❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

IT threat evolution in Q3 2025. Mobile statistics

19 November 2025 at 05:00

IT threat evolution in Q3 2025. Mobile statistics
IT threat evolution in Q3 2025. Non-mobile statistics

The quarter at a glance

In the third quarter of 2025, we updated the methodology for calculating statistical indicators based on the Kaspersky Security Network. These changes affected all sections of the report except for the statistics on installation packages, which remained unchanged.

To illustrate the differences between the reporting periods, we have also recalculated data for the previous quarters. Consequently, these figures may significantly differ from the previously published ones. However, subsequent reports will employ this new methodology, enabling precise comparisons with the data presented in this post.

The Kaspersky Security Network (KSN) is a global network for analyzing anonymized threat information, voluntarily shared by users of Kaspersky solutions. The statistics in this report are based on KSN data unless explicitly stated otherwise.

The quarter in numbers

According to Kaspersky Security Network, in Q3Β 2025:

  • 47 million attacks utilizing malware, adware, or unwanted mobile software were prevented.
  • Trojans were the most widespread threat among mobile malware, encountered by 15.78% of all attacked users of Kaspersky solutions.
  • More than 197,000 malicious installation packages were discovered, including:
    • 52,723 associated with mobile banking Trojans.
    • 1564 packages identified as mobile ransomware Trojans.

Quarterly highlights

The number of malware, adware, or unwanted software attacks on mobile devices, calculated according to the updated rules, totaled 3.47 million in the third quarter. This is slightly less than the 3.51 million attacks recorded in the previous reporting period.

Attacks on users of Kaspersky mobile solutions, Q2 2024Β β€” Q3 2025 (download)

At the start of the quarter, a user complained to us about ads appearing in every browser on their smartphone. We conducted an investigation, discovering a new version of the BADBOX backdoor, preloaded on the device. This backdoor is a multi-level loader embedded in a malicious native library, librescache.so, which was loaded by the system framework. As a result, a copy of the Trojan infiltrated every process running on the device.

Another interesting finding was Trojan-Downloader.AndroidOS.Agent.no, which was embedded in mods for messaging and other apps. It downloaded Trojan-Clicker.AndroidOS.Agent.bl onto the device. The clicker received a URL from its server where an ad was being displayed, opened it in an invisible WebView window, and used machine learning algorithms to find and click the close button. In this way, fraudsters exploited the user’s device to artificially inflate ad views.

Mobile threat statistics

In the third quarter, Kaspersky security solutions detected 197,738 samples of malicious and unwanted software for Android, which is 55,000 more than in the previous reporting period.

Detected malicious and potentially unwanted installation packages, Q3 2024Β β€” Q3 2025 (download)

The detected installation packages were distributed by type as follows:

Detected mobile apps by type, Q2*Β β€” Q3 2025 (download)

* Changes in the statistical calculation methodology do not affect this metric. However, data for the previous quarter may differ slightly from previously published figures due to a retrospective review of certain verdicts.

The share of banking Trojans decreased somewhat, but this was due less to a reduction in their numbers and more to an increase in other malicious and unwanted packages. Nevertheless, banking Trojans, still dominated by Mamont packages, continue to hold the top spot. The rise in Trojan droppers is also linked to them: these droppers are primarily designed to deliver banking Trojans.

Share* of users attacked by the given type of malicious or potentially unwanted app out of all targeted users of Kaspersky mobile products, Q2Β β€” Q3 2025 (download)

*Β The total may exceed 100% if the same users experienced multiple attack types.

Adware leads the pack in terms of the number of users attacked, with a significant margin. The most widespread types of adware are HiddenAd (56.3%) and MobiDash (27.4%). RiskTool-type unwanted apps occupy the second spot. Their growth is primarily due to the proliferation of the Revpn module, which monetizes user internet access by turning their device into a VPN exit point. The most popular Trojans predictably remain Triada (55.8%) and Fakemoney (24.6%). The percentage of users who encountered these did not undergo significant changes.

TOP 20 most frequently detected types of mobile malware

Note that the malware rankings below exclude riskware and potentially unwanted software, such as RiskTool or adware.

