42 million downloads
The Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, published on November 5, 2025, paints a concerning picture of the evolving threat landscape. The report highlights a 67% year-over-year increase in Android malware, underscoring the persistent challenge of keeping malicious applications off official app stores. Researchers discovered 239 distinct malware-laden apps on the Google Play Store that were downloaded a staggering 42 million times. These apps frequently disguised themselves as benign 'Tools' to gain user trust. Furthermore, the report signals a significant pivot by threat actors towards Industrial Control Systems (ICS), with IoT/OT attacks against the energy sector skyrocketing by 387%. This dual trend indicates that attackers are simultaneously scaling consumer-level threats while sharpening their focus on high-value critical infrastructure targets.
The report identifies two major areas of escalating risk:
1. Mobile Malware Proliferation: Despite efforts by Google to secure its ecosystem, threat actors continue to successfully publish malicious apps on the Play Store. The primary findings include:
This demonstrates that social engineering remains a highly effective distribution vector, as users willingly grant permissions to apps they believe are legitimate.
2. Surge in IoT/OT Attacks: The report reveals a dramatic and alarming increase in attacks targeting Operational Technology (OT) and the Internet of Things (IoT), particularly within critical infrastructure sectors.
This trend suggests that threat actors are moving from opportunistic IoT attacks to deliberate targeting of critical national infrastructure, posing a risk of physical disruption and damage.
The mobile malware detailed in the report often uses common TTPs:
T1447 - Masquerade as Legitimate Application): Attackers create apps with convincing icons, descriptions, and functionalities that mimic legitimate tools, such as file converters, QR code scanners, or system cleaners.For OT attacks, threat actors often exploit exposed and unpatched IoT devices, using default credentials or known vulnerabilities to gain a foothold before attempting to pivot into the core OT network.
Specific names or hashes of the 239 malicious applications were not provided in the source articles.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| other | Excessive application permissions requests. | An app asking for permissions that don't align with its function (e.g., a calculator asking for SMS access). | Review permissions during app installation and periodically audit installed apps. | high |
| network_traffic_pattern | Mobile device making connections to known malicious domains or C2 servers. | A sign that a malicious app is communicating with its operator. | Use a Mobile Threat Defense (MTD) solution or monitor DNS queries from mobile devices. | medium |
| log_source | OT/ICS network logs |
Unusual protocols or connections between the IT and OT networks. | Monitor traffic crossing the IT/OT boundary for any unauthorized communication. | high |
Train users to be cautious when installing mobile applications, to scrutinize requested permissions, and to only install apps from reputable developers.
Deploy Mobile Threat Defense (MTD) solutions, which act as antivirus for mobile devices, to detect and block malicious applications and behavior.
For OT environments, strictly segment the OT network from the corporate IT network to prevent attackers from pivoting between them.
Mapped D3FEND Techniques:
To combat the threat of malicious Android apps from the Google Play store, organizations should implement Application Configuration Hardening through a Mobile Device Management (MDM) or Unified Endpoint Management (UEM) platform. This involves creating an enterprise-approved app catalog that contains only applications that have been vetted and approved by the IT security team. The MDM policy should then be configured to block users from installing any applications that are not on this allowlist. For BYOD environments where this is not feasible, the policy should at a minimum enforce the 'Block installation from unknown sources' setting and use the MDM's compliance engine to alert on or block devices that have sideloaded apps. This reduces the attack surface by ensuring that employees are only using applications that have passed a security review, mitigating the risk of downloading one of the hundreds of malicious 'Tools' apps highlighted in the Zscaler report.
The dramatic surge in attacks on OT environments, particularly in the energy sector, makes Network Isolation a critical, non-negotiable defense. Organizations must enforce strict segmentation between their corporate IT networks and their OT networks. This should be implemented using a DMZ (Demilitarized Zone) architecture, often referred to as the Purdue Model. All communication between IT and OT must pass through this DMZ and be inspected by a firewall. Ideally, for the most critical systems, a unidirectional gateway should be used to ensure that data can only flow from OT to IT, making it physically impossible for an attack to propagate from the IT network into the control systems. This isolation prevents a malware infection on a corporate laptop from spreading to the programmable logic controllers (PLCs) that manage physical processes, thereby mitigating the risk of catastrophic physical disruption.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats