SlideShare a Scribd company logo
THE NEW NOTCOMPATIBLE: 
A sophisticated mobile threat that 
puts protected networks at risk
Over the past two years, Lookout has 
tracked the evolution of NotCompatible. 
2014 
NotCompatible.C has set a 
new bar for mobile malware 
sophistication and operational 
complexity. 
2013 
Lookout finds NotCompatible 
variant "C" being spread 
through spam campaigns on 
hacked email accounts. 
2012 
One of the first times that 
hacked websites were used to 
specifically target and infect 
mobile devices. 
NOTCOMPAT I B L E
The command infrastructure 
and communication perseveres 
and self-protects through 
redundancy and encryption, 
making it elusive and enduring. 
Read the blog
The technological evolution of NotCompatible 
has turned a once compelling piece of malware 
into one of the known longest-running mobile 
botnets we’ve seen to-date. 
Read the blog
  
 
 
It’s a prime example of how mobile 
malware complexity is advancing 
and is borrowing technical tactics 
already seen in PC malware. 
Read the blog
 
NotCompatible is used as a proxy 
to run spam campaigns, scalp 
concert tickets, search the Internet 
for vulnerabilities, and more. 
Read the blog
While NotCompatible.A was 
relatively simplistic architecturally, 
NotCompatible.C is a changed 
beast in terms of the technological 
concepts it uses to stay alive. 
Read the blog
NOTA B L E AT T R I B U T E S 
Resiliency Resistance to Detection Self-Protection 
This threat features impressive new technical 
attributes compared to earlier variants – 
attributes that, in combination, Lookout has 
never before observed in a mobile threat. 
Read the blog
NOTA B L E AT T R I B U T E S 
Resiliency Resistance to Detection Self-Protection 
NotCompatible.C is resilient to network-based blocking because 
it uses a peer-to-peer protocol and has multiple, geographically-distributed 
Command and Control (C2) servers. The geo-distribution 
of its C2 servers allows the malware to function even 
if law enforcement is able to take down individual servers. Peer-to- 
peer protocols make the malware resilient to IP and DNS 
based blocking by enabling infected devices to receive 
commands by proxy via other infected devices. 
Read the blog
NOTA B L E AT T R I B U T E S 
Resiliency Resistance to Detection Self-Protection 
NotCompatible.C encrypts all C2 and proxied data traffic end-to-end 
while also performing mutual authentication between clients 
and C2 servers via public key cryptography. This protocol-level 
encryption can prevent network security systems from being able 
to differentiate malicious traffic from legitimate traffic. 
Read the blog
NOTA B L E AT T R I B U T E S 
Resiliency Resistance to Detection Self-Protection 
NotCompatible.C uses a Gateway C2 to analyze incoming connections 
and likely prevents active probing of the various Operational C2s by 
blocking connections from non-approved IP addresses. 
Read the blog
Our investigation shows the possibility that a threat 
like this could expand to assist in attacks on corporate 
networks, a risk that should not be ignored. 
Read the blog
PROTECT I O N STRAT E G I E S 
Implement mobile threat protection Segment the network 
Mobile devices typically operate outside the traditional perimeter and 
beyond the reach of network-based security solutions. An advanced mobile 
security platform allows organizations to monitor for and protect against 
suspicious activity on their mobile devices, block identified threats and 
assess the overall health of their mobile ecosystem. Next generation threats 
such as NotCompatible.C can provide access to protected networks and 
facilitate the exfiltration of data in a way that most enterprises are not 
prepared to defend against. By detecting this threat at the device level, it is 
possible to block and prevent installation before an attacker can perform 
any hostile activity. 
Read the blog
PROTECT I O N STRAT E G I E S 
Implement mobile threat protection Segment the network 
All mobile devices used in protected environments — especially those able 
to connect to external unmanaged networks — should be limited to an 
isolated network segment with strong controls limiting access to sensitive 
resources and analytics to detect potentially malicious behavior. 
Read the blog
Lookout has thus far actively 
protected against NotCompatible on 
hundreds of thousands of devices in 
the U.S. and around the world. 
Read the blog
To learn more about 
NotCompatible, read our 
report or check out our blog.
For more mobile security information, follow

More Related Content

PDF
Feds: You have a BYOD program whether you like it or not
PDF
2015 Cybersecurity Predictions
PDF
Relentless Mobile Threats to Avoid
PDF
Mobile Security 101
PPTX
Mobile security
PDF
5 Ways to Protect your Mobile Security
PDF
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
PPTX
Mobile Security
Feds: You have a BYOD program whether you like it or not
2015 Cybersecurity Predictions
Relentless Mobile Threats to Avoid
Mobile Security 101
Mobile security
5 Ways to Protect your Mobile Security
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Mobile Security

What's hot (20)

