Workflow
Zscaler Zero Trust Branch
icon
Search documents
Zscaler ThreatLabz Reveals 67% Jump in Android Malware and 40% of IoT Attacks Target Critical Industries and Hybrid Work
Globenewswire· 2025-11-05 08:01
Core Insights - Zscaler's 2025 ThreatLabz Mobile, IoT, and OT Threat Report highlights the increasing sophistication of malware attacks, with a significant rise in malicious applications targeting productivity tools [1][2] - The report indicates a 67% year-over-year increase in Android malware transactions, with 239 malicious apps identified on the Google Play Store, collectively downloaded over 42 million times [2][10] - The energy sector has seen a staggering 387% increase in attacks, emphasizing the growing threat to critical infrastructure [4][10] Mobile Threat Landscape - Malicious apps are primarily distributed through the "Tools" category, exploiting user trust in productivity applications, especially in hybrid work environments [3] - The top three countries for mobile attacks are India (26%), the United States (15%), and Canada (14%), with India experiencing a 38% increase in mobile threat attacks [7][10] - Adware has become the most prevalent mobile threat, accounting for 69% of cases, surpassing the Joker malware family [11] IoT and OT Threats - Manufacturing and Transportation sectors are the most targeted in IoT attacks, each representing 20.2% of all observed incidents, indicating a diversification of threat actor focus [5] - The Mirai family of malware accounts for approximately 40% of blocked IoT transactions, with Mozi and Gafgyt together making up about 75% of all malicious payloads in IoT environments [6] - The United States is identified as the epicenter for IoT threats, with 54.1% of IoT malware traffic originating from there [7][10] Recommendations and Solutions - A Zero Trust approach combined with AI-powered threat detection is recommended to mitigate the risks posed by evolving attacks [7] - Zscaler's Zero Trust Branch and Cellular solutions aim to enhance security for mobile and IoT devices, ensuring continuous verification and robust policy enforcement [12][13]