Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer



Similar documents
Protecting against Mobile Attacks

Secure Your Mobile Workplace

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Managing Web Security in an Increasingly Challenging Threat Landscape

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Enterprise Mobile Threat Report

How to Successfully Roll Out an Android BYOD Program

Mobile App Reputation

Guideline on Safe BYOD Management

MOBILE APPS. QA Testing for mobile applications

WHITE PAPER > THE RISKS & REWARDS OF MOBILE BANKING APPS. The Risks & Rewards of Mobile Banking Apps

Henry Ford Health System Citrix Access Gateway Support Details

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Practical Attacks against Mobile Device Management Solutions

... Mobile App Reputation Services THE RADICATI GROUP, INC.

Mobile Device Management

Defending Behind The Device Mobile Application Risks

TrustDefender Mobile Technical Brief

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Malware & Botnets. Botnets

BYPASSING THE ios GATEKEEPER

Five Trends to Track in E-Commerce Fraud

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Securing mobile devices in the business environment

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Tutorial on Smartphone Security

01. Introduction of Android

Android Architecture. Alexandra Harrison & Jake Saxton

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Streamlining Web and Security

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Marble & MobileIron Mobile App Risk Mitigation

MOBILE MALWARE REPORT

Henry Ford Health System Remote Access Support Details

Fraud Threat Intelligence

Mobile Exploit Intelligence Project

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Malware Trend Report, Q April May June

CEH Version8 Course Outline

Chris Boykin VP of Professional Services

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

10 Quick Tips to Mobile Security

If you can't beat them - secure them

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

BYOD: End-to-End Security

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Security Bank of California Internet Banking Security Awareness

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Mobile Security & BYOD Policy

Studying Security Weaknesses of Android System

Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

WEB APPLICATION SECURITY

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

How we keep harmful apps out of Google Play and keep your Android device safe

Student Tech Security Training. ITS Security Office

Transcription:

Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer

Agenda Modern malware a targets Account credentials Financial transactions Modern malware techniques Social engineering Browser injection System monitoring Mobile Threat Landscape Q&A 2 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Modern malware targets >50% of organized cybercrime attacks focus on financial i and e-commerce businesses and their users Account credentials are the primary target Email accounts are of especially high value as they provide access to all other online accounts Financial transactions are highly targeted Recording an online purchase provides key necessary data to recreate someone's credit card Name, card number, exp. date, CVV code 3 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Modern malware techniques Social engineering is extremely effective Well crafted phishing emails Telephone based attacks Browser injection is especially devious Extracts additional information Bypasses SSL/TLS Can bypass two factor authentication System monitoring Access to all other online accounts Leads to identity theft 4 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Mobile apps expand the issue Apple released the first iphone and ios in mid 2007 followed by Google s release of Android in the fall of 2008 By the end of 2010, there were roughly 300k iphone and 100k Android apps with more than 10 billion app downloads Today, both Google and Apple s app stores boast more than 800k apps and total downloads over 100 billion! The average smartphone users downloads 90 additional apps Webroot started collecting mobile apps in 2011 and has collected over 3.7 million unique mobile apps This number is much larger than the combined 1.6 million available on Apple and Google s markets The reason is there are numerous 3 rd party markets, mainly for Android apps Research shows nearly 30% of users acquire apps from 3 rd party markets Most malicious apps are found in 3 rd party markets as well as P2P networks 5 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Analyzing the risks of BYOD 88% of SMB s support mobile devices and 66% allow BYOD ios Version Distribution BYOD increases risk because it combines personal and 53% corporate data onto a single 29% device Compared to company provided devices, BYOD devices contain dozens of additional apps for personal use BYOD causes OS diversity concerns as users will have a 36% wide array of devices and OS versions, some which have known security vulnerabilities 26% 12% 5% 1% ios 6.1.1 ios 6.1.0 ios 6.0 ios 5 Earlier ios Android idversion Distribution ib ti <1% 3% 2% 33% Jelly Bean Ice Cream Sandwich Honeycomb Gingerbread Froyo Éclair 6 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Analyzing the risks of malicious apps Risks associate with malicious mobile apps: Information theft (adware/pua, spyware, trojans, apps from untrusted developers) Premium SMS charges (SMS trojans, repackaged/cracked apps) User tracking (spyware, legit tracking apps, trojans) Rootkits (repackaged/cracked apps, trojans) Consequences of malicious mobile apps: Spear-phishing Identity theft Financial loss Compromised network 7 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Malicious app trends With more than 3.7 million apps analyzed, 12% of Android apps are either malicious 4000000 or unwanted (PUA) and nearly 3% of ios 3000000 apps contain privacy violations Free apps are the biggest offender as developers look for ways to monetize their efforts Mobile app ad-engines typically pay based on the quantity of collected data 3 rd party markets and P2P networks are hotspots for malicious apps Some 3 rd party markets only distribute malicious apps often associated with cracking paid apps or translating apps into another language Malicious apps often perform the advertised task as a method to evade detection and as a way to make it onto legitimate app markets 2000000 1000000 0 Android Samples Total Apps Malicious Apps 8 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Malicious app trends cont. Over 12% of Android apps have malicious or unwanted behavior let s look at the breakdown PUA s PUAs account for 86% Largely due to pervasiveness of aggressive ad-engines (Airpush) Trojans, Spyware and Rootkits account for the remaining 14% This includes SMS trojans, botnets, t rooting apps and all other truly malicious apps 9 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Malicious app example Trojan/Rootkit Here we have a classic example of an infected app which requests more permissions than necessary In both cases the app plays the game but the example on the right also sends premium SMS texts as well as roots the device Rooted devices pose a much bigger risk as I they circumvent device security features 10 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Malicious app example Adware/PUA PUA s PUAs account for the biggest chunk of malicious apps In this example, the ad-engine is advertising Flash Player which is not needed and is also charging $34.95 for the bogus app 11 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Malicious app example Spyware Often masqueraded as a tracking app, spyware apps are available on both legit and 3 rd party markets and can be used for malicious purposes 12 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results Year over year, more mobile devices are connecting to corporate networks and BYOD is on the rise 13 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results cont. ios and Android are the most common OS s to connect to the corporate network 14 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results cont. IT Pros are right mobile malware is on the rise and Android poses the biggest risk 15 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results cont. IT Pros are also aware of the risks posed by malicious mobile apps 16 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results cont. Yet when IT Pros were asked how familiar they were with malicious mobile apps or if they were aware of rooted devices connecting to the network 17 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Surprising survey results cont. And what about mobile device policies, solutions and employee education? 18 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

What s next for MDM mobile app reputation Mobile app reputation is a service which helps inform users of which apps are safe vs. untrustworthy With many choices available, app rep helps inform users of apps which are safe to use and pose no security risk to private or corporate data 19 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential Information @gmilbourne #WebrootSIFMAtech

Q&A Andrew Bagnato abagnato@webroot.com #WebrootSIFMAtech