You are here: Home » Technology » News
Business Standard

143 million Windows malware hit consumer smart devices in Q2: Report

More than 143 million malware targeted consumer smart-devices in the second quarter of 2020, mainly in the form of coronavirus-themed attacks, a new report said

Malware | Smart devices | Windows 10

IANS  |  New Delhi 

Representative image
Representative image

More than 143 million targeted consumer smart-devices in the second quarter of 2020, mainly in the form of coronavirus-themed attacks, a new report said on Tuesday.

Among the top scams that were reported during the April-June period were free Netflix subscriptions and fraud PM CARE Fund apps.

The month of June clocked the highest detections of Windows with 1.5 million daily detections due to the opening up of businesses under the unlock phase.

According to researchers at cybersecurity firm Quick Heal, attackers are still using COVID-19 as bait to drop malicious payloads to consumer devices, usually in the form of phishing emails that contain infected attachments.

"In the same category, 'Trickbot' proved to be an active distributor for multiple through phishing emails," Quick Heal's 'Quarterly Threat Report' revealed.

The report also indicated the emergence of new SMB exploits that allow attackers to take charge of the victim's machine or crash any system in the network.

Malware clocked 38 per cent of the total Android detections in Q2.

"Android.Bruad.A" topped the list of top 10 Android malware with 32 per cent detections.

The researchers found various malicious applications that looked 100 per cent authentic and infected consumer mobile phones by injecting malicious information.

Among these apps, the fake 'Aarogya Setu' app took the lead with more and more people downloading it to gain awareness around Covid-19 cases and info.

In the banking domain, "Eventbot" appeared to be a dangerous mobile Trojan that hacks into phones' in-built accessibility and steals data by reading into SMSs, banking PINs, etc.

"Interestingly, this trojan bypasses even the two-factor authentication process that most banking apps offer to ensure security," said the report.

Maximum malware detection was done using Network Security Scan, an in-house feature of Quick Heal that identifies cyberattacks and stops the malicious payloads from entering consumer devices.



(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Tue, September 08 2020. 11:22 IST