Verdict %* Q2 2025 %* Q3 2025 Difference in p.p. Change in ranking
Trojan.AndroidOS.Triada.ii 0.00 13.78 +13.78
Trojan.AndroidOS.Triada.fe 12.54 10.32 –2.22 –1
Trojan.AndroidOS.Triada.gn 9.49 8.56 –0.93 –1
Trojan.AndroidOS.Fakemoney.v 8.88 6.30 –2.59 –1
Backdoor.AndroidOS.Triada.z 3.75 4.53 +0.77 +1
DangerousObject.Multi.Generic. 4.39 4.52 +0.13 –1
Trojan-Banker.AndroidOS.Coper.c 3.20 2.86 –0.35 +1
Trojan.AndroidOS.Triada.if 0.00 2.82 +2.82
Trojan-Dropper.Linux.Agent.gen 3.07 2.64 –0.43 +1
Trojan-Dropper.AndroidOS.Hqwar.cq 0.37 2.52 +2.15 +60
Trojan.AndroidOS.Triada.hf 2.26 2.41 +0.14 +2
Trojan.AndroidOS.Triada.ig 0.00 2.19 +2.19
Backdoor.AndroidOS.Triada.ab 0.00 2.00 +2.00
Trojan-Banker.AndroidOS.Mamont.da 5.22 1.82 –3.40 –10
Trojan-Banker.AndroidOS.Mamont.hi 0.00 1.80 +1.80
Trojan.AndroidOS.Triada.ga 3.01 1.71 –1.29 –5
Trojan.AndroidOS.Boogr.gsh 1.60 1.68 +0.08 0
Trojan-Downloader.AndroidOS.Agent.nq 0.00 1.63 +1.63
Trojan.AndroidOS.Triada.hy 3.29 1.62 –1.67 –12
Trojan-Clicker.AndroidOS.Agent.bh 1.32 1.56 +0.24 0

* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.

The top positions in the list of the most widespread malware are once again occupied by modified messaging apps Triada.ii, Triada.fe, Triada.gn, and others. The pre-installed backdoor Triada.z ranked fifth, immediately following Fakemoney – fake apps that collect users’ personal data under the guise of providing payments or financial services. The dropper that landed in ninth place, Agent.gen, is an obfuscated ELF file linked to the banking Trojan Coper.c, which sits immediately after DangerousObject.Multi.Generic.

Region-specific malware

In this section, we describe malware that primarily targets users in specific countries.

Verdict Country* %**
Trojan-Dropper.AndroidOS.Hqwar.bj Turkey 97.22
Trojan-Banker.AndroidOS.Coper.c Turkey 96.35
Trojan-Dropper.AndroidOS.Agent.sm Turkey 95.10
Trojan-Banker.AndroidOS.Coper.a Turkey 95.06
Trojan-Dropper.AndroidOS.Agent.uq India 92.20
Trojan-Banker.AndroidOS.Rewardsteal.qh India 91.56
Trojan-Banker.AndroidOS.Agent.wb India 85.89
Trojan-Dropper.AndroidOS.Rewardsteal.ab India 84.14
Trojan-Dropper.AndroidOS.Banker.bd India 82.84
Backdoor.AndroidOS.Teledoor.a Iran 81.40
Trojan-Dropper.AndroidOS.Hqwar.gy Turkey 80.37
Trojan-Dropper.AndroidOS.Banker.ac India 78.55
Trojan-Ransom.AndroidOS.Rkor.ii Germany 76.90
Trojan-Dropper.AndroidOS.Banker.bg India 75.12
Trojan-Banker.AndroidOS.UdangaSteal.b Indonesia 75.00
Trojan-Dropper.AndroidOS.Banker.bc India 74.73
Backdoor.AndroidOS.Teledoor.c Iran 70.33

* The country where the malware was most active.
** Unique users who encountered this Trojan modification in the indicated country as a percentage of all Kaspersky mobile security solution users attacked by the same modification.

Banking Trojans, primarily Coper, continue to operate actively in Turkey. Indian users also attract threat actors distributing this type of software. Specifically, the banker Rewardsteal is active in the country. Teledoor backdoors, embedded in a fake Telegram client, have been deployed in Iran.
Notable is the surge in Rkor ransomware Trojan attacks in Germany. The activity was significantly lower in previous quarters. It appears the fraudsters have found a new channel for delivering malicious apps to users.

Mobile banking Trojans

In the third quarter of 2025, 52,723 installation packages for mobile banking Trojans were detected, 10,000 more than in the second quarter.

