IT threat evolution in Q3 2025. Mobile statisticsIT threat evolution in Q3 2025. Non-mobile statisticsThe quarter at a glanceIn the third quarter of 2025, we updated the methodology for calculating statistical indicators based on the Kaspersky Security Network. These changes affected all sections of the report except for the statistics on installation packages, which remained unchanged.To illustrate the differences between the reporting periods, we have also recalculated data for the previous quarters. Consequently, these figures may significantly differ from the previously published ones. However, subsequent reports will employ this new methodology, enabling precise comparisons with the data presented in this post.The Kaspersky Security Network (KSN) is a global network for analyzing anonymized threat information, voluntarily shared by users of Kaspersky solutions. The statistics in this report are based on KSN data unless explicitly stated otherwise.The quarter in numbersAccording to Kaspersky Security Network, in Q3 2025:47 million attacks utilizing malware, adware, or unwanted mobile software were prevented.Trojans were the most widespread threat among mobile malware, encountered by 15.78% of all attacked users of Kaspersky solutions.More than 197,000 malicious installation packages were discovered, including:52,723 associated with mobile banking Trojans.1564 packages identified as mobile ransomware Trojans.Quarterly highlightsThe number of malware, adware, or unwanted software attacks on mobile devices, calculated according to the updated rules, totaled 3.47 million in the third quarter. This is slightly less than the 3.51 million attacks recorded in the previous reporting period.Attacks on users of Kaspersky mobile solutions, Q2 2024 — Q3 2025 (download)At the start of the quarter, a user complained to us about ads appearing in every browser on their smartphone. We conducted an investigation, discovering a new version of the BADBOX backdoor, preloaded on the device. This backdoor is a multi-level loader embedded in a malicious native library, librescache.so, which was loaded by the system framework. As a result, a copy of the Trojan infiltrated every process running on the device.Another interesting finding was Trojan-Downloader.AndroidOS.Agent.no, which was embedded in mods for messaging and other apps. It downloaded Trojan-Clicker.AndroidOS.Agent.bl onto the device. The clicker received a URL from its server where an ad was being displayed, opened it in an invisible WebView window, and used machine learning algorithms to find and click the close button. In this way, fraudsters exploited the user’s device to artificially inflate ad views.Mobile threat statisticsIn the third quarter, Kaspersky security solutions detected 197,738 samples of malicious and unwanted software for Android, which is 55,000 more than in the previous reporting period.Detected malicious and potentially unwanted installation packages, Q3 2024 — Q3 2025 (download)The detected installation packages were distributed by type as follows:Detected mobile apps by type, Q2* — Q3 2025 (download)* Changes in the statistical calculation methodology do not affect this metric. However, data for the previous quarter may differ slightly from previously published figures due to a retrospective review of certain verdicts.The share of banking Trojans decreased somewhat, but this was due less to a reduction in their numbers and more to an increase in other malicious and unwanted packages. Nevertheless, banking Trojans, still dominated by Mamont packages, continue to hold the top spot. The rise in Trojan droppers is also linked to them: these droppers are primarily designed to deliver banking Trojans.Share* of users attacked by the given type of malicious or potentially unwanted app out of all targeted users of Kaspersky mobile products, Q2 — Q3 2025 (download)* The total may exceed 100% if the same users experienced multiple attack types.Adware leads the pack in terms of the number of users attacked, with a significant margin. The most widespread types of adware are HiddenAd (56.3%) and MobiDash (27.4%). RiskTool-type unwanted apps occupy the second spot. Their growth is primarily due to the proliferation of the Revpn module, which monetizes user internet access by turning their device into a VPN exit point. The most popular Trojans predictably remain Triada (55.8%) and Fakemoney (24.6%). The percentage of users who encountered these did not undergo significant changes.TOP 20 most frequently detected types of mobile malwareNote that the malware rankings below exclude riskware and potentially unwanted software, such as RiskTool or adware.Verdict%* Q2 2025%* Q3 2025Difference in p.p.Change in