PDF
The state of mobile app security
PDF
State of Application Security Vol. 4
PDF
Case Closed with IBM Application Security on Cloud infographic
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PDF
Mobile Security at the World Cup
PPT
Cell Phone Viruses & Security
PDF
Trojan horseofbyod2
PDF
Techvorm com-android-security-issues-solutions
PDF
Digital security update: 10 cybersecurity and privacy threats
PPTX
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
DOCX
Smartphone Security Article
PPTX
Tips and Tricks on Securing your Android Devices
PPTX
T.A.S.C - mobile device secuirty
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PPT
Smart phone and mobile device security
 
PDF
Five mobile security challenges facing the enterprise
PDF
Sholove cyren web security - technical datasheet2
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PDF
Mobile Security
The state of mobile app security
State of Application Security Vol. 4
Case Closed with IBM Application Security on Cloud infographic
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security at the World Cup
Cell Phone Viruses & Security
Trojan horseofbyod2
Techvorm com-android-security-issues-solutions
Digital security update: 10 cybersecurity and privacy threats
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Smartphone Security Article
Tips and Tricks on Securing your Android Devices
T.A.S.C - mobile device secuirty
C0c0n 2011 mobile security presentation v1.2
Top Seven Risks of Enterprise Mobility - How to protect your business
Smart phone and mobile device security
 
Five mobile security challenges facing the enterprise
Sholove cyren web security - technical datasheet2
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Mobile Security
Ad

Viewers also liked (18)

PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
How to (Safely) Cut the Cord With Your Old iPhone
PPTX
Religion slide
PDF
Ageing – a Global Challenge: Sharing is Caring
PPT
Программный комплекс "НейроКС"
PPSX
La casita de BERTA
PPT
Seo Cycle - Ilustrações de ciclos de SEO
PDF
Cascades Band Goa's year 2013 on SlideShare
PDF
Presentation
PPT
Delivering Happiness - FORTUNE Sales Summit - 4-21-10
PPTX
Presentation for Academic English
PDF
coqnow2013
DOC
zaragoza turismo 31
PDF
DS-00593-14-XTR70020-High-temperature, High Input Voltage, 2A Positive LDO Re...
PPTX
Intasc standards, special interests report
PDF
Lista de-precios-compugreiff-enero-15-2014
PDF
Las 7 leyes espirituales del éxito de deepak chopra
PDF
Ls InnoBiotech
Mobile Security: The 5 Questions Modern Organizations Are Asking
How to (Safely) Cut the Cord With Your Old iPhone
Religion slide
Ageing – a Global Challenge: Sharing is Caring
Программный комплекс "НейроКС"
La casita de BERTA
Seo Cycle - Ilustrações de ciclos de SEO
Cascades Band Goa's year 2013 on SlideShare
Presentation
Delivering Happiness - FORTUNE Sales Summit - 4-21-10
Presentation for Academic English
coqnow2013
zaragoza turismo 31
DS-00593-14-XTR70020-High-temperature, High Input Voltage, 2A Positive LDO Re...
Intasc standards, special interests report
Lista de-precios-compugreiff-enero-15-2014
Las 7 leyes espirituales del éxito de deepak chopra
Ls InnoBiotech
Ad

Similar to The New NotCompatible (20)

PPTX
An introduction to Unified Threat Management (UTM), for Dummies
PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
PPTX
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
PDF
Mobile Banking Channel Security - Cyber Security Conference 2011
PDF
Modern Web Security, Lazy but Mindful Like a Fox
PPTX
Keeping up with the Revolution in IT Security
PDF
Analyzing and Defending from Modern Internet Threats
PDF
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
PDF
A tale of mobile threats
PDF
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
PDF
New Security Challenges Juan Miguel Velasco
PDF
New Security Challenges Juan Miguel Velasco
PPT
Lumension Security - Adjusting our defenses for 2012
PPTX
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
PDF
Emerging cyber threats_report2012
PDF
People the biggest cyber risk
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PPTX
Mobile security trends
PDF
DSS ITSEC Conference 2012 - Forescout NAC #1
PDF
Are You Prepared for the Next Mobile Attack?
An introduction to Unified Threat Management (UTM), for Dummies
NACCTFO Cyber Security Presentation 2014 New Orleans
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Mobile Banking Channel Security - Cyber Security Conference 2011
Modern Web Security, Lazy but Mindful Like a Fox
Keeping up with the Revolution in IT Security
Analyzing and Defending from Modern Internet Threats
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
A tale of mobile threats
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
New Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
Lumension Security - Adjusting our defenses for 2012
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
Emerging cyber threats_report2012
People the biggest cyber risk
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
Mobile security trends
DSS ITSEC Conference 2012 - Forescout NAC #1
Are You Prepared for the Next Mobile Attack?