Installation packages for mobile banking Trojans detected by Kaspersky, Q3Β 2024Β β€” Q3Β 2025 (download)

The share of the Mamont Trojan among all bankers slightly increased again, reaching 61.85%. However, in terms of the share of attacked users, Coper moved into first place, with the same modification being used in most of its attacks. Variants of Mamont ranked second and lower, as different samples were used in different attacks. Nevertheless, the total number of users attacked by the Mamont family is greater than that of users attacked by Coper.

TOP 10 mobile bankers

Verdict %* Q2 2025 %* Q3 2025 Difference in p.p. Change in ranking
Trojan-Banker.AndroidOS.Coper.c 13.42 13.48 +0.07 +1
Trojan-Banker.AndroidOS.Mamont.da 21.86 8.57 –13.28 –1
Trojan-Banker.AndroidOS.Mamont.hi 0.00 8.48 +8.48
Trojan-Banker.AndroidOS.Mamont.gy 0.00 6.90 +6.90
Trojan-Banker.AndroidOS.Mamont.hl 0.00 4.97 +4.97
Trojan-Banker.AndroidOS.Agent.ws 0.00 4.02 +4.02
Trojan-Banker.AndroidOS.Mamont.gg 0.40 3.41 +3.01 +35
Trojan-Banker.AndroidOS.Mamont.cb 3.03 3.31 +0.29 +5
Trojan-Banker.AndroidOS.Creduz.z 0.17 3.30 +3.13 +58
Trojan-Banker.AndroidOS.Mamont.fz 0.07 3.02 +2.95 +86

*Β Unique users who encountered this malware as a percentage of all Kaspersky mobile security solution users who encountered banking threats.

Mobile ransomware Trojans

Due to the increased activity of mobile ransomware Trojans in Germany, which we mentioned in the Region-specific malware section, we have decided to also present statistics on this type of threat. In the third quarter, the number of ransomware Trojan installation packages more than doubled, reaching 1564.

Verdict %* Q2 2025 %* Q3 2025 Difference in p.p. Change in ranking
Trojan-Ransom.AndroidOS.Rkor.ii 7.23 24.42 +17.19 +10
Trojan-Ransom.AndroidOS.Rkor.pac 0.27 16.72 +16.45 +68
Trojan-Ransom.AndroidOS.Congur.aa 30.89 16.46 –14.44 –1
Trojan-Ransom.AndroidOS.Svpeng.ac 30.98 16.39 –14.59 –3
Trojan-Ransom.AndroidOS.Rkor.it 0.00 10.09 +10.09
Trojan-Ransom.AndroidOS.Congur.cw 15.71 9.69 –6.03 –3
Trojan-Ransom.AndroidOS.Congur.ap 15.36 9.16 –6.20 –3
Trojan-Ransom.AndroidOS.Small.cj 14.91 8.49 –6.42 –3
Trojan-Ransom.AndroidOS.Svpeng.snt 13.04 8.10 –4.94 –2
Trojan-Ransom.AndroidOS.Svpeng.ah 13.13 7.63 –5.49 –4

*Β Unique users who encountered the malware as a percentage of all Kaspersky mobile security solution users attacked by ransomware Trojans.

IT threat evolution in Q2 2025. Mobile statistics

5 September 2025 at 05:00

IT threat evolution in Q2 2025. Mobile statistics
IT threat evolution in Q2 2025. Non-mobile statistics

The mobile section of our quarterly cyberthreat report includes statistics on malware, adware, and potentially unwanted software for Android, as well as descriptions of the most notable threats for Android and iOS discovered during the reporting period. The statistics in this report are based on detection alerts from Kaspersky products, collected from users who consented to provide anonymized data to Kaspersky Security Network.

Quarterly figures

According to Kaspersky Security Network, in Q2 2025:

  • Our solutions blocked 10.71 million malware, adware, and unwanted mobile software attacks.
  • Trojans, the most common mobile threat, affected 31.69% of Kaspersky users who encountered mobile threats during the reporting period.
  • Just under 143,000 malicious installation packages were detected, of which:
    • 42,220 were mobile banking Trojans;
    • 695 packages were mobile ransomware Trojans.

Quarterly highlights

Mobile attacks involving malware, adware, and unwanted software dropped to 10.71 million.

Attacks on users of Kaspersky mobile solutions, Q4 2023 β€” Q2 2025 (download)

The trend is mainly due to a decrease in the activity of RiskTool.AndroidOS.SpyLoan. These are applications typically associated with microlenders and containing a potentially dangerous framework for monitoring borrowers and collecting their data, such as contacts lists. Curiously, such applications have been found pre-installed on some devices.

