It means that the number of Android user is rapidly increasing.
Actually the real damage case hasn't been reported in South Korea so far, however, it has great possibility to threat for foreigner user.
Therefore, users need to be careful on using this kind of applications.
2. Related information
Against the security threats especially on Android-based malicious file, INCA Internet has distributed Anti-Virus application for Android and given various information to public.
The trend of spreading technique of Android malicious file is continuously sophisticated and even delicate. The starting point of generating malicious file was for curious on certain atmosphere or for being proven certain concept; however, the aim for file can be easily diverted for malicious way.
On both quality and quantity, attacking technique is still evolving.
Step 1 is the data on victim's smartphone of anonymous user.
Step 2 is that its changing its for as a cybercrime for its purpose including inducing payment.
Finally, step 3 can be changed Zombie Phone for DDoS, chasing GPS, C&C Smart Server or even APT(Advance Persistent Threat).
* Status of collected malicious file and update.
Following graph is for our INCA Internet's 2011's collected files.
Based on graph, the number of samples had been rapidly increasing from Sep 2011 so far.
INCA Internet's nProtect Mobile for Android including detect and treat functions has been distributed free of charge.
Besides, Android phone users need to be careful on installation from being infected by malicious files.
While installing application, we recommend you use official market, check requiring permission, and submit file if suspicious. To use smartphone safely from security threats of these malicious applications, we recommend following tips "Smartphone security management tips" for general users.
INCA Internet (Security Response Center / Emergency Response Team) provides diagnosis/treatment function with “nProtect Mobile for Android” for mobile such as malicious file stated above and runs responding system against various security threats.