Zimperium

35 STATS6 REPORTS

All Statistics

Around 19% of Android shopping apps expose at least one unprotected exported Service, potentially leading to data leakage.

Android shopping app

Approximately 24% of analyzed Android shopping apps can retrieve Java classes or DEX files from remote locations.

Android shopping app

Roughly 29% of reviewed iOS shopping apps access user data without declaring it in their App Store Privacy Overview.

iOS shopping appData exposureApp StoreApp Store Privacy Overview

During the 2024 shopping season, there was a 4x increase in mishing sites compared to monthly averages.

Mishing

3 VPN apps still utilized a legacy version of the OpenSSL library.

VPN

25% of the VPN apps analyzed on iOS failed to include a valid privacy manifest at all.

VPN

On iOS, over 6% of VPN apps were found requesting private entitlements, which are typically restricted from third-party developers. This represented a total of 30 apps

VPN

Approximately 1% of the analyzed VPN apps were found to be vulnerable to a Man-in-the-Middle (MitM) attack.

VPN

50% of mobile devices are running on outdated operating systems.

MobileOS

Nearly 60% of iOS apps are vulnerable to PII data leakage.

MobileiOSPIIData leakage

Over 60% of iOS apps lack basic code protection.

MobileiOS

Up to 34% of Android apps lack basic code protection.

MobileAndroid

Over 25% of mobile devices cannot upgrade to the latest OS versions.

MobileOS

43% of Android apps are vulnerable to PII data leakage.

MobileAndroidPIIData leakage

Smishing has rapidly grown to comprise over two-thirds of mobile phishing attacks. Specifically, SMS/text based phishing (Smishing) is now 69.3% of all mishing attacks.

MobilePhishingSmishing

Smishing attacks grew by 22%.

MobilePhishingSmishing

70% of organizations support BYOD (Bring Your Own Device)

BYOD

50% of mobile devices are running on outdated operating systems.

MobileOS

There was a 50% increase year-over-year in the use of Trojans in attacks.

MobileTrojan

Vishing (voice-call phishing) tactics grew by 28%.

MobilePhishingVishing

43% of the top 100 apps use one or more cryptographic methods that do not follow best practices.

AppCryptographic

88% of all apps use one or more cryptographic methods that do not follow best practices.

AppCryptographic

103 of 9,078 analyzed Android apps were found to use unprotected or misconfigured cloud storage. 4 of these Android apps were in the top 1000 of the PlayStore popularity list.

AppAndroidCloud

62% of all analysed apps use some kind of cloud API or SDK.

App

10 of analyzed 9,078 Android apps contained exposed credentials to AWS cloud services.

AppAndroidExposed credentialsAWS cloud service

Rooted devices are more than 3.5 times more likely to be targeted by mobile malware.

RootingMalwareMobile SecurityEnterprise Security

System compromise incidents are 250 times higher on rooted devices compared to stock devices.

RootingSystem CompromiseThreat StatisticsStock Devices

Events where Security-Enhanced Linux is disabled increase more than 90 times on rooted devices compared to stock devices.

RootingSecurity-Enhanced LinuxThreat StatisticsStock Devices

Filesystem compromise events increase by a factor of 3000 on rooted devices compared to stock devices.

RootingFilesystem CompromiseThreat StatisticsStock Devices

The exposure factor of rooted devices versus stock devices varies from 3x to ~3000x, which suggests that rooted devices are potentially much more vulnerable to threats than stock devices.

RootingSecurity RiskMobile SecurityThreat Exposure

Compromised app detections surge by a factor of 12 on rooted devices compared to stock devices.

RootingApp SecurityThreat StatisticsStock Devices

3% of phishing sites use device-specific redirection, showing benign content on desktops while targeting mobile devices with phishing payloads.

Quishing (QR code phishing) is emerging, with notable activity in Japan (17%), the U.S. (15%), and India (11%).

Smishing (SMS/text based phishing) is the most common mobile phishing vector, accounting for 37% of attacks in India, 16% in the U.S., and 9% in Brazil.

Mishing activity peaked in August 2024, with over 1,000 daily attack records.