
{"id":2114,"date":"2012-10-25T00:00:00","date_gmt":"2012-10-25T00:00:00","guid":{"rendered":"http:\/\/otava.test\/latest-federal-mobile-malware-report\/"},"modified":"2025-11-07T06:40:03","modified_gmt":"2025-11-07T06:40:03","slug":"latest-federal-mobile-malware-report","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/","title":{"rendered":"Latest Federal Mobile Malware Report"},"content":{"rendered":"<p>The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), recently released a report on the latest versions of mobile malware to affect Android smartphones.<\/p>\n<p>Two versions of the most recently discovered malware are called Loozfon and FinFisher. Loozfon has been seen in the form of a link in an email about work-at-home opportunities, promising compensation for sending the email. The link in the advertisement allows the malicious application to steal contact information from the user&#8217;s phone and address book.<\/p>\n<p>FinFisher is spyware that can be remotely contolled and monitored after installed on the mobile device. Users that click on a certain link or open a text message that appears to be a system update can be exposed to FinFisher.<\/p>\n<p>IC3.gov offers smartphone safety tips:<\/p>\n<ul>\n<li>Turn off any features or default settings that aren&#8217;t needed and may minimize the attack surface of the device.<\/li>\n<li>Check to see if your phone&#8217;s operating system has encryption available to protect personal data.<\/li>\n<li>Check reviews of applications before downloading to ensure they&#8217;re legit. Also carefully read the permissions you&#8217;re allowing the application when you download them.<\/li>\n<li>In addition to applying a passcode, use the screen lock feature to secure it after a few minutes of inactivity.<\/li>\n<li>Don&#8217;t connect to unknown wireless networks.<\/li>\n<li>Wipe your device before selling or trading it in.<\/li>\n<li>Update your smartphone frequently to protect against known security vulnerabilities.<\/li>\n<li>Don&#8217;t click on or download software or links from unknown sources.<\/li>\n<\/ul>\n<p>One of the best tips may be to limit risk by storing sensitive data on a secure network, and not directly on a device. If your organization needs to meet compliance requirements, find out what a <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data center<\/a> or <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center <\/a>should entail.<\/p>\n<p>Read the following mobile security blog posts for more information technology tips:<\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/recommendations-for-mobile-health-it-advancement\/\">Recommendations for Mobile Health IT Advancement<\/a><\/em><\/strong><br \/>\nIn June, the FCC (Federal Communications Commission) created a mHealth Task Force from a group of the nation\u2019s leading mobile healthcare IT industry, including government and academic experts, according to a recent press release. This group generated a report with \u2026\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/recommendations-for-mobile-health-it-advancement\/\">Continue reading\u00a0\u2192<\/a><\/p>\n<p><em><strong><a title=\"Permalink to Online Tech Exhibits at 2012 mHealth Summit in Washington, D.C.\" href=\"https:\/\/otavawebsite.wpengine.com\/blog\/online-tech-exhibits-at-2012-mhealth-summit-in-washington-d-c\/\" rel=\"bookmark\">Online Tech Exhibits at 2012 mHealth Summit in Washington, D.C.<\/a><\/strong><\/em><br \/>\nOnline Tech will be attending and exhibiting at the 2012 mHealth Summit held in Washington, DC from December 3-5. Hosted at the Gaylord National Resort and Convention Center, the conference will (from mHealthSummit.org): Provide networking opportunities with leading-edge and c-level \u2026\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/online-tech-exhibits-at-2012-mhealth-summit-in-washington-d-c\/\">Continue reading\u00a0\u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/pci-mobile-payment-security-recommendations-released-by-pci-ssc\/\">PCI Mobile Payment Security Recommendations Released by PCI SSC<\/a><\/strong><\/em><br \/>\nThe PCI SSC (Payment Card Industry Security Standards Council) just released a document addressing mobile device (smartphone, tablet or PDA) payments, PCI Mobile Payment Acceptance Security Guidelines, version 1.0. Three major risks associated with mobile payment transactions include: Account data \u2026\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/pci-mobile-payment-security-recommendations-released-by-pci-ssc\/\">Continue reading\u00a0\u2192<\/a><\/p>\n<p><em><strong><a title=\"Permalink to The Latest IT Security Stats: Are You At Risk?\" href=\"https:\/\/otavawebsite.wpengine.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\" rel=\"bookmark\">The Latest IT Security Stats: Are You At Risk?<\/a><\/strong><\/em><br \/>\nSymantec\u2019s now infamous 2011 Internet Security Threat Report is packed full of who, why, where and how when it comes to online attacks in the past year. Published in April 2012, the document highlights the latest trends in Internet security. \u2026<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\">Continue reading\u00a0\u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.ic3.gov\/media\/2012\/121012.aspx\">Smartphone Users Should Be Aware of Malware Trageting Mobile Devices and Safety Measures To Help Avoid Compromise<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), recently released a report on the latest versions of mobile malware to affect Android smartphones. Two versions of the most recently discovered malware are called Loozfon and FinFisher. Loozfon has been seen in the form of a link in an email about work-at-home opportunities, promising compensation for sending the email. The link in the advertisement allows the malicious application to steal contact information from the user&#8217;s phone and address book. FinFisher is spyware that can be remotely contolled and monitored after installed on the mobile device. Users that click on a certain link or open a text message that appears to be a system update can be exposed to FinFisher. IC3.gov offers smartphone safety tips: Turn off any features or default settings that aren&#8217;t needed and may minimize the attack surface of the device. Check to see if your phone&#8217;s operating system has encryption available to protect personal data. Check reviews of applications before downloading to ensure they&#8217;re legit. Also carefully read the permissions you&#8217;re allowing the application when you download them. In addition to applying a&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2114","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Latest Federal Mobile Malware Report | OTAVA<\/title>\n<meta name=\"description\" content=\"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest Federal Mobile Malware Report\" \/>\n<meta property=\"og:description\" content=\"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-25T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T06:40:03+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Latest Federal Mobile Malware Report\",\"datePublished\":\"2012-10-25T00:00:00+00:00\",\"dateModified\":\"2025-11-07T06:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\"},\"wordCount\":543,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\",\"url\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\",\"name\":\"Latest Federal Mobile Malware Report | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2012-10-25T00:00:00+00:00\",\"dateModified\":\"2025-11-07T06:40:03+00:00\",\"description\":\"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest Federal Mobile Malware Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Latest Federal Mobile Malware Report | OTAVA","description":"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/","og_locale":"en_US","og_type":"article","og_title":"Latest Federal Mobile Malware Report","og_description":"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.","og_url":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/","og_site_name":"OTAVA","article_published_time":"2012-10-25T00:00:00+00:00","article_modified_time":"2025-11-07T06:40:03+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Latest Federal Mobile Malware Report","datePublished":"2012-10-25T00:00:00+00:00","dateModified":"2025-11-07T06:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/"},"wordCount":543,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/","url":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/","name":"Latest Federal Mobile Malware Report | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2012-10-25T00:00:00+00:00","dateModified":"2025-11-07T06:40:03+00:00","description":"Read the latest federal report on mobile-malware threats and find out what your organization must do to stay secure.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/latest-federal-mobile-malware-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Latest Federal Mobile Malware Report"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2114"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}