Welcome!

News Feed Item

Alcatel-Lucent reports 2013 surge in mobile network infections affects 11.6 million devices

Home network infections rates for year remain flat as "traditional" PC malware makes jump to mobile devices

PARIS, Jan. 29, 2014 /PRNewswire/ -- Alcatel-Lucent (Euronext Paris and NYSE: ALU) today released new data showing that security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control. Meanwhile, the security threat to home networks remained constant with traditional "fixed" malware types starting to make the jump to mobile devices.

Figures for the 2013 fourth quarter and year from Alcatel-Lucent's Kindsight Security Labs reveals that malicious software or "malware" used by hackers to gain access to devices continues to rise with consumer ultra-broadband usage. In addition to the posed risks to consumers, the malware is used to commit espionage and launch denial of service attacks on businesses and governments. 

Due to the unique position of Alcatel-Lucent's network security and analytic products within networks, it can measure the impact of traffic types traversing the network, including malicious and cyber-security threats.

The report found that mobile malware infections increased 20 percent in 2013, with 4G LTE devices being the most likely to be infected. Android devices accounted for 60% percent of total mobile network infections, which frequently took the form of trojanized applications downloaded from third party app stores, Google Play™ Store or by phishing scams. Forty percent of mobile malware originated from Windows™ laptops tethered to a phone or connected directly through a mobile USB stick or MIFI hub. Infections on iPhone® devices and BlackBerry® devices made up less than 1 percent.

Other report highlights include:

  • The mobile infection rate was 0.55 percent in the fourth quarter. Based on this, it is estimated that at any time over 11.6 million mobile devices - mostly Android - are infected by malware.
  • The number of mobile malware samples grew 20 times in 2013.
  • The residential infection rate in fixed networks dropped from 9.6 percent in October to 8.7 percent in December. For the year, it remained relatively flat at 10 percent.
  • Six percent broadband residential customers were infected with high-level threats such as a bots, root-kits, and banking Trojans.
  • Although ZeroAccess malware topped all infections in the fourth quarter, its infection rate dropped from 0.8 percent to 0.4 percent due to Microsoft's and Symantec's efforts to disrupt its operations.

"Criminals traditionally go after low hanging fruit," said Kevin McNamee, security architect and director of Alcatel-Lucent's Kindsight Security Labs. "Not only is Android the largest smartphone market, unlike iPhone and Blackberry, it allows apps to be loaded from third party sites. This provides cybercriminals with an un-policed mechanism to distribute their malware which can easily evade detection by device-based anti-virus. Thus, in 2013 we saw an increased trend towards operators offering network based anti-virus security to subscribers as a service."

2013 was also a year that saw mobile spyware turn infected smartphones and tablets into a cyber-espionage devices that allowed hackers to remotely track location, download contact lists and personal information, intercept and send messages, record conversation and take pictures.

The report also includes the top 20 home and Internet malware threats in 2013, as well as analysis of malware developments, including ZeroAccess, Alureon, the Zeus banking Trojan, Uapush, Coogos, NotCompatible, QDPlugin, and others.

Alcatel-Lucent with be exhibiting its cloud-based Kindsight Security Solution at Mobile World Congress in Barcelona, Spain, February 24-27, 2014, Hall #3, Booth #3K10 at at the Fira Gran Via.

Helpful links:

ABOUT ALCATEL-LUCENT (EURONEXT PARIS AND NYSE: ALU)
Alcatel-Lucent is at the forefront of global communications, providing products and innovations in IP and cloud networking, as well as ultra-broadband fixed and wireless access to service providers and their customers, enterprises and institutions throughout the world.

Underpinning Alcatel-Lucent in driving the industrial transformation from voice telephony to high-speed digital delivery of data, video and information is Bell Labs, an integral part of Alcatel-Lucent and one of the world's foremost technology research institutes, responsible for countless breakthroughs that have shaped the networking and communications industry. Alcatel-Lucent innovations have resulted in the company being recognized by Thomson Reuters as a Top 100 Global Innovator, as well as being named by MIT Technology Review as amongst 2012's Top 50 "World's Most Innovative Companies". Alcatel-Lucent has also been recognized for innovation in sustainability, being named Industry Group Leader for Technology Hardware & Equipment sector in the 2013 Dow Jones Sustainability Indices review for making global communications more sustainable, affordable and accessible, all in pursuit of the company's mission to realize the potential of a connected world.

With revenues of Euro 14.4 billion in 2012, Alcatel-Lucent is listed on the Paris and New York stock exchanges (Euronext and NYSE: ALU). The company is incorporated in France and headquartered in Paris.

For more information, visit Alcatel-Lucent on: http://www.alcatel-lucent.com, read the latest posts on the Alcatel-Lucent blog http://www.alcatel-lucent.com/blog and follow the Company on Twitter: http://twitter.com/Alcatel_Lucent.

ALCATEL-LUCENT PRESS CONTACTS

SIMON POULTER

[email protected]  

T : +33 (0)1 40 76 50 84

MARK HUDSON 

[email protected] 

T : +1 405-844-6827 




ALCATEL-LUCENT INVESTOR RELATIONS

MARISA BALDO

[email protected]  

T : + 33 (0) 1 4076 1120

TOM BEVILACQUA

[email protected]  

T : + 1 908-582-7998

CORALIE SPAETER

[email protected]  

T : +33 (0)1 40 76 49 08

 

SOURCE Alcatel-Lucent

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...