www.zscaler.com
Open in
urlscan Pro
2606:4700::6812:1c4a
Public Scan
URL:
https://www.zscaler.com/blogs/security-research/new-threatlabz-report-mobile-remains-top-threat-vector-111-spyware-growth
Submission: On October 16 via api from TR — Scanned from DE
Submission: On October 16 via api from TR — Scanned from DE
Form analysis
6 forms found in the DOM<form class="mb-[3rem] pt-[4.8rem] md:mb-[4.2rem] md:pt-[3rem]">
<div class="relative"><input placeholder="What are you looking for?" aria-label="job-search-input" class="
border-0
focus:ring-0
w-full
font-normal
text-[2rem]
leading-10
-tracking-[0.01rem]
py-[1.3rem]
pr-[3rem]
bg-[transparent]
focus:outline-none
md:text-[3.2rem]
md:leading-[3.5rem]
border-b-[0.3rem]
autofill:shadow-[0 0 0px 1000px transparent inset]
autofill:transition-[background-color]
autofill:duration-[5000s]
autofill:ease-in-out
text-darkBlue border-b-pink autofill:text-darkBlue" value=""></div>
</form>
<form class="mb-[3rem] pt-[4.8rem] md:mb-[4.2rem] md:pt-[3rem]">
<div class="relative"><input placeholder="What are you looking for?" aria-label="job-search-input" class="
border-0
focus:ring-0
w-full
font-normal
text-[2rem]
leading-10
-tracking-[0.01rem]
py-[1.3rem]
pr-[3rem]
bg-[transparent]
focus:outline-none
md:text-[3.2rem]
md:leading-[3.5rem]
border-b-[0.3rem]
autofill:shadow-[0 0 0px 1000px transparent inset]
autofill:transition-[background-color]
autofill:duration-[5000s]
autofill:ease-in-out
text-darkBlue border-b-pink autofill:text-darkBlue" value=""></div>
</form>
<form class="marketoForm_root__Wkgni marketoForm_variant_cta_module__IwKzs mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_7971"
style="opacity: 100; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;" novalidate="novalidate">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoRound .mktoButton {
color: #fff;
border: 1px solid #a3bee2;
-webkit-border-radius: 5px;
-moz-border-radius: 5px;
border-radius: 5px;
background-color: #779dd5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
background-image: linear-gradient(to bottom, #779dd5, #5186cb);
padding: 0.4em 1em;
font-size: 1em;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
outline: none;
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
background-color: #5186cb;
background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
background-image: linear-gradient(to bottom, #5186cb, #779dd5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label id="LblEmail_7971" for="Email_7971" class="mktoLabel mktoHasWidth" style="width: 0px;">
<div class="mktoAsterix">*</div>
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_7971" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail_7971 InstructEmail_7971" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;" aria-label="Enter email"><span id="InstructEmail_7971" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="7971" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256" placeholder=""><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor" value="Website Direct"
placeholder=""><input type="hidden" name="Lead_Source_Type__c" class="mktoField mktoFieldDescriptor" value="Website" placeholder=""><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor" value=""
placeholder=""><input type="hidden" name="Lead_Source_Recent__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Content__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input
type="hidden" name="Campaign_ID__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Term__c" class="mktoField mktoFieldDescriptor" value="" placeholder="">
</form>
<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_1944" style="opacity: 100; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;"
novalidate="novalidate">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoRound .mktoButton {
color: #fff;
border: 1px solid #a3bee2;
-webkit-border-radius: 5px;
-moz-border-radius: 5px;
border-radius: 5px;
background-color: #779dd5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
background-image: linear-gradient(to bottom, #779dd5, #5186cb);
padding: 0.4em 1em;
font-size: 1em;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
outline: none;
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
background-color: #5186cb;
background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
background-image: linear-gradient(to bottom, #5186cb, #779dd5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label id="LblEmail_1944" for="Email_1944" class="mktoLabel mktoHasWidth" style="width: 0px;">
<div class="mktoAsterix">*</div>
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_1944" name="Email" placeholder="Please enter your email to subscribe" maxlength="255" aria-labelledby="LblEmail_1944 InstructEmail_1944" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;" aria-label="Enter email"><span id="InstructEmail_1944" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1944" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256" placeholder=""><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor" value="Website Direct"
placeholder=""><input type="hidden" name="Lead_Source_Type__c" class="mktoField mktoFieldDescriptor" value="Website" placeholder=""><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor" value=""
placeholder=""><input type="hidden" name="Lead_Source_Recent__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Content__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input
type="hidden" name="Campaign_ID__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Term__c" class="mktoField mktoFieldDescriptor" value="" placeholder="">
</form>
<form class="marketoForm_root__Wkgni marketoForm_variant_cta_module__IwKzs mktoForm mktoHasWidth mktoLayoutLeft"
style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>
<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft"
style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>
Text Content
___ This site uses JavaScript to provide a number of functions, to use this site please enable JavaScript in your browser. OpenSearch ThreatLabz CXO REvolutionaries Careers Partners Support ShowContact Us Get in touch 1-408-533-0288 Chat with us ShowSign In Zscaler Cloud Portal | Admin Zscaler Cloud Portal One | Admin Zscaler Cloud Portal Two | Admin Zscaler Cloud Portal Three | Admin Zscaler Cloud Portal Beta | Admin admin.zscloud.net Zscaler Private Access Cloud Portal One | Admin Zscaler Private Access Cloud Portal Two | Admin Home Platform Products Solutions Resources Company Request a demo Secure the Workforce Provide users with seamless, secure, reliable access to applications and data. Secure the Cloud Build and run secure cloud apps, enable zero trust cloud connectivity, and protect workloads from data center to cloud. Secure IoT/OT Provide zero trust connectivity for IoT and OT devices and secure remote access to OT systems. Secure B2B Provide zero trust site-to-site connectivity and reliable access to B2B apps for partners. Why Zscaler Leadership in AI/ML Zscaler SASE Zscaler SSE Analyst Recognition Customer Stories Partner Ecosystem Reduce Your Carbon Footprint GARTNER REPORT Zscaler: A Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge (SSE) Get the report Cyberthreat Protection Secure Internet Access (ZIA) Secure Private Access (ZPA) Zero Trust Firewall Sandbox Browser Isolation Data Protection Web and Email DLP Multi-Mode CASB Endpoint DLP Unified SaaS Security Gen AI Security DSPM BYOD Security Zero Trust Networking Zero Trust SASE Zero Trust SD-WAN Workload Communications Zero Trust for IoT/OT Zero Trust Device Segmentation Digital Experience (ZDX) Risk Management Risk360 Unified Vulnerability Management Breach Predictor Deception Identity Threat Detection and Response Managed Threat Hunting USE CASES Replace VPN Stop Ransomware Replace VDI Secure Your Data Optimize Digital Experiences Deploy Zero Trust SASE Deploy BYOD Securely Reduce Cyber Risk Right-Size SaaS & Office Space Footprint Accelerate M&A and Divestitures INDUSTRY & MARKET SOLUTIONS Healthcare Banking & Financial Services US Public Sector US Federal Government US State & Local Government Education Australia Government China Government PARTNERS Explore Our Partners Become a Partner Partner Portal TECHNOLOGY PARTNERS Explore Technology Partners Microsoft CrowdStrike AWS Okta Rubrik SAP USE CASES Replace VPN Stop Ransomware Replace VDI Secure Your Data Optimize Digital Experiences Deploy Zero Trust SASE Deploy BYOD Securely Reduce Cyber Risk Right-Size SaaS & Office Space Footprint Accelerate M&A and Divestitures INDUSTRY & MARKET SOLUTIONS Healthcare Banking & Financial Services US Public Sector US Federal Government US State & Local Government Education Australia Government China Government PARTNERS Explore Our Partners Become a Partner Partner Portal TECHNOLOGY PARTNERS Explore Technology Partners Microsoft CrowdStrike AWS Okta Rubrik SAP Resource Center Resource Library Blog Customer Success Stories Webinars Zpedia Events & Trainings Upcoming Events Zenith Live Zscaler Academy Security Research & Services ThreatLabz Analytics Security Advisory Updates Zero Trust Resources Tools Security Preview Security and Risk Assessment Disclose a Vulnerability Executive Insights App Ransomware Protection ROI Calculator Community & Support Customer Success Center Zenith Community CXO REvolutionaries Zscaler Help Portal CXO REVOLUTIONARIES Amplifying the voices of real-world digital and zero trust pioneers Visit now Resource Center Resource Library Blog Customer Success Stories Webinars Zpedia Events & Trainings Upcoming Events Zenith Live Zscaler Academy Security Research & Services ThreatLabz Analytics Security Advisory Updates Zero Trust Resources Tools Security Preview Security