Fake Adverts, Real Disasters
“…The target site received more web traffic in a day than the BBC’s news website gets in a month…”
That’s no small number of hits and no easy feat from an attack perspective, so how have these hackers achieved such a feat? In this case, using mobile devices….650,000 Chinese smartphones to be exact.
It’s the mobile crowdsourcing of the hacking world.
By flexing their financial muscles, hackers have (according to various articles) replaced adverts within popular browsing apps to supplant innocuous adverts with malicious code that on any other day would have had no effect.
Clearly, malware writers and hackers have moved on from simply buying ready-made malware kits and infecting PC’s to using mobile devices as a DDOS attack vector, a clear display of financial wealth and a worrying avenue not readily seen in today’s world. The following article outlines how DDoS techniques have become more diversified over the recent years:
So as a business, what happens if these are your users, using your corporately provided mobile devices? And unwittingly hacking public websites? How do you protect devices from rogue apps and provide a real-time detection and remediation capability?
Events such as this only go to show that the risk is real and that organisations can no longer dismiss mobile threat protection as a ‘nice to have’. Instead, mobile threat protection needs to be considered as part of an overall mobile security strategy.
Our security solutions include authentication, DLP, containerisation, mobile threat protection, web and email security and cloud security. If you would like further information around our security solutions, or discuss how we can protect your mobile Enterprise with our trusted security services then please fill out your details in the form above.