Article:

Mobile Malware Landscape in 2024: Why App Security Is Critical for Businesses

 

Mobile malware attacks are rising as mobile banking, digital payments, and remote authentication become mainstream. In 2024, over 33.3 million mobile malware attacks were recorded globally, according to a report by a security firm, underscoring the urgent need for stronger mobile security. Another study found that Trojan banking malware attacks nearly tripled this year, surging by 196% worldwide. 

Cybercriminals are constantly refining their tactics, exploiting vulnerabilities in mobile devices to target industries such as banking, e-commerce, digital payments, and government services. The most prominent mobile malware threats in 2024 include: 

 

Banking Trojans 

Industries affected: Financial Services, Digital Banking, Fintech 

These malicious programs disguise themselves as legitimate banking apps, tricking users into entering their login credentials. Once infected, attackers can intercept transactions, steal funds, and even manipulate banking sessions in real time. With mobile banking adoption on the rise, banks, digital wallet providers, and financial services platforms remain prime targets. 

 

Spyware 

Industries affected: Government, Enterprises, Legal, Healthcare 
Operating silently in the background, spyware collects sensitive data such as keystrokes, GPS locations, call logs, and microphone recordings. In corporate environments, it enables espionage, stealing confidential business data or financial records. Governments handling classified information and enterprises managing trade secrets are especially vulnerable. 

 

Smishing (SMS Phishing) 

Industries affected: E-commerce, Telecommunications, Logistics, Banking 
Cybercriminals exploit users’ trust in text messages by sending fraudulent links disguised as official communication from banks, delivery services, or digital platforms. Clicking these links can expose credentials or install malware. The growing reliance on OTP-based authentication in banking and e-commerce increases exposure to these attacks. 

 

Malvertising (Malicious Advertising) 

Industries affected: Advertising, Media, Mobile Gaming, e-Commerce

Compromised online ads even on legitimate websites redirect users to infected pages that download malware. Since mobile users frequently engage with ads via apps and browsers, ad-tech companies and e-commerce platforms face increasing security challenges. 

 

Rogue Apps 

Industries affected: App Marketplaces, Fintech, Banking, Crypto 

Fraudulent applications often found in third-party app stores or mimicking legitimate ones trick users into installing malware. These apps request excessive permissions, allowing attackers to access sensitive data or deploy ransomware. Fintech and cryptocurrency platforms are frequent targets of fake apps designed to steal user funds. 

 

Mobile Security Risks Enabling These Threats 

Beyond malware itself, underlying security gaps provide cybercriminals with opportunities to compromise mobile environments. Businesses must address these vulnerabilities to prevent exploitation:  

  • Device Fragmentation: The diversity of operating systems and device manufacturers makes it difficult to enforce uniform security policies. 
  • Shadow IT: Employees using unauthorized mobile apps or personal devices for work increase exposure to unverified software and data leaks. 
  • Weak Endpoint Security: Mobile devices often lack the same level of security as desktops, making them easier targets for attackers. 
  • Man-in-the-Middle (MitM) Attacks: Cybercriminals exploit unsecured Wi-Fi networks to intercept communications and steal credentials. 
  • Rogue Applications: Fraudulent or cloned apps disguised as legitimate ones are a growing vector for malware infection. 

 

The Business Impact of Mobile Malware 

For enterprises, mobile malware can lead to severe financial, operational, and reputational damage: 

Impact Area Description Example Scenarios 
Financial Losses Direct losses from fraud and breach-related expenses. Refunds due to fraudulent transactions. 
Regulatory Fines Penalties for non-compliance with data protection laws. GDPR fines for compromised user data. 
Operational Disruption Downtime caused by malware affecting critical systems. Ransomware locking access to mobile applications. 
Customer Trust & Reputation Loss of user confidence due to security incidents. Customers switching to competitors with better security. 
Supply Chain Risks Attackers targeting vendors and partners. Compromised third-party app integrations. 

 

Beyond individual business impacts, some regions are experiencing higher attack rates due to increasing mobile adoption and evolving cybercriminal tactics. 

 

2024 Mobile Malware Incidents Across Key Regions 

Recent reports indicate that Vietnam, Indonesia, and Thailand are among the most affected in Southeast Asia, with millions of recorded on-device threats. These regions are seeing a rise in malware incidents due to increasing mobile payment adoption and evolving cybercriminal tactics. Australia and the United States have also reported significant increases in mobile-based cyberattacks, particularly targeting financial services and government sectors. 