and Risk Assessment Disclose a Vulnerability Executive Insights App Ransomware Protection ROI Calculator Community & Support Customer Success Center Zenith Community CXO REvolutionaries Zscaler Help Portal About Zscaler Discover how it began and where it’s going Partners Meet our partners and explore system integrators and technology alliances News & Announcements Stay up to date with the latest news Leadership Team Meet our management team Partner Integrations Explore our technology partner integrations Investor Relations See news, stock information, and quarterly reports Environmental, Social & Governance Learn about our ESG approach Careers Join our mission Press Center Find everything you need to cover Zscaler Compliance Understand our adherence to rigorous standards Zenith Ventures Understand our adherence to rigorous standards Home Request a demo Platform Products Solutions Resources Company Request a demo ThreatLabzCXO REvolutionariesCareersPartnersSupport ShowContact Us Get in touch1-408-533-0288Chat with us ShowSign In Zscaler Cloud Portal | AdminZscaler Cloud Portal One | AdminZscaler Cloud Portal Two | AdminZscaler Cloud Portal Three | AdminZscaler Cloud Portal Beta | Adminadmin.zscloud.netZscaler Private Access Cloud Portal One | AdminZscaler Private Access Cloud Portal Two | Admin Platform Secure the Workforce Provide users with seamless, secure, reliable access to applications and data. Secure the Cloud Build and run secure cloud apps, enable zero trust cloud connectivity, and protect workloads from data center to cloud. Secure IoT/OT Provide zero trust connectivity for IoT and OT devices and secure remote access to OT systems. Secure B2B Provide zero trust site-to-site connectivity and reliable access to B2B apps for partners. Why Zscaler Leadership in AI/ML Zscaler SASE Zscaler SSE Analyst Recognition Customer Stories Partner Ecosystem Reduce Your Carbon Footprint GARTNER REPORT Zscaler: A Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge (SSE) Get the report Products Cyberthreat Protection Secure Internet Access (ZIA) Secure Private Access (ZPA) Zero Trust Firewall Sandbox Browser Isolation Data Protection Web and Email DLP Multi-Mode CASB Endpoint DLP Unified SaaS Security Gen AI Security DSPM BYOD Security Zero Trust Networking Zero Trust SASE Zero Trust SD-WAN Workload Communications Zero Trust for IoT/OT Zero Trust Device Segmentation Digital Experience (ZDX) Risk Management Risk360 Unified Vulnerability Management Breach Predictor Deception Identity Threat Detection and Response Managed Threat Hunting Solutions USE CASES Replace VPN Stop Ransomware Replace VDI Secure Your Data Optimize Digital Experiences Deploy Zero Trust SASE Deploy BYOD Securely Reduce Cyber Risk Right-Size SaaS & Office Space Footprint Accelerate M&A and Divestitures INDUSTRY & MARKET SOLUTIONS Healthcare Banking & Financial Services US Public Sector US Federal Government US State & Local Government Education Australia Government China Government PARTNERS Explore Our Partners Become a Partner Partner Portal TECHNOLOGY PARTNERS Explore Technology Partners Microsoft CrowdStrike AWS Okta Rubrik SAP USE CASES Replace VPN Stop Ransomware Replace VDI Secure Your Data Optimize Digital Experiences Deploy Zero Trust SASE Deploy BYOD Securely Reduce Cyber Risk Right-Size SaaS & Office Space Footprint Accelerate M&A and Divestitures INDUSTRY & MARKET SOLUTIONS Healthcare Banking & Financial Services US Public Sector US Federal Government US State & Local Government Education Australia Government China Government PARTNERS Explore Our Partners Become a Partner Partner Portal TECHNOLOGY PARTNERS Explore Technology Partners Microsoft CrowdStrike AWS Okta Rubrik SAP Resources Resource Center Resource Library Blog Customer Success Stories Webinars Zpedia Events & Trainings Upcoming Events Zenith Live Zscaler Academy Security Research & Services ThreatLabz Analytics Security Advisory Updates Zero Trust Resources Tools Security Preview Security and Risk Assessment Disclose a Vulnerability Executive Insights App Ransomware Protection ROI Calculator Community & Support Customer Success Center Zenith Community CXO REvolutionaries Zscaler Help Portal CXO REVOLUTIONARIES Amplifying the voices of real-world digital and zero trust pioneers Visit now Resource Center Resource Library Blog Customer Success Stories Webinars Zpedia Events & Trainings Upcoming Events Zenith Live Zscaler Academy Security Research & Services ThreatLabz Analytics Security Advisory Updates Zero Trust Resources Tools Security Preview Security and Risk Assessment Disclose a Vulnerability Executive Insights App Ransomware Protection ROI Calculator Community & Support Customer Success Center Zenith Community CXO REvolutionaries Zscaler Help Portal Company About Zscaler Discover how it began and where it’s going Partners Meet our partners