The Mobile Malware Protection policy protects users from inadvertently downloading or using mobile applications that contain vulnerabilities, perform malicious activities, send or receive information from malicious websites, or leak personal, device-specific, or other sensitive information from their devices.
Mobile Malware Protection includes two mobile app security actions:
- Malicious Activity: Blocks apps that are known to be malicious, compromised, or perform activities unknown to, or hidden from, the user. Examples include:
- Known malware (e.g., signature, hash, or YARA rule)
- Communication with malicious websites or command and control (C2) infrastructure
- Performing device or personal information collection and harvesting (e.g., phone number, SMS messages, email address, or location coordinates)
- Performing suspicious actions or displaying suspicious behavioral indicators
- Known Vulnerability: Blocks apps which contain vulnerabilities or are using insecure features, modules or protocols. Examples include:
- Common vulnerabilities and exposures (CVEs)
- Use of insecure operations or features, such as vulnerable version of SSL/TLS
Comments