Motive Security Labs Malware Reports

Solutions

Motive Security Labs Malware Reports

Motive® Security Labs is a team of experts in security, mobile and fixed networks as well as IT. Formerly known as Kindsight Security Labs, this team leverages its extensive experience to provide insights and analysis relating to the latest trends in security, attacks, and malware infections. Its work helps our customers and the industry to understand and solve the problems created by malware.


Periodic reports

Nokia Threat Intelligence Report – H2 2015

3/2/2016 - Nokia malware report shows smartphones now account for 60% of infections in the mobile network .

View the report


Motive Security Labs Malware Report – H1 2015

9/15/2015 - Twice each year, Motive Security Labs issues a Malware Report based on the aggregate data from its Motive Security Guardian deployments in mobile and fixed networks supporting over 100 million devices.

View the report


Motive Security Labs Malware Report – H2 2014

2/11/2015 - Mobile spyware is definitely on the increase. Six of the mobile malware top 20 list are mobile spyware. These are apps that are used to spy on the phone’s owner.

View the report


Kindsight Security Labs Malware Report – H1 2014

9/4/2014 - General trends and statistics for malware infections in devices connected through mobile and fixed networks. The data in this report is aggregated across the networks where Kindsight network-based malware detection solutions are deployed.

View the report


Kindsight Malware Report – Q4 2013

1/29/2014 - The analysis of malware trends in 2013 showed a 20% increase in mobile infections. The report also highlights the number of mobile malware samples experienced, the residential infection rate in fixed networks, and the impact to broadband residential customers.

View the report


Kindsight Malware Report – Q3 2013

11/12/2013 - Analysis of malware trends for Q3 2013, including a 10% infection rate increase over the previous quarter. The report highlights the quarter’s top security threats, including ZeroAccess, Alureon, Zeus/Zbot, Uapush and QdPlugin

View the report


Kindsight Malware Report – Q2 2013

07/23/2013 - Analysis of malware trends for Q2 2013, including an 11% infection rate increase over the previous quarter The report highlights the quarter’s top security threats, including ZeroAccess2, Alureon, Zeus/Zbot, Uapush and QdPlugin.

View the report


Kindsight Malware Report – Q4 2012

02/12/2013 - Analysis of malware trends for Q4 2012, including declining home network infections and increasing mobile network infections. The report highlights the quarter’s top security threats, including ZeroAccess, TDSS, Alureon, AgentTK and the Zeus banking Trojan.

View the report


Kindsight Malware Report – Q3 2012

10/29/2012 - Analysis of malware trends for Q3 2012, including a dip in global infection rates. The report examines infection methods and highlights the quarter’s top security threats, including ZeroAccess, the TDSS/Alureon family, ad-click fraud and mobile adware.

View the report


PREVIOUS REPORTS

In-depth reports

Mobile malware: A network view

6/18/2015 - This paper is based on a presentation given at the Black Hat Mobile Security Summit held in London in June 2015.

View the report


NotCompatible – Android Web Proxy Bot

1/24/2014 - Sometimes a new malware looks familiar and reminds the Kindsight Security team of something that it’s seen before. That’s the case of the NotCompatible botnet, which was discovered in 2012, but really burst onto the mobile malware scene in 2013 to become one of the year’s top mobile threats.

View the report


Googost.A – The Hello Proxy

1/7/2014 - Malware comes in a variety of forms depending on what hackers are trying to achieve. In 2013, botnets were among the top infectors of home devices. A botnet refers to a network of infected computers that are controlled remotely via the Internet by cybercriminals. Botnets are used for sending spam email, ad click fraud, distributed denial and service attacks, distributing additional malware, bitcoin mining and other purposes.

View the report


New C&C Protocol for ZeroAccess/Sirefef Botnet

06/28/2012 - Analysis of a new variation of the command and control protocol used by the ZeroAccess/Sirefef bot.

View the report


Encrypted p2p C&C for ZeroAccess/Sirefef Botnet

02/28/2012 - Analysis of an encrypted p2p command and control protocol used by malware identified as ZeroAccess, Sirefef, Vobfus and many other names.

View the report


Geinimi Trojan for AndroidOS

11/18/2011 - Analysis of a variant of the Geinimi Trojan that intercepts personal data from Android users and executes commands on their devices.

View the report


PREVIOUS REPORTS

Related solutions