Aggravation of Mobile Banking Trojan in Android Platform and its Mitigation Techniques

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-8
Year of Publication : 2019
Authors : Rincy Raphael
  10.14445/22312803/IJCTT-V67I8P113

MLA

MLA Style:Rincy Raphael"Aggravation of Mobile Banking Trojan in Android Platform and its Mitigation Techniques" International Journal of Engineering Trends and Technology 67.8 (2019):75-80.

APA Style Rincy Raphael. Aggravation of Mobile Banking Trojan in Android Platform and its Mitigation TechniquesInternational Journal of Engineering Trends and Technology, 67(8),75-80.

Abstract
As mobile banking and online banking services grow, the threat actors’ interest in exploiting mobile platforms is also spreading. According to experts in data protection services, hackers have recently tried to develop banking malware capable of exploiting security vulnerabilities in the implementation of these services, increasingly widespread. This paper is reviewing the mobile malware threats and some measures that can strengthen the security of the user against mobile banking malware.

Reference
[1] H. Wang, Z. Liu, Y. Guo, X. Chen, M. Zhang, G. Xu, and J. Hong, “An explorative study of the mobile app ecosystem from app developers’ perspective,” in Proceedings of the 26th International Conference on World Wide Web (WWW 2017), pp. 163–172.
[2] K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “Pscout: Analyzing the android permission specification,” in CCS 2012, pp. 217–228.
[3] H. Wang, J. I. Hong, and Y. Guo, “Using text mining to infer the purpose of permission use in mobile apps,” in The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015), pp. 1107–1118.
[4] P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild,” in Proceedings of SPSM 2011, pp. 3–14.
[5] R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Investigating user privacy in Android ad libraries,” in MoST 2012.
[6] N. Viennot, E. Garcia, and J. Nieh, “A measurement study of google play,” SIGMETRICS Perform. Eval. Rev., vol. 42, no. 1, pp. 221–233, Jun. 2014.
[7] H. Wang, H. Li, L. Li, Y. Guo, and G. Xu, “Why are Android apps removed from google play? a large-scale empirical study,” in 15th International Conference on Mining Software Repositories (MSR 2018).
[8] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets,” Proc. 19th Annu. Netw. Distrib. Syst. Secur. Symp., no. 2, pp. 5–8, 2012.
[9] “Riskware | Internet Security Threats.” [Online]. Available: http://usa.kaspersky.com/internet-security-center/threats/riskware#.Vm-5IUp97IU. [Accessed: 15-Dec-2015].
[10] “Android.Fakedefender.B | Symantec.” [Online]. Available: https://www.symantec.com/security_response/writeup.jsp?docid=2013-091013-3953-99. [Accessed: 15-Dec-2018].
[11] “2018 malware forecast: the onward march of android malware,”https://nakedsecurity.sophos.com/2017/11/07/2018-malware-forecastthe-onward-march-of-android-malware/, 2018.
[12] “contagio mobile: Backdoor.AndroidOS.Obad.a.” [Online]. Available: http://contagiominidump.blogspot.in/2013/06/backdoorandroidosobada.html. [Accessed: 28-Oct-2015].
[13] “Number of available Android applications - AppBrain.” [Online]. Available: http://www.appbrain.com/stats/number-of-android-apps. [Accessed: 28-Oct-2015].
[14] “Gartner Says Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in 2013.” [Online]. Available: http://www.gartner.com/newsroom/id/2665715. [Accessed: 28-Oct-2015].
[15] “Eric Schmidt: „There Are Now 1.3 Million Android Device Activations Per Day.‟” [Online]. Available: http://techcrunch.com/2012/09/05/eric-schmidt-there-are-now-1-3-million-android-device-activations-per-day/. [Accessed: 28-Oct-2015].
[16] C. a Castillo, “Android Malware Past, Present , and Future,” McAfee White Pap. Mob. Secur. Work. Gr., pp. 1–28, 2011
[17] You and K. Yim, “Malware obfuscation techniques: A brief survey,” Proc. - 2010 Int. Conf. Broadband, Wirel. Comput. Commun. Appl. BWCCA 2010, pp. 297–300, 2010.
[18] W. Enck, D. Octeau, and P. Mcdaniel, “A Study of Android Application Security,” no. August, 2011.
[19] F. Wu, H. Narang, and D. Clarke, “An Overview of Mobile Malware and Solutions,” J. Comput. Commun., vol. 2, no. 2, pp. 8–17, 2014.
[20] “Trojan: Android/DroidKungFu.C Description | F-Secure Labs.” [Online]. Available: https://www.f-secure.com/v-descs/trojan_android_droidkungfu_c.shtml. [Accessed: 15-Dec-2015].
[21] R. Raveendranath, V. Rajamani, A. J. Babu, and S. K. Datta, “Android malware attacks and countermeasures: Current and future directions,” 2014 Int. Conf. Control. Instrumentation, Commun. Comput. Technol., pp. 137–143, 2014.
[22] “Mobile Banking Trojans on Android OS”, https://www.computerworld.com/article/2475964/98--of-mobile-malware-targets-android-platform.html [Accessed: 27-Nov-2018].
[23] “McAfee Mobile Thread Report 2019”, https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2019.pdf [Accessed: 12-July-2019].
[24] “Dr. Web Anti-Virus”, https://news.drweb.com/show/review/?lng=en &i=13278, [Accessed:4-March-2019].

Keywords
Mobile Banking, Banking Trojan, Android Malware Trojan.