This page will soon be deactivated—explore our new, faster, mobile-friendly site, now centralized in MyWorkspace!

Connecting the world and beyond

  •  
Submarine cables

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
Equivalent number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T X.1130 (12/2025)

عربي | 中文 | English | Español | Français | Русский
Technical guidelines for detecting malicious activities of mobile applications
With the widespread use of mobile devices and applications, APPs have become a primary vector for malicious activities. The attackers gain users' trust by disguising a malicious APP as a legitimate one, to obtain economic benefits. For example, malicious APPs may be disguised as legitimate credit or shopping applications to deceive users for financial gain. To detect and prevent such malicious activities, traditional approaches rely on APP store reviews and alerts from security software installed in the mobile device. However, this solution faces several challenges. While APP store reviews can help block malicious applications, attackers continuously develop new techniques to evade detection and bypass APP store reviews. In addition, some malicious applications are distributed through third-party platforms where they entice users to download and install them. Mobile security software primarily focuses on detecting viruses and application vulnerabilities making it difficult to effectively identify malicious applications specifically designed to carry out malicious activities.
Malicious applications on mobile devices typically operate through four stages: download, installation, execution and payment inducement. Each stage presents distinct risks.
During the download and installation stage, malicious applications often disguise themselves as legitimate applications to evade detection by security software. They may also implant Trojans on the mobile device during this phase.
In the execution stage, these applications may steal user information through the implanted Trojans or trick users into voluntarily disclosing sensitive data by mimicking legitimate applications.
In the payment inducement stage, malicious applications often build trust by offering small rewards or profits through various schemes. Once user trust is established, they lure users into transferring money. In some cases, the deception is direct, for example, by masquerading as legitimate shopping applications to exploit unsuspecting users.
The entire process of detecting and preventing malicious activities is highly complex, requiring close coordination between mobile devices and applications. Recommendation ITU-T X.1130 analyses the characteristics and risks of malicious applications across multiple stages, including download, installation, execution and payment inducement, and provides a comprehensive technical solution for detecting and preventing malicious activities, based on the interactions between mobile devices and applications.
Citation: https://handle.itu.int/11.1002/1000/16481
Series title: X series: Data networks, open system communications and security
  X.1100-X.1199: Secure applications and services (I)
  X.1120-X.1139: Mobile security
Approval date: 2025-12-11
Provisional name:X.tg-fdma
Approval process:TAP
Status: In force
Maintenance responsibility: ITU-T Study Group 17
Further details: Patent statement(s)
Development history
[16 related work items in progress]