Mobile Malware and Privacy

  1. Mobile Attack Vectors and Infection Methods
    1. Application-Based Vectors
      1. Malicious Apps in Official Stores
        1. Bypassing Store Security
          1. Social Engineering in App Descriptions
            1. Fake Developer Accounts
            2. Repackaged Legitimate Apps
              1. Insertion of Malicious Code
                1. Distribution Channels
                  1. Version Confusion Attacks
                  2. Third-Party App Stores
                    1. Risks and Prevalence
                      1. Lack of Vetting Processes
                        1. Regional Variations
                        2. Sideloading
                          1. Enabling Unknown Sources
                            1. Risks of Manual Installation
                              1. Enterprise App Distribution Abuse
                            2. Web-Based Vectors
                              1. Drive-by Downloads
                                1. Exploit Kits
                                  1. Automatic Downloads
                                    1. Browser Vulnerabilities
                                    2. Phishing
                                      1. Email Phishing
                                        1. Website Phishing
                                          1. Mobile-Optimized Phishing
                                          2. Smishing
                                            1. Social Engineering via Text
                                              1. Fake Service Notifications
                                              2. Malvertising
                                                1. Malicious Advertisements
                                                  1. Redirection to Exploit Sites
                                                    1. In-App Advertisement Abuse
                                                  2. Network-Based Vectors
                                                    1. Man-in-the-Middle Attacks
                                                      1. Traffic Interception
                                                        1. Data Manipulation
                                                          1. Certificate Spoofing
                                                          2. Rogue Wi-Fi Access Points
                                                            1. Evil Twin Attacks
                                                              1. Data Interception
                                                                1. Captive Portal Abuse
                                                                2. DNS Spoofing
                                                                  1. Traffic Redirection
                                                                    1. Phishing via DNS Manipulation
                                                                      1. Cache Poisoning
                                                                      2. Bluetooth Attacks
                                                                        1. BlueBorne Exploits
                                                                          1. Proximity-Based Attacks
                                                                            1. Device Pairing Abuse
                                                                          2. Social Engineering
                                                                            1. Pretexting
                                                                              1. Impersonation of Trusted Entities
                                                                                1. Authority-Based Deception
                                                                                2. Scareware Tactics
                                                                                  1. Fake Security Alerts
                                                                                    1. Urgency and Fear Inducement
                                                                                      1. Tech Support Scams
                                                                                      2. Baiting
                                                                                        1. Malicious QR Codes
                                                                                          1. Fake Software Updates
                                                                                        2. Physical Access Vectors
                                                                                          1. Direct Installation
                                                                                            1. Device Theft
                                                                                              1. Insider Threats
                                                                                                1. Physical Tampering
                                                                                                2. USB-based Attacks
                                                                                                  1. Juice Jacking
                                                                                                    1. Data Theft via Charging Ports
                                                                                                      1. Malware Installation via USB
                                                                                                      2. Near Field Communication Abuse
                                                                                                        1. Proximity-Based Attacks
                                                                                                          1. Payment System Exploitation
                                                                                                        2. Exploitation of System Vulnerabilities
                                                                                                          1. Operating System Flaws
                                                                                                            1. Privilege Escalation
                                                                                                              1. Remote Code Execution
                                                                                                                1. Memory Corruption
                                                                                                                2. Application Vulnerabilities
                                                                                                                  1. Insecure Coding Practices
                                                                                                                    1. Unpatched Applications
                                                                                                                      1. Third-Party Library Flaws
                                                                                                                      2. Zero-Day Exploits
                                                                                                                        1. Discovery and Weaponization
                                                                                                                          1. Impact Assessment
                                                                                                                            1. Response Strategies