Attackers clone malware-laden copies of popular apps

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan’s State of Mobile App Security report, 2014. These attackers use the infected apps to gain entry to the enterprise in order to compromise its most treasured information.

Don’t assume that BYOD security tools are keeping enterprise data safe from the effects of these fictitious apps. The business should not trust that perimeter security is doing the job either. It takes a combination of approaches and resources to thwart cloned mobile apps, and even then the enterprise will never be bulletproof. [See examples of cloned apps in our slideshow]

Follow CSO on a journey from the point of app innocence lost to network infiltration and data compromise, winding up with methods to defend against the mutated mobile monsters that these hoodlums hack and deploy.

To continue reading this article register now

SUBSCRIBE! Get the best of CSO delivered to your email inbox.