ZS Zscaler Inc.

Zscaler Identifies More Than 200 Malicious Apps in the Google Play Store, with Over 8 Million Installs

Zscaler Identifies More Than 200 Malicious Apps in the Google Play Store, with Over 8 Million Installs

Annual ThreatLabz Report Highlights Mobile, IoT, and OT Cybersecurity Trends, Risks, and Prescriptive Zero Trust Defense Strategies

Key Findings:

  • Mobile remains a top threat vector, with 111% growth in spyware and 29% growth in banking malware
  • Technology, education, and manufacturing sectors continue to be most susceptible to attacks
  • The United States remains the top target for IoT, OT, and mobile cybersecurity attacks

SAN JOSE, Calif., Oct. 15, 2024 (GLOBE NEWSWIRE) -- (NASDAQ: ZS), the leader in cloud security, today published its , which offers an overview of the mobile and IoT/OT cyber threat landscape from June 2023 through May 2024. The findings in this report stress the urgency for organizations to reevaluate and secure mobile devices, IoT devices and OT systems. ThreatLabz identified more than 200 malicious apps in the Google Play Store, with more than 8 million collective installs, and the Zscaler cloud blocked 45% more IoT malware transactions than last year–indicative of botnets continuing to proliferate across IoT devices.

"Cybercriminals are increasingly targeting legacy exposed assets which often act as a beachhead to IoT & OT environments, resulting in data breaches and ransomware attacks," said Deepen Desai, Chief Security Officer at Zscaler. "Mobile malware and AI driven vishing attacks adds to that list making it critical for CISOs and CIOs to prioritize an AI powered zero trust solution to shut down attack vectors of all kinds safeguarding against these attacks."

Financially motivated mobile attacks remain a top threat vector

With 29% growth in banking malware attacks and a 111% rise in spyware year over year, cyberattacks have never been more profitable for threat actors, either through monetary gain via direct extortion or passthrough use of stolen personally identifiable information (PII) and user credentials that can be sold and leveraged in future attacks.

, a known Android banking malware that uses PDF and QR code readers to distribute malware, has targeted more than 650 financial institutions, and more specifically, users in Germany, Spain, Finland, South Korea and Singapore.

Verticals most targeted by bad actors

The technology (18%), education (18%) and manufacturing (14%) sectors are the most frequent targets of mobile malware. Education in particular saw a dramatic 136% increase in blocked transactions compared to the previous year.

Additionally, for the second year in a row, manufacturing experienced the highest volume of IoT malware attacks, accounting for 36% of all IoT malware blocks observed on the . When analyzing unique devices across different verticals, this sector stands out with the highest implementation of IoT devices due to its extensive use of IoT applications, ranging from automation and process monitoring to supply chain management.

The United States remains the top target for IoT cyberattacks

With its central role in global communication and data processes, the US also stands out as the primary destination for IoT device traffic, accounting for 81% of IoT cyberattacks. The top five countries that receive the most IoT traffic are:

  • United States
  • Japan
  • China
  • Singapore
  • Germany

The report also revealed that India (28%) is now the country most targeted by mobile malware. The other four are:

  • United States
  • Canada
  • South Africa
  • The Netherlands

Legacy and end-of-life operating systems leave OT systems vulnerable

Once air-gapped and isolated from the internet, OT and cyber-physical systems have rapidly become integrated into enterprise networks, enabling threats to proliferate. OT deployments can involve thousands of connected devices spread across dozens of sites, creating a substantial attack surface for external threats, such as those that exploit known zero-day vulnerabilities. Additionally, this also creates a large attack surface between internal (east-west) OT traffic, increasing the risk of lateral movement and the potential blast radius of a successful attack.

