Ransomware is a major and rapidlygrowing threat at present. Malware analysis should be done irrespective of theunknown and stealthy malware attack characteristics in order to achieve asecure information world. This is possible only when efficient malwaredetection techniques are employed.The statisticsof Windows malware detected by Quick Heal Labs in 2016 is given in figure 1. Figure 1 Windows Malware Detection Statistics in2016 Fig 2 representsthe statistics of Android samples reported by Quick Heal in 2016.
Figure 2 Android Samples Growth (2013-2016)Malwaredetection on PC and mobile devicesTo understand the current securityproblems affecting PCs and smartphones, we review threats, vulnerabilities andattacks specific to smartphones and examine the existing security solutions toprotect them. In particular, we survey the literature over the period 1987-2017,by focusing our attention on PC-based (Windows) and Mobile-based (Android) malwares.Current mobile devices (smartphones)provide lots of the capabilities of traditional PCs and, in addition, offer alarge selection of connectivity options, such as IEEE 802.11, Bluetooth, GSM,GPRS, UMTS, and HSPA. This plethora of appealing features has led to awidespread diffusion of smartphones and is now an ideal target for attackers.In the beginning, smartphones were packaged with standardized Operating System(OS): less heterogeneity in OS allowed attackers to exploit just a singlevulnerability to attack a large number of different kinds of devices by causingmajor security outbreaks. Some of the operating systems for smartphones wereSymbian OS, Windows Mobile, Android and iPhone OS.Even if global sales of millions ofsmartphones devices are observed, the number of mobile malware is still smallcompared to that of PC malware.
Smartphone malwares are evolving in the sametrend as malware for PCs. As more users download and install third-partyapplications for smartphones, the chances of installing malicious programsincreases as well. Mobile malware can spread through several and distinctvectors, such as an SMS containing a link to a site where a user can downloadthe malicious code, an MMS with infected attachments, or infected programsreceived via Bluetooth. The main goals of malware targeted at smartphonesinclude theft of personal data stored in the phone or the user’s credit.
Manyfake mobile applications tricks shoppers into entering personal credit cardinformation, disclosing Facebook and Gmail logins or downloading malware thatcould potentially steal or locks devices and hold it ransom.