Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
Home/Threats/India: Mobile Attack Threats Surge 38%, Top Continues Target
Threats

India: Mobile Attack Threats Surge 38%, Top Continues Target

India is grappling with an unprecedented surge in mobile malware attacks. The latest Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report reveals a staggering 38% increase in threats compared to...

Emy Elsamnoudy
Emy Elsamnoudy
January 12, 2026 2 Min Read
7 0

India is grappling with an unprecedented surge in mobile malware attacks. The latest Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report reveals a staggering 38% increase in threats compared to the previous year.

The country has solidified its position as the global epicenter for mobile attacks, accounting for 26% of all mobile malware traffic worldwide, surpassing traditional targets like the United States at 15% and Canada at 14%.

This alarming trend reflects the growing vulnerability of the nation’s digital landscape as threat actors systematically target the country’s expanding mobile ecosystem.

The research reveals that hundreds of malicious applications have infiltrated trusted platforms, with 239 malicious apps discovered on the Google Play Store alone, collectively downloaded over 42 million times.

These applications employ sophisticated disguises, masquerading as legitimate productivity and workflow tools that appeal to users engaged in hybrid and remote work environments.

The attackers deliberately target the “Tools” category to exploit user trust in functionality-driven applications, capitalizing on the integration of mobile devices into professional workflows.

This represents a 67% year-over-year increase in Android malware transactions, underscoring the escalating risks posed by spyware and banking malware to the Indian user base.

Zscaler analysts identified that threat actors are strategically focusing on high-value industries where the potential for maximum impact is greatest.

Retail and Wholesale businesses emerge as the primary targets with 38% of attacks, followed closely by Hospitality, Restaurants and Leisure sectors at 31%. Manufacturing environments face 16% of attacks, while Energy, Utilities, and Oil & Gas operations experience 8% of the targeting.

This concentration in consumer-facing and operations-heavy environments reveals attackers’ focus on high-transaction and high-dependency deployments that can yield significant financial gains or operational disruption.

Infection Mechanism and Persistence Tactics

The malware landscape in India is dominated by backdoor and botnet-style families that establish persistent access to compromised devices. The IoT.Backdoor.Gen.LZ family leads detections at 85%, followed by ABRisk.IOTX at 8% and IoT.Exploit.CVE.2020.8195 at 1%.

These malware families operate through layered injection techniques, where initial payloads download secondary modules that establish command-and-control communications.

The backdoor mechanisms allow attackers to maintain long-term access while remaining dormant, activating only when receiving specific commands from remote servers.

This persistence strategy enables threat actors to exfiltrate sensitive data gradually while avoiding immediate detection.

The widespread adoption of these families demonstrates attackers’ commitment to establishing robust infrastructure for sustained operations across Indian infrastructure and consumer devices.

Security experts emphasize that organizations must implement comprehensive Zero Trust architectures combined with continuous traffic inspection and mobile threat defense integration to effectively counter these sophisticated attacks and protect their users and critical systems from compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwareSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Critical React Router Flaw Exposes Server Files to Attack

Next Post

Top 10 Best DDoS Protection Tools & Services – 2026

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
JDownloader Hacked to Infect Users with New Python RAT
May 11, 2026
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us