Mobile Malware and Privacy

  1. Types of Mobile Malware
    1. Classification by Behavior
      1. Spyware
        1. Keystroke Loggers
          1. Screen Recorders
            1. Audio Surveillance
              1. Video Surveillance
                1. Location Tracking
                  1. Contact Harvesting
                  2. Adware
                    1. Aggressive Ad Injection
                      1. Browser Hijacking
                        1. Pop-up Generation
                          1. Click Fraud
                            1. Data Collection for Advertising
                            2. Ransomware
                              1. Screen-locking Ransomware
                                1. Crypto-Ransomware
                                  1. Data Destruction Ransomware
                                    1. Fake Ransomware
                                    2. Trojans
                                      1. Droppers
                                        1. Downloaders
                                          1. Fake Apps
                                            1. Remote Access Trojans
                                              1. Banking Trojans
                                              2. Viruses and Worms
                                                1. Self-Replication Mechanisms
                                                  1. Propagation Methods
                                                    1. Cross-Platform Spreading
                                                    2. Rootkits and Backdoors
                                                      1. Privilege Escalation
                                                        1. Persistent Access
                                                          1. System Modification
                                                          2. Botnets
                                                            1. Command and Control Integration
                                                              1. DDoS Participation
                                                                1. Cryptocurrency Mining
                                                                  1. Spam Distribution
                                                                2. Classification by Objective
                                                                  1. Financial Malware
                                                                    1. Banking Trojans
                                                                      1. Credential Stealers
                                                                        1. Payment Card Data Theft
                                                                          1. Cryptocurrency Theft
                                                                          2. Surveillanceware
                                                                            1. Covert Monitoring
                                                                              1. Data Exfiltration
                                                                                1. Stalkerware Applications
                                                                                2. Premium Service Abuse
                                                                                  1. SMS Fraud
                                                                                    1. Toll Fraud
                                                                                      1. Subscription Abuse
                                                                                        1. WAP Billing Fraud
                                                                                        2. Cryptominers
                                                                                          1. Unauthorized Cryptocurrency Mining
                                                                                            1. Resource Hijacking
                                                                                              1. Battery Drain Attacks
                                                                                              2. Data Theft Malware
                                                                                                1. Personal Data Harvesting
                                                                                                  1. Corporate Data Exfiltration
                                                                                                    1. Identity Theft Enablers
                                                                                                  2. Emerging Malware Categories
                                                                                                    1. AI-Powered Malware
                                                                                                      1. IoT-Targeting Mobile Malware
                                                                                                        1. Cross-Platform Threats