How to secure mobile, IoT and OT

With today’s hybrid-work environments, users can work from anywhere with internet access, SaaS apps and private applications, whether in the cloud or the data center. To enable secure hybrid work and provide seamless access to any application, enterprises need to retire network-centric approaches, which hamper productivity and leave them vulnerable to lateral movement. Instead, organizations must adopt a zero trust architecture that enables secure remote access from any user device to any application, from any location.

enables enterprises to reduce cyber risk while embracing IoT and OT connectivity to drive business agility and increase productivity. Powered by the Zero Trust Exchange, these capabilities protect IoT devices against compromise and prevent lateral movement with device segmentation and deception–all while allowing for remote access to OT systems without risky VPN connectivity.

The findings of the 2024 Mobile, IoT, and OT Threat Report stress the need for organizations to better secure their mobile endpoints, IoT devices, and OT systems. Download the full report .

Research Methodology

The Zscaler ThreatLabz team analyzed a data set collected from the Zscaler Security Cloud between June 2023 and May 2024, comprising more than 20 billion threat-related mobile transactions and associated cyberthreats.

About Zscaler

Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange™ platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SSE-based Zero Trust Exchange is the world’s largest in-line cloud security platform.

Media Contact:



Zscaler PR

Natalia Wodecki

A photo accompanying this announcement is available at



EN
15/10/2024

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Zscaler Inc.

 PRESS RELEASE

Zscaler Introduces Innovations in Intelligent Segmentation to Extend Z...

Zscaler Introduces Innovations in Intelligent Segmentation to Extend Zero Trust to Branches, Factories and Clouds New Solution Prevents Lateral Movement from Ransomware Attacks, Cutting Firewall and Infrastructure Spend in Half SAN JOSE, Calif., Nov. 12, 2024 (GLOBE NEWSWIRE) -- (NASDAQ: ZS), the leader in cloud security, today announced the industry’s first Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public cloud...

 PRESS RELEASE

Zscaler to Host First Quarter Fiscal Year 2025 Earnings Conference Cal...

Zscaler to Host First Quarter Fiscal Year 2025 Earnings Conference Call Earnings Results to be Released on Monday, December 2, After the Close of the Market SAN JOSE, Calif., Nov. 07, 2024 (GLOBE NEWSWIRE) -- Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, will release first quarter fiscal year 2025 earnings after the market closes on Monday, December 2, 2024. The company will host an investor conference call that day at 1:30 p.m. Pacific time (4:30 p.m. Eastern time) to discuss the results. Date:Monday, December 2, 2024Time:1:30 p.m. PTWebcast:Dial-in:To join by phone, r...

 PRESS RELEASE

Zscaler and Okta Enhance Enterprise Cybersecurity with New Zero Trust ...

Zscaler and Okta Enhance Enterprise Cybersecurity with New Zero Trust Integrations Expanded Offerings Improve Security Posturing and Provide Strong Defenses Against Identity-Based Threats LAS VEGAS, Oct. 15, 2024 (GLOBE NEWSWIRE) -- Today at Oktane2024, Zscaler and Okta announced four new integrations designed to accelerate their mutual customers' zero trust transformation. By delivering end-to-end, context-aware security, Okta and Zscaler are helping customers reduce risk, improve the user experience, and enable cross-domain response through shared telemetry and threat intelligence. ...

 PRESS RELEASE

Zscaler Identifies More Than 200 Malicious Apps in the Google Play Sto...

Zscaler Identifies More Than 200 Malicious Apps in the Google Play Store, with Over 8 Million Installs Annual ThreatLabz Report Highlights Mobile, IoT, and OT Cybersecurity Trends, Risks, and Prescriptive Zero Trust Defense Strategies Key Findings: Mobile remains a top threat vector, with 111% growth in spyware and 29% growth in banking malwareTechnology, education, and manufacturing sectors continue to be most susceptible to attacksThe United States remains the top target for IoT, OT, and mobile cybersecurity attacks SAN JOSE, Calif., Oct. 15, 2024 (GLOBE NEWSWIRE) -- (NASDAQ: Z...

Wedbush Research
  • Wedbush Research

ResearchPool Subscriptions

Get the most out of your insights

Get in touch