New Report: mRATs Caught in the Enterprise

With the number of high-profile mobile threats and vulnerabilities like Operation Pawn Storm, xSSER mRAT, and Masque Attack growing, cybertheives are putting more focus on new ways to perform targeted attacks.

To help our customers better understand and quantify mobile threats in the enterprise, Lacoon Mobile Security, in collaboration with Check Point, conducted a research study. This study focused on commercial mobile surveillance kits, also known as Mobile Remote Access Trojans (mRATs). Many CISOs we have worked with view mRATS to be the mobile malware they are most concerned about from a risk and threat perspective.

When used maliciously, commercial mRATs enable attackers to steal sensitive information from a device. They can take control of the different sensors to execute keylogging, to steal messages, to turn on cameras, and more. Essentially, attackers can use mRATS to target an enterprise and extract critical business information from employee mobile devices — all without their knowledge.

Today, we released the results of our research in the report “Threat Research: Targeted Attacks on Enterprise Mobile.” This report explores the prevalence of infected mobile devices in the enterprise, and explains how this is a meaningful problem that needs to be addressed. Most importantly, for organizations in the US with 2,000 mobile devices or more, there is a 50% chance they will have 6 or more infected or targeted devices within their network today.

A summary of the report can be found in our infographic.

1430183348_Signal-128

To read the full results and learn more about mRATs and their impact on the enterprise, download the report

Threat Research: Targeted Attacks on Enterprise Mobile


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Please complete the equation to verify your submission. * Time limit is exhausted. Please reload the CAPTCHA.