rankingTrojan.AndroidOS.Triada.ii0.0013.78+13.78Trojan.AndroidOS.Triada.fe12.5410.32–2.22–1Trojan.AndroidOS.Triada.gn9.498.56–0.93–1Trojan.AndroidOS.Fakemoney.v8.886.30–2.59–1Backdoor.AndroidOS.Triada.z3.754.53+0.77+1DangerousObject.Multi.Generic.4.394.52+0.13–1Trojan-Banker.AndroidOS.Coper.c3.202.86–0.35+1Trojan.AndroidOS.Triada.if0.002.82+2.82Trojan-Dropper.Linux.Agent.gen3.072.64–0.43+1Trojan-Dropper.AndroidOS.Hqwar.cq0.372.52+2.15+60Trojan.AndroidOS.Triada.hf2.262.41+0.14+2Trojan.AndroidOS.Triada.ig0.002.19+2.19Backdoor.AndroidOS.Triada.ab0.002.00+2.00Trojan-Banker.AndroidOS.Mamont.da5.221.82–3.40–10Trojan-Banker.AndroidOS.Mamont.hi0.001.80+1.80Trojan.AndroidOS.Triada.ga3.011.71–1.29–5Trojan.AndroidOS.Boogr.gsh1.601.68+0.080Trojan-Downloader.AndroidOS.Agent.nq0.001.63+1.63Trojan.AndroidOS.Triada.hy3.291.62–1.67–12Trojan-Clicker.AndroidOS.Agent.bh1.321.56+0.240* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.The top positions in the list of the most widespread malware are once again occupied by modified messaging apps Triada.ii, Triada.fe, Triada.gn, and others. The pre-installed backdoor Triada.z ranked fifth, immediately following Fakemoney – fake apps that collect users’ personal data under the guise of providing payments or financial services. The dropper that landed in ninth place, Agent.gen, is an obfuscated ELF file linked to the banking Trojan Coper.c, which sits immediately after DangerousObject.Multi.Generic.Region-specific malwareIn this section, we describe malware that primarily targets users in specific countries.VerdictCountry*%**Trojan-Dropper.AndroidOS.Hqwar.bjTurkey97.22Trojan-Banker.AndroidOS.Coper.cTurkey96.35Trojan-Dropper.AndroidOS.Agent.smTurkey95.10Trojan-Banker.AndroidOS.Coper.aTurkey95.06Trojan-Dropper.AndroidOS.Agent.uqIndia92.20Trojan-Banker.AndroidOS.Rewardsteal.qhIndia91.56Trojan-Banker.AndroidOS.Agent.wbIndia85.89Trojan-Dropper.AndroidOS.Rewardsteal.abIndia84.14Trojan-Dropper.AndroidOS.Banker.bdIndia82.84Backdoor.AndroidOS.Teledoor.aIran81.40Trojan-Dropper.AndroidOS.Hqwar.gyTurkey80.37Trojan-Dropper.AndroidOS.Banker.acIndia78.55Trojan-Ransom.AndroidOS.Rkor.iiGermany76.90Trojan-Dropper.AndroidOS.Banker.bgIndia75.12Trojan-Banker.AndroidOS.UdangaSteal.bIndonesia75.00Trojan-Dropper.AndroidOS.Banker.bcIndia74.73Backdoor.AndroidOS.Teledoor.cIran70.33* The country where the malware was most active.** Unique users who encountered this Trojan modification in the indicated country as a percentage of all Kaspersky mobile security solution users attacked by the same modification.Banking Trojans, primarily Coper, continue to operate actively in Turkey. Indian users also attract threat actors distributing this type of software. Specifically, the banker Rewardsteal is active in the country. Teledoor backdoors, embedded in a fake Telegram client, have been deployed in Iran.Notable is the surge in Rkor ransomware Trojan attacks in Germany. The activity was significantly lower in previous quarters. It appears the fraudsters have found a new channel for delivering malicious apps to users.Mobile banking TrojansIn the third quarter of 2025, 52,723 installation packages for mobile banking Trojans were detected, 10,000 more than in the second quarter.Installation packages for mobile banking Trojans detected by Kaspersky, Q3 2024 — Q3 2025 (download)The share of the Mamont Trojan among all bankers slightly increased again, reaching 61.85%. However, in terms of the share of attacked users, Coper moved into first place, with the same modification being used in most of its attacks. Variants of Mamont ranked second and lower, as different samples were used in different attacks. Nevertheless, the total number of users attacked by the Mamont family is greater than that of users attacked by Coper.TOP 10 mobile bankersVerdict%* Q2 2025%* Q3 2025Difference in p.p.Change in rankingTrojan-Banker.AndroidOS.Coper.c13.4213.48+0.07+1Trojan-Banker.AndroidOS.Mamont.da21.868.57–13.28–1Trojan-Banker.AndroidOS.Mamont.hi0.008.48+8.48Trojan-Banker.AndroidOS.Mamont.gy0.006.90+6.90Trojan-Banker.AndroidOS.Mamont.hl0.004.97+4.97Trojan-Banker.AndroidOS.Agent.ws0.004.02+4.02Trojan-Banker.AndroidOS.Mamont.gg0.403.41+3.01+35Trojan-Banker.AndroidOS.Mamont.cb3.033.31+0.29+5Trojan-Banker.AndroidOS.Creduz.z0.173.30+3.13+58Trojan-Banker.AndroidOS.Mamont.fz0.073.02+2.95+86* Unique users who encountered this malware as a percentage of all Kaspersky mobile security solution users who encountered banking threats.Mobile ransomware TrojansDue to the increased activity of mobile ransomware Trojans in Germany, which we mentioned in the Region-specific malware section, we have decided to also present statistics on this type of threat. In the third quarter, the number of ransomware Trojan installation packages more than doubled, reaching 1564.Verdict%* Q2 2025%* Q3 2025Difference in p.p.Change in rankingTrojan-Ransom.AndroidOS.Rkor.ii7.2324.42+17.19+10Trojan-Ransom.AndroidOS.Rkor.pac0.2716.72+16.45+68Trojan-Ransom.AndroidOS.Congur.aa30.8916.46–14.44–1Trojan-Ransom.AndroidOS.Svpeng.ac30.9816.39–14.59–3Trojan-Ransom.AndroidOS.Rkor.it0.0010.09+10.09Trojan-Ransom.AndroidOS.Congur.cw15.719.69–6.03–3Trojan-Ransom.AndroidOS.Congur.ap15.369.16–6.20–3Trojan-Ransom.AndroidOS.Small.cj14.918.49–6.42–3Trojan-Ransom.AndroidOS.Svpeng.snt13.048.10–4.94–2Trojan-Ransom.AndroidOS.Svpeng.ah13.137.63–5.49–4* Unique users who encountered the malware as a percentage of all Kaspersky mobile security solution users attacked by ransomware Trojans.