With the tools provided, participants set to work to try to find suspicious clues in an APK file. Once opened in the disassembly and decompilation software, the task requires not only agility but also "lynx eyes" and inquisitive spirit, as there are elements that at first glance may look like png files. but which are actually lines of malicious code.
A panorama of growing cyber threats
There are over two billion Android devices in the world, and according to Kaspersky, about 99% of threats found by experts target the operating system. As Sergey Novikov, Deputy Director of Kaspersky's Global Research & Analysis Team, demonstrated during the first session of the morning, the outlook is that the attacks continued not only to grow but to become more sophisticated.
According to Dimitri Galov, 35% of the threats found by the company fall into the Adware category, followed by the Trojan family of malicious software. In May this year, Kaspersky had already revealed that by 2018, the use of Trojan-Droppers grew from 8.63% to 17.21%. Malware is used to bypass system protection and deposit different types of malicious software: from banking trojans to ransomware.
The analyst points out that among the loudest cases of threats targeting the general public are ransomware attacks that forced the user to shell out large sums of money to unlock their device as well as banking malware. Not even the Play Store can be immune to the influence of hackers, as hackers are not only capable of creating seemingly harmless apps, but also almost faithful "copies" of legitimate apps that can deceive the most unwary users.
The picture is even worse when it comes to third-party application applications, explained Dimitri Galov. While the "open source universe" opens up many development possibilities, the ability to install software from third party sources makes users more vulnerable to malicious hackers. In addition to smartphones and tablets, certain web-connected devices, such as medical devices connected to the Internet, also use the Android operating system. Given the latest developments in cyber crime, protecting these devices is becoming a growing priority for the business.