and explore system integrators and technology alliances News & Announcements Stay up to date with the latest news Leadership Team Meet our management team Partner Integrations Explore our technology partner integrations Investor Relations See news, stock information, and quarterly reports Environmental, Social & Governance Learn about our ESG approach Careers Join our mission Press Center Find everything you need to cover Zscaler Compliance Understand our adherence to rigorous standards Zenith Ventures Understand our adherence to rigorous standards Zscaler Blog Get the latest Zscaler blog updates in your inbox Subscribe Security Research NEW THREATLABZ REPORT: MOBILE REMAINS A TOP THREAT VECTOR WITH 111% SPYWARE GROWTH WHILE IOT ATTACKS RISE 45% WILL SEATON, VIRAL GANDHI, YESENIA BARAJAS October 15, 2024 - 4 min read Threatlabz Research Contents 1. Overview 2. 6 key mobile and IoT/OT findings 3. Securing mobile, IoT, and OT with zero trust 4. More blogs Copy URL Copy URL The role of the CISO continues to expand, driven by the rising number of breaches and cyberattacks like ransomware, as well as SEC requirements for public organizations to disclose material breaches. Among the fastest-moving frontiers in enterprise cybersecurity: mobile, the internet of things (IoT), and operational technology (OT) systems. Today, 96.5% of people access the internet with a mobile device, while 59% of internet traffic is generated by mobile devices. Meanwhile, OT and cyber-physical systems, once air-gapped and isolated from the internet, have rapidly become integrated into enterprise networks, where threats can proliferate. To shed light on this burgeoning threat landscape, the Zscaler ThreatLabz research team conducted a detailed analysis of mobile and IoT/OT attack trends from June 2023 to May 2024. Overall, ThreatLabz tracked a rise in financially motivated mobile attacks—with 111% growth in spyware and 29% growth in banking malware—most of which can bypass multifactor authentication (MFA). Meanwhile, IoT attacks grew 45% year-over-year, and ThreatLabz identified pervasive security risks in OT environments. This blog post will summarize key findings from the report. For a comprehensive understanding of mobile and IoT/OT trends, case studies, and best practices to secure your organization, download the Zscaler ThreatLabz 2024 Mobile, IoT, and OT Threat Report. 6 KEY MOBILE AND IOT/OT FINDINGS TOP MOBILE AND IOT/OT TRENDS 1. Rise in financially-motivated mobile threats, including a 111% rise in spyware and 29% growth in banking malware. * Despite an overall decrease in Android attacks, financially-motivated mobile threats are growing, with the majority able to bypass MFA. 2. IoT attacks increased by 45% based on blocked attempts in the Zscaler cloud compared to our 2023 report. * Zscaler blocked 45% more IoT malware transactions than the previous year. ThreatLabz also observed a 12% rise in the number of attempts to deliver malware (payload deliveries) to IoT devices. 3. ThreatLabz discovered 200+ fake apps discovered on the Google Play Store. * This includes Anatsa, a known Android banking malware that uses PDF and QR code readers to distribute malware, which has targeted more than 650 financial institutions. 4. Legacy and end-of-life operating systems (OS) leave OT systems vulnerable. * Once air-gapped and isolated from the internet, OT and cyber-physical systems have rapidly become integrated into enterprise networks, enabling threats to proliferate. * ThreatLabz found that 50% or more of OT systems use end-of-life OS, many with known vulnerabilities, in an analysis of large-scale OT deployments. Meanwhile, risky protocols and services in east-west OT traffic abound. TOP MOBILE AND IOT/OT TARGETS 5. India was the top target for mobile attacks, experiencing 28% of all attacks, followed by the US, Canada, South Africa, and the Netherlands. Meanwhile, the United States remains the top target of IoT attacks, experiencing 81% of overall attacks, followed by Singapore, the UK, Germany, and Canada. 6. Manufacturing experienced the highest volume of IoT attacks, accounting for 36% of all IoT malware blocks observed, followed by transportation (14%) and food, beverage & tobacco (11%). Meanwhile, the technology and education sectors were most targeted by mobile threats. SECURING MOBILE, IOT, AND OT WITH ZERO TRUST As cyberattacks that target mobile and IoT/OT assets become more sophisticated, enterprises need a way to reduce cyber risk while, at the same time, embracing IoT and OT connectivity to drive business. Indeed, not only are IoT attacks growing, but threat actors are actively targeting OT devices and critical infrastructure, about which CISA has warned. Meanwhile, enterprises need a way to robustly secure mobile connectivity to any SaaS or private application, whether in the cloud or in the data