logo

Mobile Malware Analysis 2022

   

Added on  2022-09-16

11 Pages1821 Words19 Views
Running head: MOBILE MALWARE ANALYSIS
Mobile malware Analysis
Name of the Student
Name of the University
Authors note

MOBILE MALWARE ANALYSIS
1
Executive Summary
In the last two decades the number of the mobile device users has grown exponentially
throughout the world and almost 3.5 billion smart phones used. Most of these devices contains
sensitive user data and in order to steal that data or compromise the security of the user’s privacy
there are numerous malware are used by the attackers to compromise the devices.

MOBILE MALWARE ANALYSIS
2
Table of Contents
Introduction......................................................................................................................................3
Mobile malwares.............................................................................................................................3
Behavior of the mobile malware......................................................................................................3
Attack techniques used by the malware...........................................................................................3
Hiding technique..............................................................................................................4
Resources used by the malware.......................................................................................................5
Conclusion.......................................................................................................................................6

MOBILE MALWARE ANALYSIS
3
Introduction
With the ever-increasing number of the mobile device users there are numerous
malware that are used in order to carry out the attacks on mobile devices such as Rootkits,
Adware, Backdoor, RiskTool and so on (Téllez and Zeadally, 2017). For this report the Rootkit
is considered and different aspects such as its attack technique, behavior of Rootkit, attack
technique and finally the resources used by this malware in order to carry out the attack.
Mobile malware and its definition
A Malware can be defined as the umbrella term that can be used for the numerous
malicious software components and variants which including viruses, spywares and
ransomwares. The malwares typically contain altered code that is developed by the attackers
which ultimately leads to extensive damage to the stored data in the mobile devices or in order to
gain unauthorized access to the different databases or application on the device.
Behavior of the mobile malware
Among all the malwares the Rootkit is one of the most successful malwares that affects
the mobile devices at a large scale. Rootkits are able to achieve the attacker’s malicious goal
through infecting the operating system of the concerned device. Such as the rootkits are capable
of hiding the malicious disk space files and the concerned process in order to make them
undetected (Téllez and Zeadally, 2017). Furthermore, they can help the attacker in order to
disable the active firewall as well as virus scanners while installing different trojan horses. The
rootkits can complete their goals stealthily as they affect operating system of the device which is
usually considered as trusted computing base.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Solved) Information Security: Assignment
|28
|7728
|183

Malware Analysis Assignment PDF
|29
|6377
|378

Business Continuity Plan and Disaster Recovery Plan
|5
|836
|345

Mobile Application Security: Malware Threats and Defenses
|7
|6648
|56

Types of Threats Against Mobile Devices and Security Protection Techniques
|8
|2120
|79

Smartphones Security Issues and Mitigation Tools
|10
|706
|305