Cyber Criminals Targeting Mobile Devices

Cyber

Cyber Criminals Targeting Mobile Devices

16 October 2024

Aon and Cybersafe launches Check Point‘s ZoneAlarm Mobile Security App

The cyber security industry has undergone significant changes, the threat landscape has evolved to the extent that even cybercriminals are adopting sophisticated business models just like legitimate businesses that can earn substantial returns on their criminal activities.  These activities range from trading stolen data to hacking into corporate networks, giving rise to 'Malware-as-a-Service (MaaS)', demonstrating the increasing sophistication, creativity and maturity within the illicit cybercrime market. The business model of blanket spreading malware or ransomware attacks is a profitable form of distribution, making every business a target. And right now, the easiest way in is through your cell phone.


Read Article: AI vs Humans

Cybercrime statistics:

  • 83% of breaches involve external actors. [1]
  • Statistics predict that cybercrime will cost the global economy more than 20 trillion U.S dollars by 2026.[2]
  • Nearly a quarter of all emails can be classified as malicious or do not engage.[3]
  • Cybercrime occurs with an average of 97 cybercrime victims per hour, which means that there is a victim of cybercrime every 37 seconds.[4]
  • Hackers attack computers with Internet access every 39 seconds, on average.[5]

“Mobile devices serve as a convenient entry point for cybercriminals to obtain passwords, subsequently infiltrating company networks. A significant number of employees utilise their mobile devices to connect to their organisation's networks, inadvertently providing cybercriminals with the opportunity to access sensitive company information,” explains Zamani Ngidi, Business Unit Manager for M&A and Cyber Solutions at Aon South Africa

Types of mobile cybercrime:

  1. Malicious Apps and Websites - Mobile malware and malicious websites can perform various harmful activities on mobile phones, similar to traditional computers.
  2. Mobile Ransomware - This type of mobile malware encrypts files and demands a ransom for their decryption.
  3. Phishing Attacks - Cyber-attacks commonly begin with phishing emails, but on mobile devices, phishing attacks can occur through various means, including email, SMS messaging and social media platforms.
  4. Man-in-the-Middle (MitM) Attacks - MitM attacks involve intercepting network communications to eavesdrop on or modify transmitted data. Mobile devices are particularly vulnerable to these attacks.
  5. Advanced Jailbreaking and Rooting Techniques - These techniques exploit vulnerabilities in mobile operating systems to gain administrator access, allowing attackers to access more data and cause greater damage.
  6. Device and Operating System (OS) exploits - With mobile devices – like computers – vulnerabilities in the mobile OS or the device itself can be exploited as they often exist below and outside the visibility of the device’s security.

“Mobile devices such as smartphones and tablets carry a plethora of inherent cyber risks, including those from websites, emails and various applications. This exposes users to malware and potential hacking with threat activators looking to gain access to mobile banking apps and company data. Background apps may scan devices, URLs, and Wi-Fi connections, which can lead to exposure to dangerous links across various platforms including social media and games. Despite appearing harmless at first glance, these risks can ultimately lead to the theft of personal information,” Zamani warns.

“To safeguard your device and secure sensitive business information from potential threats, it's crucial to invest in security measures such as Check Point’s ZoneAlarm. While this service is not free, it is offered through Aon and provides comprehensive protection by shielding you against seemingly innocent yet malicious apps, scanning WIFI connections, and blocking access to malicious URLs which are sent in communications like email, SMS and WhatsApp," says Cybersafe CEO, Macleod Burrill.

Check Point’s ZoneAlarm includes the following key features:

  • Anti-ransomware - Detects and blocks suspicious ransomware activities before any files are encrypted.
  • Malicious App protection - Protects from known and unknown malicious apps and updates.
  • Anti-Phishing - Blocks phishing attacks both from known and unknown phishing sites and apps.
  • USB & Bluetooth - Protects against malicious apps coming from USB and Bluetooth connections.
  • Safe Browsing - Blocks access to malicious sites on all browsers.
  • Anti-Bot - Prevents hackers from taking control of your device by blocking bot attacks.
  • Wi-Fi Network Security - Protects traffic from being trapped in Man-in-the-Middle attacks when connected to Wi-Fi.
  • Rooting/Jailbreak Detection - Detects suspicious device behaviour and alerts if someone has gained control over your operating system.
  • Ultimate Device Experience - Negligent effect on battery life and device performance.

This is a Value-Added Product and not an insurance solution.

[1] https://www.phishingbox.com/downloads/Verizon-Data-Breach-Investigations-Report-DBIR-2023.pdf

[2] https://www.evolvesecurity.com/blog-posts/actual-cost-of-cybercrime#:~:text=The%20Global%20Cost%20of%20Cybercrime&text=Statistics%20predict%20that%20cybercrime%20will,damages%20that%20costed%20%246%20trillion.

[3] https://www.tripwire.com/state-of-security/phishing-trends-and-tactics-q1-2023

[4] https://aag-it.com/the-latest-cyber-crime-statistics/

[5] https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds


Request a Business Insurance Quote Today! ⟶

Related Articles:

Safeguarding Cargo Transport Amidst Rising Risks

Solar Fire Risks

Better Risk Management Profiling Through Storytelling