Threat Category: Malicious or privacy-invasive application
Threat Description: DDoS attacks are generally more effective with a greater number of systems an attacker can control. As many DDoS attack techniques only require a given participant to generate a small amount of network traffic, such as a spoofed DNS query used in a reflection attack, they can be easily generated from a mobile device. Given the high volume of these devices, the ability for an attacker to compromise a large number in a short time with trojan apps, and their potential to launch attacks from multiple networks (e.g., Wi-Fi and celluar connections, ) they are likely intermediary targets in DDoS campaigns.
Not Applicable, See Exploit or CVE Examples
To reduce the risk of installing apps with trojan functionality, only download apps from official app stores.
Use malware detection apps that identify malware by anomalous network activity.Enterprise
Use malware detection apps that identify malware by anomalous network activity.
T. Katsuki, “Android.Tascudap”, Symantec; www.symantec.com/security_response/writeup.jsp?docid=2012-121312-4547-99 [accessed 01/05/2017] ↩