Cybercheck  >  Insights  >  How mobile malware targets Android, iOS, and corporate data
How mobile malware targets Android, iOS, and corporate data

How mobile malware targets Android, iOS, and corporate data

How mobile malware targets Android, iOS, and corporate data
Ilaria MunariMon Nov 03 20256 min read

These days, its normal to carry your smartphone everywhere. Social life is built around messaging platforms. Essential services, such as banking, have moved online. Even basic tasks, like paying for parking, can require you to download a mobile app.

As a result, your phone probably now stores more sensitive information than many desktop computers, especially if you use it for work. Cybercriminals are aware of this and are targeting mobile devices to steal data.

The shift to mobile-first attacks

There is a belief that mobile devices are inherently more secure than desktop operating systems, and especially Microsoft Windows. This idea has its origins in an earlier era.

When the first Windows and Mac operating systems were developed, the world was much less connected. Computers were mostly standalone, and only a small elite of scientists and academics were aware of the Internet. Cybersecurity was a low priority, and the earliest desktop operating systems werent designed with it in mind.

By contrast, mobile operating systems such as Android and iOS are products of the internet age. As a result, they were designed to be secure from the outset. Their developers drew upon the lessons learned from retrofitting security features into desktop systems as the need for them became clear.

However, now that mobile devices handle more than 60% of global internet traffic, cybercriminals are following the data and pivoting towards mobile-first attacks.

Platform-specific attack vectors

Mobile devices often lack the layered security protections found on desktop systems. Compounding the problem, users often download apps from unofficial sources, ignore software updates, and grant excessive permissions to applications.

Android malware

Androids open ecosystem creates security challenges. Malicious apps sometimes bypass Google Plays security checks, and generous access permissions in Android apps can create opportunities for attackers.

iOS malware

Another common cybersecurity myth is that viruses and malware arent a problem on Apple devices. However, Apple’s ecosystem isn’t impregnable.

In 2025, Apple has published several threat notifications about spyware attacks on iOS devices. The targets have been high-profile individuals, such as journalists, activists, politicians, and business leaders.

These attacks have used sophisticated techniques. Theyve exploited zero-day (previously unknown) vulnerabilities, and theyve been zero-click, meaning that the malware is installed and run without requiring any action from the user.

Types of mobile malware

Mobile devices are now at risk of infection from various types of malware. Recent examples include the trojans Anatsa and Xenomorph, which target banking apps on Android devices.

The Anatsa trojan

Anatsa is spread via malicious apps in the Google Play Store. It uses keylogging and overlays, mimicking the user interface of a legitimate app to capture the victims login details.

The attackers can then hijack the device and perform transactions from the victims bank account, circumventing conventional fraud-detection systems. In early 2023, more than 30,000 devices were reported to be infected.

The Xenomorph trojan

Spread via spoofed websites and fake apps, Xenomorph allows the attackers to take control of the victim’s bank accounts and perform transactions. It was detected in various European countries in 2022 before spreading to the United States, where it has targeted customers of more than 35 banks.

The threat from mobile infostealers

Infostealers are one of the most alarming threats in cybersecurity today. Theyre a type of malware designed to steal files and data and send them back to a server managed by the attackers. They can steal various types of information and files, such as:

  • Login credentials and passwords
  • Cookies and browser history data
  • Autofill data, such as names, addresses, or phone numbers
  • Credit card and payment details
  • Cryptocurrency wallet keys

Infostealers are spread in various ways, including phishing emails and fake apps, and conventional cybersecurity measures cant stop them. Theyre designed to work undetected and delete themselves when theyve finished. Your personal data can be for sale on the dark web before you know youve been infected.

There are now families of infostealers designed to target mobile devices.

TriaStealer

TriaStealer steals message content from email and messaging apps, such as Outlook, Gmail, and WhatsApp. This can include one-time passwords (OTPs) and transaction authorisation codes (TACs), which allow attackers to bypass multi-factor authentication (MFA) and access the victims accounts.

Crucially, TriaStealer works by asking the victim to grant it various advanced permissions on the device. For example, permission to read SMS messages.

TrickMo

TricMo is a sophisticated multipurpose stealer that targets services including Google, Dropbox, Zendesk, and Zoom. It can steal credentials and OTP. The methods it uses include screen recording, deploying overlays that mimic lock screens, and remotely controlling the device.

AppLite

AppLite is spread by mobile phishing campaigns, where it masquerades as legitimate apps such as Chrome and TikTok. It steals login details and data from a range of payment apps, including Venmo, PayPal, and Google Wallet by displaying a fake lock screen.

Triada

Triada comes preinstalled on maliciously distributed Android devices. It hijacks the crucial Zygote process, which Android uses to start apps and system processes. This gives the attackers control over a range of apps, including WhatsApp, Instagram, TikTok, SMS tools, and Chrome.

SMS Stealer

Spread via malicious downloads, SMS Stealer extracts OTPs from SMS messages on Android devices, allowing attackers to bypass multifactor authentication (MFA) on the victims accounts.

Protecting your organisation from mobile threats

To protect your organisation against the threat from mobile malware:

  • Educate and train your employees about security risks: Ensure they are always suspicious of unexpected emails and can recognise potential phishing or spear phishing attacks.
  • Keep software and devices updated: Updates patch known vulnerabilities. Ensure everyone installs them promptly. If possible, automate them, or provide automated notifications.
  • Only procure devices from trustworthy suppliers: As weve seen, some mobile malware comes preinstalled on devices. Always buy from legitimate suppliers, and beware of bargain deals online.
  • Only download official, authorised apps: Even apps in the Google and Apple stores can be risky. Only install apps authorised by your organisation on their business mobiles.
  • Think carefully before granting app permissions: Does an app really need to access your photos, messages, or location? Only grant apps the permissions they genuinely need to function and review your settings regularly.
  • Deploy mobile device management (MDM) solutions: MDM solutions let you monitor, update, troubleshoot the mobile devices that your employees use for business. This helps you to keep them safe and secure..
  • Use a cyber threat intelligence (CTI) and credential monitoring solution: Solutions such as Cybercheck continuously monitor for exposed credentials and personal data. If cybercriminals are trading information about you or your organisation, we alert you immediately. That means you can take proactive steps like changing passwords or blocking cards and shut out the attackers before they make you their next victim.

Cybercheck Intel

Stay ahead of cyber threats: get the latest threat intelligence, expert insights, and cybersecurity trends delivered straight to your inbox.

Stay informed, stay secure.