center. To protect these devices and systems, enterprises should adopt a zero trust approach that mitigates cyberthreats and improves their security posture: * Discover, classify, and inventory IoT and OT assets: Work to gain full visibility into your IoT and OT attack surface; this includes discovering, classifying, and inventorying both managed and unmanaged or “shadow” devices. With this kind of holistic view, defenders can prioritize their efforts, identify key vulnerabilities, and develop a proactive approach to securing these assets. * Enable zero trust connectivity: Leverage a robust zero trust architecture that enables adaptive access decisions based on the real-time security and posture of user devices, risk factors, and device telemetry, ensuring secure direct connectivity between endpoints and applications—never to the underlying network. * Enforce zero trust device segmentation: Apply least-privileged access controls for device-to-application, user-to-application, and application-to-application segmentation. This granular level of segmentation eliminates lateral movement, minimizes data exposure, and strengthens your overall security posture by reducing the potential for a single compromised device to jeopardize the entire network. This should include isolating and fully segmenting agentless IoT/OT devices into a secure “network of one”, including legacy servers and headless machines. * Maintain consistent zero trust security policies: Ensure that zero trust access policies are consistently enforced across all environments, whether users are at headquarters, brand locations, or accessing applications remotely. Get your copy of the Zscaler ThreatLabz 2024 Mobile, IoT, and Ot Threat Report today. As mobile and IoT/OT threats proliferate, it’s critial to understand the latest trends, the implications of these kinds of attacks, and the best-practice strategies you can adopt to secure your organization against a full range of threats. Thank you for reading WAS THIS POST USEFUL? Yes, very! Not really EXPLORE MORE ZSCALER BLOGS ThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks Read post New AI Insights: Explore Key AI Trends and Risks in the ThreatLabz 2024 AI Security Report Read post New VPN Risk Report: 56% of Enterprises Attacked via VPN Vulnerabilities Read post GET THE LATEST ZSCALER BLOG UPDATES IN YOUR INBOX * Subscribe By submitting the form, you are agreeing to our privacy policy. THE ZSCALER EXPERIENCE Learn about: Your world, securedZero TrustSecure Access Service Edge (SASE)Security Service Edge (SSE)Zero Trust Network Access (ZTNA)Secure Web Gateway (SWG)Cloud Access Security Broker (CASB)Cloud Native Application Protection Platform (CNAPP)Data Security Posture Management (DSPM) PRODUCTS & SOLUTIONS Secure Your Users Secure Your Workloads Secure Your IoT and OT Secure Internet Access (ZIA) Data Protection (CASB/DLP) Digital Experience (ZDX) Industry & Market Solutions Partner Integrations Zscaler Client Connector PLATFORM Zero Trust Exchange Platform Secure Digital Transformation Network Transformation Application Transformation Security Transformation RESOURCES Resource Library Customer Success Stories Security Preview Threat Assessment Tools ThreatLabz Analytics & Insights Upcoming Events Blog Zscaler Academy CXO Revolutionaries Zpedia Ransomware Protection ROI Calculator POPULAR LINKS Pricing & Plans About Zscaler Leadership Team Career Opportunities Find or Become a Partner Customer Success Center Investor Relations Press Center News & Announcements ESG Compliance Contact Zscaler Home English FrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues - Brasil Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world's most established companies. English FrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues - Brasil * Subscribe Visit us on FacebookLinkedinFollow us on TwitterSubscribe our Youtube Channel SitemapPrivacyLegalSecurity © 2024 Zscaler, Inc. All rights reserved. Zscaler™ and other trademarks listed at zscaler.com/legal/trademarks are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners. Zscaler uses cookies, pixels, and other tools to collect information you provide to us and to capture and record your interaction with our site. We use this information to enhance site navigation, personalize content, analyze your use of our website, and assist in our marketing efforts and customer service. To deliver the best experience and to assist with our efforts, Zscaler social media, advertising, analytics, and hosting service providers may have access to the information that you provide to us. By clicking "Accept All," you consent to our collection, use, and disclosure of such information and to ourTerms of Service. For more information about our data processing practices, please see ourPrivacy Policy. Manage Cookie Preferences Reject All Accept All