 

Country Number of On-Device Threats Notes 
United States 783,000+ Significant rise in phishing and mobile malware attacks. 
Australia 1,100+ cybersecurity incidents Surge in cyber threats, including mobile malware. Data breaches also increased, exposing 47 million records. 
Vietnam 10,531,086 Highest in Southeast Asia. 
Indonesia 7,954,823 Significant increase in threats. 
Thailand 2,650,007 Notable rise in incidents. 
Malaysia 1,965,270 Growing number of attacks. 
Philippines 687,567 Moderate threat level. 
Singapore 501,148 Lowest in the region. 

 

As mobile threats continue evolving, businesses must adopt stronger security measures to mitigate risks. 

 

Strengthening Mobile Security with V-Key’s Solutions 

Many mobile malware attacks exploit weak app security, allowing attackers to steal data, inject malicious code, or manipulate transactions. These vulnerabilities put user privacy and business operations at risk if left unaddressed. 

V-Key fortifies mobile applications, APIs, and digital identity with V-OS, our patented Virtual Secure Element, ensuring protection against malware, unauthorized access, and credential theft. The chart below highlights common mobile security weaknesses and how V-Key solutions mitigates them. 

 

Mobile App Vulnerability Challenges V-Key Solution 
Weak or No App Integrity Protection Apps are vulnerable to reverse engineering, modification, and injection of malicious code. V-OS Mobile App Protection provides code obfuscation, anti-tampering, and runtime self-protection (RASP) to prevent unauthorized modifications and malware injections. 
Unsecured APIs Attackers exploit weak API security to access sensitive data, manipulate transactions, or bypass authentication. V-OS App Identity secures API communications with mutual authentication, dynamic encryption, and cryptographic tokenization, ensuring only legitimate requests are processed. 
Inadequate Data Encryption Storing sensitive data in plaintext or using weak encryption makes it easier for attackers to extract confidential information. V-OS Virtual Secure Element provides hardware-grade encryption and secure storage for credentials, cryptographic keys, and sensitive data. 
Lack of Secure App Updates Apps without secure update mechanisms are vulnerable to version rollback attacks, where attackers exploit outdated versions. V-OS Mobile App Protection ensures only authorized app updates are installed and prevents attackers from forcing older, vulnerable versions. 
Compromised Digital Identity Credentials Weak app security exposes stored credentials, allowing attackers to hijack user identities and gain unauthorized access. V-Key ID enables passwordless authentication with cryptographic key-based authentication, reducing reliance on static credentials and mitigating credential theft risks. 
Keylogging to capture user information Compromised keyboard captures the keystroke which may contain sensitive information V-OS Mobile App Protection provides secure keyboard effectively protect users from keylogging attacks 
Unauthorized screen recording Malicious application shares the mobile phone screen to expose all sensitive information to the remote attacker V-OS Mobile App Protection detects unauthorized screen capturing to prevent remote sniffing of sensitive information 

 

As mobile threats continue to grow in scale and sophistication, businesses must take a proactive approach to securing their applications and digital ecosystems. Reactive security measures are no longer enough—organizations need robust, built-in protections that defend against evolving attack tactics without compromising user experience or operational efficiency. 

V-Key’s advanced security solutions empower businesses to stay ahead of cybercriminals, ensuring secure mobile transactions, seamless authentication, and protection against malware-driven fraud. By integrating V-OS, our patented Virtual Secure Element, organizations can enhance their security posture, meet regulatory requirements, and build lasting trust with users as cyber threats continue to evolve. 

 

[References: Wired, Kaspersky, News AU, The Australian, Nation Thailand, Business Today, GBHackers, Lookout, Cyber Security Australia, Cyber Daily] 

 

Article
Building Digital Trust with V-Key at the State Bank of Vietnam Event 

2025 April, Vietnam –  V-Key had the privilege of participating in the State Bank of Vietnam (SBV) CIO Roundtable event on 1 April 2025. This event brought together key players in Vietnam’s financial industry to discuss the future of banking security and the impact of regulations on digital transformation. It was an important platform to explore how V-Key supports financial institutions in Vietnam to stay ahead of regulatory compliance and security innovation. 

Article
Journey to Passwordless Authentication

Is it the Beginning of the End of Passwords? 

