing calls for the whole year of 2017, which was a declining trend for the first time in comparison with previous years. This shows that the government, operators and related companies have achieved certain results in the fight against harassment calls. Its rising momentum. On average, it identified and intercepted 104 million times for national users. From the monthly data, the maximum number of interceptions in March reached 6.13 billion.
In addition, spam messages that have been criticized by users have also been curbed. In 2017, 360 mobile phone guards intercepted 9.85 billion spam messages for users across the country, with an average of 26.896 million daily interceptions. More recent data, overall The trend of rapid decline, from more than 70 billion in 2012, to less than 10 billion in 2017.
New Trends in Information Security Threats
In addition to the analysis and aggregation of existing data, the report also analyzes the development trend of future information security issues on the Android platform from a technical perspective. Take AVPASS as an example, AVPASS is a detection model that can detect Android antivirus software and incorporates detection. The information and obfuscation techniques to construct a specific APK to bypass the anti-virus software detection tools. AVPASS achieves automatic kill-free, this technology has derived a key generator of various types of software, such as adware and ransomware.
Malicious (left) and ransomware (right) One-click builder
In addition to the continuous emergence of malware factories with automation and countermeasure capabilities, malicious mining Trojans have become increasingly fierce. Public basic services have become a new platform for malware use. Scripting languages have become a new hot spot for malware and a major focus for the future development of mobile security. trend.
Mining Trojans, Ransomware Vicious
Like the PC platform, all kinds of Trojan horse programs are also important information security threats for the Android platform. Affected by the recent rapid rise in the price of Bitcoin and other e-currencies, the Android platform that briefly broke out in 2014 has seen another resurgence of mining Trojan horses. From 2013 onwards. By January 2018, 360 campfire labs had captured more than 1200 Android platform Trojan horses. In January 2018, only about 400 Android Trojans were mined on the Android platform, accounting for nearly one-third of all Android platforms. Among them, tool APP, downloader APP and wallpaper APP are the most common forms of camouflage in this type of Trojan.
From January to September of 2017, 360 campfire labs captured more than 500,000 pieces of mobile phone ransomware and averaged more than 55,000 pieces of mobile phone ransomware per month. These ransomware also generated a lot of things like speech recognition, New technical means such as two-dimensional code and file encryption, need to attract the attention of the majority of security vendors and users.