APTs, including a range of nation-state groups operating in China, North Korea, Pakistan and Russia, are shifting their malware development focus to target mobile users for intelligence gathering, financial gain and disruption of national rivals.
That’s according to CrowdStrike’s Mobile Threat Landscape Report, which found that targeted adversary groups continue to develop sophisticated mobile malware variants, typically as offshoots of established desktop malware families.
“A number of targeted intrusion adversaries have begun developing mobile malware as part of their overall operational tool kit,” according to the report, released Tuesday. “Often these implementations are mobile ports of malware originally developed for desktop computers, and therefore share commonalities, including general capabilities and C2 protocols.”
Leave a reply