In the wake of cyber-attacks at some of the biggest Superannuation Funds in Australia last week, one question should be asked, is this the beginning of the end of Passwords? The safety of using Passwords has been broken for a long time. Managing passwords can be dauntingly challenging. They can be difficult to remember, and often, people reuse them across multiple platforms and systems, which makes them a target for cybercriminals. In fact, according to the 2023 Verizon Data Breach Investigations Report (DBIR), over 50% of data breaches are linked to stolen or compromised credentials. This exposes sensitive data, whether it’s banking details, emails, or personal information, to potential risks.  

Article
Vietnam’s New Digital Security Regulations: Strengthening Mobile and Biometric Protections

Vietnam is rapidly enhancing its digital security landscape. In just the past six months, two major regulations—Decision 2345 (effective July 2024) and Circular 50 (effective January 2025)—have been introduced to address growing threats such as biometric fraud, mobile app tampering, and unauthorized data access. These changes are not just regulatory updates; they serve as a wake-up call for businesses to fortify their cybersecurity defenses before it’s too late. 

Article
Strengthening Australia’s Digital Identity Future 

Australia is making significant progress in digital identity adoption, with the federal government leading efforts through its national Digital ID system. 73% of Australians now have a Digital ID account for government services, up from 60% in 2023, reflecting increasing engagement. With smartphones as the most popular device for accessing these services, digital identity is becoming a key part of everyday interactions. However, 56% of Australians remain concerned about data security, highlighting the need for a secure and seamless identity ecosystem. 

Article
Beyond OTPs: The Shift to Passwordless Authentication in Banking

The Bangko Sentral ng Pilipinas (BSP) is considering phasing out one-time passwords (OTPs) for digital banking transactions, citing the growing vulnerabilities of this method. BSP Deputy Governor Elmore Capule emphasized that the agency is exploring stronger security measures to make digital banking more resilient, with biometric authentication and other advanced technologies being evaluated as secure alternatives to OTPs.

Article
V-Key Continues to Expand in Australia to Strengthen Digital Identity and Authentication

V-Key strengthens its presence in Australia by participating in the FIDO Alliance events in Melbourne, reinforcing its commitment to digital identity and authentication. With discussions on passkeys, step-up authentication, and regulatory updates, V-Key highlighted how V-Key ID enhances security and trust. As digital transformation accelerates in Australia, V-Key continues to support enterprises in financial services, payment gateways, and government with innovative mobile security solutions. Expanding its local team, V-Key is dedicated to enabling seamless and secure digital interactions through advanced authentication technologies.

Article
Why Passwordless Authentication is the Future of Security

Managing passwords can be challenging. They can be difficult to remember, and often, people reuse them across multiple sites, which makes them a target for cybercriminals. In fact, according to the 2023 Verizon Data Breach Investigations Report (DBIR), over 50% of data breaches are linked to stolen or compromised credentials. This exposes sensitive data, whether it’s banking details, emails, or personal information, to potential risks. 

Article
Protect Your Business All Year with V-Key ID and FIDO2

Lunar New Year is a time for celebration for many people around the world, but it’s also a good opportunity for scammers who are always trying to entice victims to grab the next cheap online shopping deal. A common technique that scammers use is to lure a victim into installing a malware app that can then be used to phish user’s credentials, capture SMS OTPs, or even remotely control the phone to perform banking transactions. 

Article
V-Key’s 2024 Journey in Advancing Digital Security and Empowering Seamless Digital Experiences

As we reflect on 2024, V-Key is proud of the milestones we’ve achieved and the innovations we’ve introduced in the field of digital identity and mobile security. This year, we have remained steadfast in our mission to protect digital experiences and empower businesses with advanced solutions. From key industry events to groundbreaking technological advancements, we’ve continually strived to meet the evolving needs across various sectors.  

Article
5 Simple and Effective Ways to Secure Your Mobile App with V-OS App Shield

For businesses, especially those handling sensitive data or financial transactions, ensuring app security is no longer optional. The risk is real: attacks on mobile apps can lead to reputational damage, regulatory fines, and the loss of user trust.  

V-OS App Shield is a reliable solution designed to safeguard mobile applications. Beyond the basics of security, it offers a cost-effective approach that combines robust protection with ease of use. Here are 5 ways V-OS App Shield can enhance your mobile app security and deliver real-world benefits. 

