Nine Important Facts About Android Malware Risks

SMS Trojan Overall Malware Detection During the 12-month study period, more than 3.4 million malware detections were reported by Kaspersky Lab security products on devices owned by more than 1 million users. Increases Over Eight-Month Period From August 2013 to March 2014, the number of monthly malware attacks increased nearly tenfold. Starting at 69,000 detections […]

Written By: Maggie O'Neill
Oct 16, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

SMS Trojan

1 - Overall Malware DetectionOverall Malware Detection

During the 12-month study period, more than 3.4 million malware detections were reported by Kaspersky Lab security products on devices owned by more than 1 million users.

2 - Increases Over Eight-Month PeriodIncreases Over Eight-Month Period

From August 2013 to March 2014, the number of monthly malware attacks increased nearly tenfold. Starting at 69,000 detections in August, they reached a peak of 644,000 by March 2014.
 

3 - A Short Decline, but a Decline NonethelessA Short Decline, but a Decline Nonetheless

From April to July 2014, the number of detected malware attacks began falling, dropping to less than 300,000 incidents by July. During this four-month period, June had the fewest malware attacks with just 216,000 detected incidents.

4 - Distribution of Attacks--Russia, Not ForgottenDistribution of Attacks–Russia, Not Forgotten

52% of detected malware incidents occurred in Russia, but this was likely due to the fact that many users sending their data to Kaspersky resided in the country. Another factor is the widespread availability of mobile payment services available in the country.

5 - U.S. Not Left OutU.S. Not Left Out

Of the 15 top countries with the most reported malware attacks, the U.S. fell to 11th place, but only accounted for 1.13% of all detected attacks.

6 - The Most Active Malware TypesThe Most Active Malware Types

Of the 10 most widespread malware types, Trojan-Short Message Service (SMS) came in at the top, accounting for 57.08% of all attacks, followed by RiskTool programs, at 21.52%, and adware, at 7.37%.

7 - Top 10 Countries With Trojan-SMS AttacksTop 10 Countries With Trojan-SMS Attacks

More than 1.25 million Trojan-SMS attacks were reported in Russia, followed by 111,169 in Kazakhstan and 64,592 in the Ukraine. France placed last of the 10 with 25,729 detections, while the United Kingdom, Spain and Germany fell somewhere in between. The United States was not among the top 10 at all.

8 - Malware Made Just for Stealing MoneyMalware Made Just for Stealing Money

Malware created just for the purpose of stealing money, most often the Trojan-SMS and Trojan-banker types, accounted for 59.06% of all attacks and was found on the devices of nearly 50% of all users in the study.

9 - Trojan Modifications Alive and WellTrojan Modifications Alive and Well

During the 12-month study period, 452 modifications of 62 Trojans with SMS texting capabilities were detected on user devices.

Recommended for you...

Video: FNG on Seeing The Invisible With Wireless Surveys

Greg Upton of UK-based FNG describes the demand for wireless survey offerings from his business.

Katie Bavoso
Mar 27, 2024
How Qualcomm and Lenovo Plan to Solve Enterprises’ Apple Problem

Lenovo and Qualcomm are building laptops, tablets and smartphones to solve enterprises' reliance on a single vendor - Apple.

Rob Enderle
Dec 3, 2021
How The Semiconductor Shortage Happened – And When It Will Recover

The chip shortage has constrained manufacturing and caused product delays. Here's what to expect going forward. This week Huawei sponsored a panel of

Rob Enderle
May 20, 2021
How Are Endpoint Supply Chains Changing in 2021?

What's affecting the Endpoint Supply Chain for Channel Partners? And, why is Lenovo adding 5G to laptops? Learn more.

Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.