In Q2, we found a new malicious app for Android and iOS that was stealing images from the gallery. We were able to determine that this campaign was linked to the previously discovered SparkCat, so we dubbed it SparkKitty.

Fake app store page distributing SparkKitty

Fake app store page distributing SparkKitty

Like its β€œbig brother”, the new malware most likely targets recovery codes for crypto wallets saved as screenshots.

Trojan-DDoS.AndroidOS.Agent.a was this past quarter’s unusual discovery. Malicious actors embedded an SDK for conducting dynamically configurable DDoS attacks into apps designed for viewing adult content. The Trojan allows for sending specific data to addresses designated by the attacker at a set frequency. Building a DDoS botnet from mobile devices with adult apps installed may seem like a questionable venture in terms of attack efficiency and power – but apparently, some cybercriminals have found a use for this approach.

In Q2, we also encountered Trojan-Spy.AndroidOS.OtpSteal.a, a fake VPN client that hijacks user accounts. Instead of the advertised features, it uses the Notification Listener service to intercept OTP codes from various messaging apps and social networks, and sends them to the attackers’ Telegram chat via a bot.

Mobile threat statistics

The number of Android malware and potentially unwanted app samples decreased from Q1, reaching a total of 142,762 installation packages.

Detected malware and potentially unwanted app installation packages, Q2 2024 β€” Q2 2025 (download)

The distribution of detected installation packages by type in Q2 was as follows:

Detected mobile malware by type, Q1 β€” Q2 2025 (download)

*Β Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.

Banking Trojans remained in first place, with their share increasing relative to Q1. The Mamont family continues to dominate this category. In contrast, spy Trojans dropped to fifth place as the surge in the number of APK files for the SMS-stealing Trojan-Spy.AndroidOS.Agent.akg subsided. The number of Agent.amw spyware files, which masquerade as casino apps, also decreased.

RiskTool-type unwanted apps and adware ranked second and third, respectively, while Trojans – with most files belonging to the Triada family – occupied the fourth place.

Share* of users attacked by the given type of malicious or potentially unwanted apps out of all targeted users of Kaspersky mobile products, Q1 β€” Q2 2025 (download)

*Β The total may exceed 100% if the same users experienced multiple attack types.

The distribution of attacked users remained close to that of the previous quarter. The increase in the share of backdoors is linked to the discovery of Backdoor.Triada.z, which came pre-installed on devices. As for adware, the proportion of users affected by the HiddenAd family has grown.

TOPΒ 20 most frequently detected types of mobile malware

Note that the malware rankings below exclude riskware or potentially unwanted software, such as RiskTool or adware.

Verdict %* Q1 2025 %* Q2 2025 Difference (p.p.) Change in rank
Trojan.AndroidOS.Fakemoney.v 26.41 14.57 -11.84 0
Trojan-Banker.AndroidOS.Mamont.da 11.21 12.42 +1.20 +2
Backdoor.AndroidOS.Triada.z 4.71 10.29 +5.58 +3
Trojan.AndroidOS.Triada.fe 3.48 7.16 +3.69 +4
Trojan-Banker.AndroidOS.Mamont.ev 0.00 6.97 +6.97
Trojan.AndroidOS.Triada.gn 2.68 6.54 +3.86 +3
Trojan-Banker.AndroidOS.Mamont.db 16.00 5.50 -10.50 -4
Trojan-Banker.AndroidOS.Mamont.ek 1.83 5.09 +3.26 +7
DangerousObject.Multi.Generic. 19.30 4.21 -15.09 -7
Trojan-Banker.AndroidOS.Mamont.eb 1.59 2.58 +0.99 +7
Trojan.AndroidOS.Triada.hf 3.81 2.41 -1.40 -4
Trojan-Downloader.AndroidOS.Dwphon.a 2.19 2.24 +0.05 0
Trojan-Banker.AndroidOS.Mamont.ef 2.44 2.20 -0.24 -2
Trojan-Banker.AndroidOS.Mamont.es 0.05 2.13 +2.08
Trojan-Banker.AndroidOS.Mamont.dn 1.46 2.13 +0.67 +5
Trojan-Downloader.AndroidOS.Agent.mm 1.45 1.56 +0.11 +6
Trojan-Banker.AndroidOS.Agent.rj 1.86 1.45 -0.42 -3
Trojan-Banker.AndroidOS.Mamont.ey 0.00 1.42 +1.42
Trojan-Banker.AndroidOS.Mamont.bc 7.61 1.39 -6.23 -14
Trojan.AndroidOS.Boogr.gsh 1.41 1.36 -0.06 +3

*Β Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.