Article
Securing Mobile Apps and Why It’s Critical for Businesses

Mobile devices continue to become indispensable, with the average smartphone user spending around 88% of their day interacting with apps. This surge in mobile usage highlights an escalating need for businesses to ensure their apps are secure, as the stakes of app security have never been higher. From retail businesses to e-commerce platforms, mobile apps handle sensitive user data and provide access to essential business systems. The consequences of a breach can be devastating, both for businesses and their users. 

Article
Introducing V-OS App Shield: Connect, Deploy and Protect your App in Minutes

Mobile applications are key to daily business operations, customer engagement, and overall functionality. According to Google, the average smartphone user interacting with nearly 10 apps daily and spending about 88% of their time on mobile, the need for strong mobile app protection has never been more pressing. Introducing V-OS App Shield, a revolutionary solution designed to secure your mobile apps fast and easy.

Article
V-Key partners with Bridge Alliance to build a Safer Digital Ecosystem

V-Key, renowned for its advanced security solutions has proudly joined Bridge Alliance as their technology Partner,  solidifying their commitment to innovation and excellence in mobile security. This partnership opens doors to explore new avenues for enhancing authentication experiences and mitigating cybersecurity risks.

Article
Making 2FA/MFA robust against smishing and related attacks

2FA/MFA was introduced to make it harder for attackers, by requiring two or more proofs of identity – also known as authentication factors. These can take many forms, but can be boiled down to: something you know (e.g., a password), something you have (e.g., a cryptographic key), or something you are (e.g., a biometric ID that is unique to you) [1].

However, 2FA/MFA is not a universal panacea that can be picked off a shelf and thrown in to solve any and all challenges presented by attackers.

Article
How do we determine the effectiveness of mobile apps’ security systems?

With the spate of remote working regime due to Coronavirus pandemic, the reliance and growth for video conferencing platform has been exponentially escalated. However, most mobile apps today are nowhere near as secure as we would like them to be.

Article
Is the detection of jailbroken/rooted phone sufficient against threats?

Functions that detect jailbroken/rooted devices are most commonly added to transactional mobile applications, serving as the most basic defense against threats. However, this is nothing but a drop in a bucket.

Article
Why Existing Mobile Software Protections are Insufficient

Recognizing that existing mobile software protections are insufficient against today’s cyber threat landscape, we take a closer look at the main types of software protections in the market.

Article
V-OS Protection against CPU vulnerabilities

Virtually every computing device in the world is made unsafe by the latest disclosures on Central Processing Unit (CPU) vulnerabilities. Find out how the virtual secure element technology is protecting millions of mobile application users against such vulnerabilities.

Article
V-OS Protection against Android Plugin malware

There has been a recent surge in Android malware abusing Android Plugin Frameworks for malicious behavior. DroidPlugin, Parallel Space and VirtualApp are several plugin frameworks that have been abused by malware in recent months to spread Android malware.

Article
Three steps to fight the Mobile Security status quo

Have financial institutions accepted a status quo that sacrifices user experience for increased security? With mobile digital identity quickly becoming central to an entire suite of online services, those who challenge the status quo will set themselves up to prosper and grow. Read more to find out three oft-ignored areas of research.

Article
Cryptography in V-OS

V-OS is the world’s first virtual secure element. Cryptography plays a dual-role in these; to secure and manage the secrets kept within V-OS, and to provide a lightweight yet comprehensive cryptographic library.

Article
Building V-OS with HSM

V-OS is the world’s first virtual secure element, a software solution with security built into the firmware code. These include secret cryptographic parameters and data, which need to be randomly generated and securely persisted, and are then transformed into code and data files.

Article
How does a Virtual Smart card protect a customer if they lose or change their mobile phone?

From banks to government agencies, many organisations are intrigued by and exploring software security solutions such as mobile tokens and mobile identity systems for individual identification, authorisation and authentication.

Article
Is software-based Biometrics Authentication the solution to ASEAN’s regulatory challenges?

Banks in Southeast Asia should look towards software-based biometrics as the way forward to navigate the regulatory differences in the region and secure their customers’ transactions.

Article
Infographic: The next frontier in Banking transformation

As technology evolves, banks and financial institutions have no choice but to innovate. However, when it comes to security, many still rely on traditional, costly methods.

Article
Mobile Security that works for everyone

Safe, convenient and simple.

Article
The next wave of Finance: Singapore’s growing Fintech market

With global cumulative investment in financial technology (fintech) forecast to exceed US$150 billion in three to five years, economies around the world are vying to attract fintech innovators and cash in on this growing industry.