More from Lookout (20)

PDF
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
PDF
What Is Spyware?
PPTX
When Android Apps Go Evil
PDF
Scaling Mobile Development
PDF
Visualizing Privacy
PDF
Hiring Hackers
PDF
3 Ways to Protect the Data in Your Google Account
PDF
3 Ways to Protect the Data in Your Apple Account
PDF
The Back to School Smartphone Guide
PDF
Spring Cleaning for Your Smartphone
PPTX
Mobile Threats, Made to Measure
PDF
Security & Privacy at the Olympics
PDF
5 Types of Shady Apps
PDF
10 Beautiful Enterprise Products
PDF
Hacking the Internet of Things for Good
PDF
What is a Mobile Threat?
PDF
Dragon lady
PDF
Dragon Lady
PDF
History of Lookout
PDF
Scaling Up Lookout
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
What Is Spyware?
When Android Apps Go Evil
Scaling Mobile Development
Visualizing Privacy
Hiring Hackers
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Apple Account
The Back to School Smartphone Guide
Spring Cleaning for Your Smartphone
Mobile Threats, Made to Measure
Security & Privacy at the Olympics
5 Types of Shady Apps
10 Beautiful Enterprise Products
Hacking the Internet of Things for Good
What is a Mobile Threat?
Dragon lady
Dragon Lady
History of Lookout
Scaling Up Lookout

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

The New NotCompatible

  • 1. THE NEW NOTCOMPATIBLE: A sophisticated mobile threat that puts protected networks at risk
  • 2. Over the past two years, Lookout has tracked the evolution of NotCompatible. 2014 NotCompatible.C has set a new bar for mobile malware sophistication and operational complexity. 2013 Lookout finds NotCompatible variant "C" being spread through spam campaigns on hacked email accounts. 2012 One of the first times that hacked websites were used to specifically target and infect mobile devices. NOTCOMPAT I B L E
  • 3. The command infrastructure and communication perseveres and self-protects through redundancy and encryption, making it elusive and enduring. Read the blog
  • 4. The technological evolution of NotCompatible has turned a once compelling piece of malware into one of the known longest-running mobile botnets we’ve seen to-date. Read the blog
  • 5.     It’s a prime example of how mobile malware complexity is advancing and is borrowing technical tactics already seen in PC malware. Read the blog
  • 6.  NotCompatible is used as a proxy to run spam campaigns, scalp concert tickets, search the Internet for vulnerabilities, and more. Read the blog
  • 7. While NotCompatible.A was relatively simplistic architecturally, NotCompatible.C is a changed beast in terms of the technological concepts it uses to stay alive. Read the blog
  • 8. NOTA B L E AT T R I B U T E S Resiliency Resistance to Detection Self-Protection This threat features impressive new technical attributes compared to earlier variants – attributes that, in combination, Lookout has never before observed in a mobile threat. Read the blog
  • 9. NOTA B L E AT T R I B U T E S Resiliency Resistance to Detection Self-Protection NotCompatible.C is resilient to network-based blocking because it uses a peer-to-peer protocol and has multiple, geographically-distributed Command and Control (C2) servers. The geo-distribution of its C2 servers allows the malware to function even if law enforcement is able to take down individual servers. Peer-to- peer protocols make the malware resilient to IP and DNS based blocking by enabling infected devices to receive commands by proxy via other infected devices. Read the blog
  • 10. NOTA B L E AT T R I B U T E S Resiliency Resistance to Detection Self-Protection NotCompatible.C encrypts all C2 and proxied data traffic end-to-end while also performing mutual authentication between clients and C2 servers via public key cryptography. This protocol-level encryption can prevent network security systems from being able to differentiate malicious traffic from legitimate traffic. Read the blog
  • 11. NOTA B L E AT T R I B U T E S Resiliency Resistance to Detection Self-Protection NotCompatible.C uses a Gateway C2 to analyze incoming connections and likely prevents active probing of the various Operational C2s by blocking connections from non-approved IP addresses. Read the blog
  • 12. Our investigation shows the possibility that a threat like this could expand to assist in attacks on corporate networks, a risk that should not be ignored. Read the blog
  • 13. PROTECT I O N STRAT E G I E S Implement mobile threat protection Segment the network Mobile devices typically operate outside the traditional perimeter and beyond the reach of network-based security solutions. An advanced mobile security platform allows organizations to monitor for and protect against suspicious activity on their mobile devices, block identified threats and assess the overall health of their mobile ecosystem. Next generation threats such as NotCompatible.C can provide access to protected networks and facilitate the exfiltration of data in a way that most enterprises are not prepared to defend against. By detecting this threat at the device level, it is possible to block and prevent installation before an attacker can perform any hostile activity. Read the blog
  • 14. PROTECT I O N STRAT E G I E S Implement mobile threat protection Segment the network All mobile devices used in protected environments — especially those able to connect to external unmanaged networks — should be limited to an isolated network segment with strong controls limiting access to sensitive resources and analytics to detect potentially malicious behavior. Read the blog
  • 15. Lookout has thus far actively protected against NotCompatible on hundreds of thousands of devices in the U.S. and around the world. Read the blog
  • 16. To learn more about NotCompatible, read our report or check out our blog.
  • 17. For more mobile security information, follow