AI Is Creating New Mobile Scamming Threats   

McAfee's  latest Consumer Mobile Threat Report  details key global trends in mobile threats and scams to be aware of, and how to protect against them. In particular McAfee are worried about the potentially game-changing Artificial Intelligence (AI)  applications like as OpenAI’s ChatGPT chatbot and DALL-E 2 image generator. 

These provide powerful AI tools to the mass market, creating exciting opportunities for innovation and productivity, but also provide the same major opportunities to cyber criminals. 

McAfee's latest report focuses on how cyber criminals are leveraging these tools to trick or defraud consumers in growing numbers as identified by McAfee’s Mobile Research team. A common theme throughout is the prevalence of malicious phone applications. “Our mobile devices are an essential part of our daily lives now more than ever. They allow us to access a wealth of information and entertainment and provide the freedom to be productive from almost anywhere,” says Steve Grobman, Chief Technology Officer, McAfee.  “Unfortunately, they also provide cyber criminals with greater access to potential victims. By sharing insights from McAfee’s Threat Research Team, we are empowering our customers to freely and safely enjoy their digital lives.” 

Malicious apps tend to fall into a few categories, things that are popular, easy to use, and seemingly harmless. Many malicious apps deliver some legitimate functionality, but just because a free app works, doesn’t mean that it’s not hiding ulterior motives. Criminals often use encryption to hide their malicious code from reviewers, or they build in a delay, so the bad stuff doesn’t show up until the app is published in the app store.

OpenAI’s new AI image generator, DALL-E 2, ushered in a wave of AI-based mobile applications that could create artistic images based on photos. While some of these apps are legitimate, others may be malicious apps looking to capitalise on recent AI trends.  The report details how cyber criminals are leveraging malicious apps by:

Sliding into your DMs:    6.2% of threats that McAfee identified on Google during 2022 were in the "Communication" category, mainly malware masqueraded as SMS apps. But even legitimate communication apps can create an opportunity for scammers. They will use fraudulent messages to trick consumers into clicking on a malicious link, trying to get them to share login credentials, account numbers, or personal information. 

While these messages sometimes contain spelling or grammar errors or use odd phrasing, the emergence of AI tools like ChatGPT can help scammers clean up their spelling and grammar mistakes, making it tougher to spot scam messages by mistakes in the content. 

The severity of these Communication threats is also evident in the volume of adults (66%) who have been messaged by a stranger on social media, with 55% asked to transfer money. 

Taking advantage of Bring Your Own Device policies:    23% of threats that McAfee identified were in the "Tools" app category. Work-related apps for mobile devices are great productivity boosters, categories like PDF editors, VPNs, messaging managers, document scanners, battery boosters, and memory cleaners. These types of apps are targeted for malware because people expect the app to require permissions on their phone.

Asking for permissions to storage, messaging, calendars, contacts, location, and even system settings is not unusual and enables the scammers to retrieve all sorts of work-related information. 

Targeting teens and tween gamers with phones:    9% of threats that McAfee identified were Games from app categories such as Casual, Arcade and Action. Malicious apps often target things that children and teens like, such as gaming, making videos, and managing social media. The most common types of threats detected within the gaming category in 2022 were aggressive adware - apps that display excessive advertisements while using the app and even when you're not using it.

 It’s important to make sure that kids’ phones are either restricted from downloading new apps, or that they’re informed and capable of questioning suspicious apps and identifying fraudulent ones.

McAfee’s Mobile Research team recommends the following tactics: 

  • Be suspicious of unsolicited emails, texts, or direct messages and think twice before you click on any links.
  • Remember that most of these scams work because the scammer creates a false sense of urgency or preys on a heightened emotional state. Pause before you rush to interact with any message that is threatening or urgent, especially if it is from an unknown or unlikely sender.
  • Ensure that your mobile device is protected with security solutions that includes features to monitor and block potentially malicious links.

The report also reveals the top mobile malware groups (also referred to as families or types) McAfee identified in 2022, and predictions for the year ahead and repeats the  golden rule - If it’s too good to be true, it probably is

You Might Also Read: 

Cyber Security Issues For The Mobile Industry:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Hackers Have Already Cost Medibank $26m
US Federal Agency Hacked  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

ClearSale (CLSA3)

ClearSale (CLSA3)

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs.