Mobile Devices: The New Target for Cyberattacks in Enterprises Revealed by Zimperium

Rise of Mobile Cyber Threats



The increasing reliance on mobile technology by enterprises has brought significant security challenges as highlighted in Zimperium's 2025 Global Mobile Threat Report. The report indicates that 50% of mobile devices are operating on outdated systems, making them vulnerable to cybercriminals. These findings emphasize the urgent need for businesses to fortify their mobile security strategies.

Key Findings Overview



A staggering 69.3% of mobile phishing attacks now stem from SMS, a tactic known as Smishing. This signifies a growing trend where phishers exploit devices with lenient security measures. Furthermore, vishing—voice call phishing—has surged by 28%, complementing the rise in both Smishing and PDF phishing methods.

Research reveals that over 25% of mobile devices can’t upgrade to the latest operating system versions. This glaring issue exacerbates their susceptibility to threats. Equally concerning is that over 60% of iOS applications and 34% of Android apps lack adequate code protection, leaving sensitive user information and personally identifiable information (PII) at risk of leakage.

Emphasis on Mishing and Mobile Malware



Mishing has evolved into a primary concern for organizations as it offers a lower detection risk due to user inattention. As cybercriminals refine their tactics, businesses remain ill-prepared, resulting in heightened exposure to risks. Malware continues to be the preferred weapon among malicious actors, with Zimperium reporting a 50% year-on-year increase in Trojan threats. Notable new families of banker Trojans—like Vultur and DroidBot—introduce advanced evasion techniques that pose substantial challenges to enterprise security.

Moreover, the vulnerability of apps downloaded outside official channels is alarming. Compromised applications can infiltrate corporate environments, risking sensitive business data linked between unsafe apps and necessary work applications. This risk is compounded by the reality that many internally developed mobile apps lack sufficient security measures, making them susceptible to exploitation.

Constant Evolution of Threats in Mobile Environments



According to Kern Smith from Zimperium, the strategies employed by bad actors are evolving, often going unnoticed until significant damage is done. Businesses must adopt a real-time threat visibility strategy alongside robust protection approaches to tackle these ever-adapting threats.

Zimperium’s report underscores that with over 50% of devices operating on outdated systems, even well-protected apps cannot ensure safety without proper device verification processes such as attestation. This reality insists that enterprises reassess not just their mobile app security but also their overall mobile strategy.

Methodology Behind the Report



Zimperium's data, used to compile these findings, came from anonymized inputs from their Mobile Threat Defense solution, analyzing threats encountered across a range of mobile devices globally. The feedback over the past year reveals emergent risks threatening the integrity of mobile operations. An understanding of these threats is critical for enterprises striving for operational integrity and user trust.

For businesses eager to delve deeper into the detailed insights provided in the full 2025 Global Mobile Threat Report, Zimperium recommends accessing the full text. The report provides valuable strategies for strengthening mobile security and safeguarding sensitive data effectively in a rapidly evolving threat landscape.

Conclusion



As organizations integrate mobile technology into their operations, it is crucial to develop a comprehensive security strategy to combat the growing tide of mobile-specific threats. With Zimperium as a leader in mobile security solutions, businesses have the tools to maintain the integrity of their mobile environments, ensuring that data, applications, and users remain secure against the ever-present threat of cybercrime.

To learn how Zimperium can help protect your enterprise from these emerging threats, visit Zimperium's website.

Topics Consumer Technology)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.