From IoT to Cryptojacking: A Guide to Emerging Mobile Device Threats
In 2018, the world had become more connected than ever, and with the growing reliance on mobile devices, cyber risks surged, notes Moshe Elias, director of product marketing at Allot.
Whether you’re checking a bank balance, sending a work email, or sharing photos, everyday mobile activities create opportunities for malicious hackers seeking private data.
A recent telecoms security report that analysed anonymised data from four European communication service providers (CSPs) found that between November 2017 and February 2018, almost two billion mobile security threats were blocked—an average of roughly two threats per device each day.
As threat volumes are expected to climb, safeguarding both users and service providers becomes critical. Network‑level security services offer the most comprehensive protection for several reasons.
Firstly, many IoT devices—such as webcams—cannot have security clients installed. Secondly, end‑users often prefer not to manage device security themselves. Finally, a network‑based solution enables providers to push updates centrally to all users instantly.
Cryptocurrency makes mobile an easy target
Today, consumers increasingly use mobile devices for activities that attract hackers—from streaming music and videos to online shopping—making these platforms ripe targets.
The growing popularity of cryptocurrency has turned mobile wallets into lucrative targets. Hackers deploy sophisticated malware at a rapid pace, infiltrating smartphones and stealing crypto assets worth thousands of pounds. Both Google and Apple have removed infected apps from their stores after discovering such breaches.
Stop attacks before they start
To shield users, many service providers now offer security‑as‑a‑service (SECaaS), delivering automated tools that require no user intervention and providing centralized, automatic updates for antivirus and other security software.
This approach gives providers end‑to‑end protection for both users and the organization. Network‑based anti‑malware that activates while devices are online further deters attackers and their malware.
Figure out key hacker targets
Twenty years ago, the idea of accessing the internet from the palm of your hand seemed fanciful. Today, smartphones have become indispensable, shifting the focus of hackers from niche exploits to mass‑market devices.
Hackers now target mass‑produced consumer mobiles in homes and workplaces, bypassing safeguards to access personal data. The rapid success rate in compromising everyday smart objects is especially alarming.
Nearly half of consumers now browse the web on mobile rather than desktop. In 2017, 46 % of users chose mobile platforms for transactions to save time—an opportunity that hackers have seized.
Once a mobile device is compromised, attackers can pivot into the home network or security system, launching attacks that cripple all connected devices and render them inoperable.
Globally, an estimated six billion consumer IoT devices and 2.6 billion smartphone subscriptions are online. As these numbers rise, so does the incentive for attackers. By preparing today, CSPs can shield both themselves and their customers.
When CSPs actively deliver network‑level security services to the mass market, they benefit both the organization and its users. Embracing the principle that ‘an ounce of prevention is worth a pound of cure’ improves user experience and device security alike.
The author of this blog is Moshe Elias, director of product marketing, Allot
Internet of Things Technology
- How IoT and 5G Are Transforming Modern Workplaces
- Scaling IoT Provisioning: Secure, Efficient Strategies for Device Onboarding
- Embedded Linux Device Drivers: Roles, Runtime Insights, and Development Guidance
- Understanding How IoT Devices Work: A Practical Guide for Product Managers
- The Unexpected Growth of IoT — Expert Insights from Nabto CEO
- IoT Security Lessons from Recent Breaches: Protecting Your Enterprise
- Innovative Device Harvests Static Electricity from Falling Snow for Renewable Power
- Top 5 Ways IoT Revolutionizes Financial Services
- Manufacturers Embrace AI-Enhanced IoT for Supply Chain, Production, and Innovation
- 5G & IoT: Driving the Next Wave of Digital Transformation