Could you describe the evolving threat of the Legacy Native (LeNa) malware to Android devices, particularly now...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
that the newest version affects non-rooted Android devices? How can users whose devices don't receive the latest Android updates protect themselves from LeNa malware?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
In a blog post, Lookout Mobile Security provides some details about the LeNa malware and some potential steps Android users can take to protect their phones. The LeNa malware first uses the Gingerbreak exploit to root the phone and then the malware takes over the phone. So far, LeNa malware has only been detected on non-Google application stores. However, it is only a matter of time before attackers create malware that infects and controls a large number of smartphones in a similar manner as desktops. Smartphone OSes are generally more secure than desktop OSes, but even the most secure systems can be compromised.
One of the challenges associated with protecting smartphones against malware is that the carriers control a large part of the update process and may not deploy updates. In this case, third-party security applications can help reduce the risk of malware infection. Still, carriers should be pressured to deploy updates on a regular and reasonable schedule. Android mobile device users have many of the same preconceived notions as Mac users regarding security, namely that their devices won't be infected by the likes of the LeNa malware or have other security issues. If Google continues to strengthen the security of the Android ecosystem, the risks evolving from this expectation will be effectively reduced.
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Nick Lewis
The new Trochilus RAT can avoid detection in cyberespionage attacks. Expert Nick Lewis explains how it works, and if enterprises need to adapt their ...continue reading
The Asacub Trojan has new banking malware features. Expert Nick Lewis explains how it made this transition and what enterprises should be watching ...continue reading
BlackEnergy malware may have been part of the attacks on Ukrainian utility and media companies. Expert Nick Lewis explains how this malware works and...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.