Cybersecurity firm Kaspersky has released two major reports revealing alarming trends in digital threats. One highlights a dramatic surge in mobile banking malware targeting Android users, while the other identifies supply chain compromises as the leading risk for businesses worldwide. Together, the findings underscore how cybercriminals are exploiting both personal devices and interconnected corporate ecosystems.
According to Kaspersky’s analysis of detection data from its security products, attacks involving Trojan banker malware on Android smartphones jumped 56 percent in 2025 compared to the previous year.
These sophisticated programs are designed to steal login credentials for online banking, digital payment platforms, and credit card accounts.
Attackers distribute the malware primarily through messaging applications and compromised websites, constantly refining their methods to bypass security measures.
The volume of new installation packages for these threats exploded even more dramatically, with 255,090 unique APK files detected—a staggering 271 percent increase.
Leading malware families such as Mamont and Creduz continue to dominate, but researchers note that threat actors are rapidly expanding delivery channels and creating fresh variants.
Adding to the concern, pre-installed backdoors like Triada and Keenadu are appearing more frequently in the firmware of brand-new Android devices.
Once embedded, these backdoors grant attackers near-total control over the phone, making removal extremely difficult and exposing all user data.
Kaspersky malware analyst team lead Anton Kivva emphasized that Trojan bankers represent the fastest-growing category of mobile threats.
He advised users to install apps exclusively from official stores, carefully review permissions—especially Accessibility Services—and keep both the operating system and applications updated.
Installing reputable security software is also essential for real-time protection.
Shifting focus to the corporate world, Kaspersky’s survey of 1,714 IT and security professionals across 16 countries found that supply chain attacks topped the list of threats experienced by enterprises in the past 12 months.
Globally, 31 percent of organizations reported being directly impacted, with the figure rising to 36 percent among large enterprises employing more than 2,500 staff.
These companies typically manage around 100 software and hardware suppliers and grant access to over 130 contractors—vastly expanding their attack surface.
Regions showing above-average exposure include Mexico (43 percent), China (40 percent), and Spain (40 percent).
Attacks exploiting trusted relationships—where hackers leverage legitimate vendor connections—also ranked in the global top five, affecting 25 percent of respondents.
Despite their frequency, many organizations continue to underestimate these risks; only a small minority rank supply chain incidents as their top priority.
Sergey Soldatov, head of Kaspersky’s Security Operations Center, stressed that modern businesses operate in a highly interconnected digital ecosystem. Every supplier and integration point becomes a potential entry for attackers.
He called for an “ecosystem-wide” security strategy that extends beyond internal defenses.
To mitigate these dangers, Kaspersky recommends rigorous supplier vetting, contractual security clauses, zero-trust architecture, continuous monitoring with extended detection and response tools, and proper incident response plans that include isolating compromised vendors.
The reports serve as a reminder: whether on personal smartphones or in sprawling enterprise networks, vigilance across the entire digital supply chain has never been more critical.