Could you describe the evolving threat of the Legacy Native (LeNa) malware to Android devices, particularly now...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
that the newest version affects non-rooted Android devices? How can users whose devices don't receive the latest Android updates protect themselves from LeNa malware?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
In a blog post, Lookout Mobile Security provides some details about the LeNa malware and some potential steps Android users can take to protect their phones. The LeNa malware first uses the Gingerbreak exploit to root the phone and then the malware takes over the phone. So far, LeNa malware has only been detected on non-Google application stores. However, it is only a matter of time before attackers create malware that infects and controls a large number of smartphones in a similar manner as desktops. Smartphone OSes are generally more secure than desktop OSes, but even the most secure systems can be compromised.
One of the challenges associated with protecting smartphones against malware is that the carriers control a large part of the update process and may not deploy updates. In this case, third-party security applications can help reduce the risk of malware infection. Still, carriers should be pressured to deploy updates on a regular and reasonable schedule. Android mobile device users have many of the same preconceived notions as Mac users regarding security, namely that their devices won't be infected by the likes of the LeNa malware or have other security issues. If Google continues to strengthen the security of the Android ecosystem, the risks evolving from this expectation will be effectively reduced.
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Nick Lewis
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly ...continue reading
The Irongate malware has been discovered to have similar functionality to Stuxnet. Expert Nick Lewis explains how enterprises can protect their ICS ...continue reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.