The activity of Fakemoney scam apps noticeably decreased in Q2, but they still held the top position. Almost all the other entries on the list are variants of the popular banking Trojan Mamont, pre-installed Trojans like Triada and Dwphon, and modified messaging apps with the Triada Trojan built in (Triada.fe, Triada.gn, Triada.ga, and Triada.gs).

Region-specific malware

This section describes malware types that mostly affected specific countries.

Verdict Country* %**
Trojan-Banker.AndroidOS.Coper.c TΓΌrkiye 98.65
Trojan-Banker.AndroidOS.Coper.a TΓΌrkiye 97.78
Trojan-Dropper.AndroidOS.Rewardsteal.h India 95.62
Trojan-Banker.AndroidOS.Rewardsteal.lv India 95.48
Trojan-Dropper.AndroidOS.Agent.sm TΓΌrkiye 94.52
Trojan.AndroidOS.Fakeapp.hy Uzbekistan 86.51
Trojan.AndroidOS.Piom.bkzj Uzbekistan 85.83
Trojan-Dropper.AndroidOS.Pylcasa.c Brazil 83.06

*Β The country where the malware was most active.
**Β Unique users who encountered this Trojan variant in the indicated country as a percentage of all Kaspersky mobile security solution users attacked by the same variant.

In addition to the typical banking Trojans for this category – Coper, which targets users in TΓΌrkiye, and Rewatrdsteal, active in India – the list also includes the fake job search apps Fakeapp.hy and Piom.bkzj, which specifically target Uzbekistan. Both families collect the user’s personal data. Meanwhile, new droppers named β€œPylcasa” operated in Brazil. They infiltrate Google Play by masquerading as simple apps, such as calculators, but once launched, they open a URL provided by malicious actors – similar to Trojans of the Fakemoney family. These URLs may lead to illegal casino websites or phishing pages.

Mobile banking Trojans

The number of banking Trojans detected in Q2 2025 was slightly lower than in Q1 but still significantly exceeded the figures for 2024. Kaspersky solutions detected a total of 42,220 installation packages of this type.

Number of installation packages for mobile banking Trojans detected by Kaspersky, Q2 2024 β€” Q2 2025 (download)

The bulk of mobile banking Trojan installation packages still consists of various modifications of Mamont, which account for 57.7%. In terms of the share of affected users, Mamont also outpaced all its competitors, occupying nearly all the top spots on the list of the most widespread banking Trojans.

TOP 10 mobile bankers

Verdict %* Q1 2025 %* Q2 2025 Difference (p.p.) Change in rank
Trojan-Banker.AndroidOS.Mamont.da 26.68 30.28 +3.59 +1
Trojan-Banker.AndroidOS.Mamont.ev 0.00 17.00 +17.00
Trojan-Banker.AndroidOS.Mamont.db 38.07 13.41 -24.66 -2
Trojan-Banker.AndroidOS.Mamont.ek 4.37 12.42 +8.05 +2
Trojan-Banker.AndroidOS.Mamont.eb 3.80 6.29 +2.50 +2
Trojan-Banker.AndroidOS.Mamont.ef 5.80 5.36 -0.45 -2
Trojan-Banker.AndroidOS.Mamont.es 0.12 5.20 +5.07 +23
Trojan-Banker.AndroidOS.Mamont.dn 3.48 5.20 +1.72 +1
Trojan-Banker.AndroidOS.Agent.rj 4.43 3.53 -0.90 -4
Trojan-Banker.AndroidOS.Mamont.ey 0.00 3.47 +3.47 9

Conclusion

In Q2 2025, the number of attacks involving malware, adware, and unwanted software decreased compared to Q1. At the same time, Trojans and banking Trojans remained the most common threats, particularly the highly active Mamont family. Additionally, the quarter was marked by the discovery of the second spyware Trojan of 2025 to infiltrate the App Store, along with a fake VPN client stealing OTP codes and a DDoS bot concealed within porn-viewing apps.

❌
❌