2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537
2 Agenda Attacks moving to mobile Birthday to mobile malware Mobile malware trend Protect your devices HKCERT Supports Q & A Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537
3 Attacks moving to mobile Image source: http://universalmobileinterface.wordpress.com/
4 Attacks moving to mobile Why?
5 Attacks moving to mobile 1. Mobile devices are connection-enabled 2. Valuable data 3. Valuable resource 4. High penetration 5. Smart OS eco-system
6 Attacks moving to mobile 1. Mobile devices are connection-enabled 3G/LTE Wi-Fi Bluetooth NFC Camera QR Code GSM SMS Image source: http://www.hightech-edge.com/wireless-communications/14037/
7 Attacks moving to mobile 2. Valuable data Phone information IMEI, Phone number, SMS history, etc. Contact list Social engineering, Spam database Geo-location information Spy, Track history Images/Camera Spy, Surrounding environment Documents *.doc; *.pdf Image source: http://blogs.gartner.com/svetlana-sicular/data-scientist-mystified/
8 Attacks moving to mobile 3. Valuable resource High speed CPU Powerful computing Always-On Internet connection Image source: http://www.digitaltrends.com/mobile/mobile-phone-world-population-2014/
9
10 Attacks moving to mobile 4. High penetration Image source: http://www.slideshare.net/wearesocialsg/social-digital-mobile-around-the-world-january-2014
11 Attacks moving to mobile 5. Smart OS eco-system App store market Easy access Simple install Awareness Permission review Security tools PC threats in mobile: email, links, browsers, flash, etc.
12 Birthday to mobile malware Image source: http://www.cultofmac.com/102888/happy-birthday-iphone-eat-your-way-through-four-years-of-iphone-birthday-cakes-gallery/
13 Birthday to mobile malware How old? 10 Years
14 Birthday to mobile malware Image source: https://blog.fortinet.com/10-years-of-mobile-malware/
15 Birthday to mobile malware 2004 2014 Propagation via Bluetooth Propagation mix with MMS Premium SMS Mobile botnet Banking Trojan PC-mobile cross infection Ransomware
16 Mobile malware trend Image source: http://autoblog.johnhughes.com.au/wp-content/uploads/2012/04/mobile-trend.jpg
17 Mobile malware trends Image source: http://www.mcafee.com/au/resources/reports/rp-quarterly-threat-q4-2013.pdf
18 Mobile malware trends Premium SMS Mobile botnet Cross platform infection Ransomware CryptoCurrency Miner
19 Mobile malware trends Premium SMS Image source: https://blog.lookout.com/blog/2012/10/03/avoid-premium-sms-scams/
20 Mobile malware trends Mobile botnet (2009) SMS attacks on iphones (2011) DroidDream compromised Android (2012) Zitmo (Zeus-in-the-mobile) targeted Blackberry and Android Image source: http://www.pcworld.com/article/2048199/botnet-likely-caused-spike-in-number-of-tor-clients.html
21 Mobile malware trends Mobile botnet (2014) idroidbot targets phones running ios 7.1 and earlier as well as Android 2.2 and later Support web administration Support TOR (anonymous) / proxy connection Tap mobile wallets Visa QIWI Wallet WebMoney Keeper Mobile Yandex Image source: http://blogs.mcafee.com/mcafee-labs/idroid-bot-for-sale-taps-into-mobile-wallets
22 Mobile malware trends Mobile botnet Image source: http://www.f-secure.com/static/doc/labs_global/research/threat_report_h2_2013.pdf
23 Mobile malware trends Cross platform infection Android malware infects Windows (2013) Auto-Run attack Windows malware infects Android devices (2014) adb (Android debug bridge) push Image source: http://www.wpcentral.com/asus-still-bets-androidwindows-8-hybrid-introduces-td300-ces-2014
24 Mobile malware trends Ransomware Blackmail: Fake Anti-virus on Android (2013) Fraud: Fake Anti-virus Virus Shield on Android (2014) Image source: http://ictpost.com/2013/11/12/mobile-malware-crosses-one-million-mark-says-trend-micro/
25 Mobile malware trends CryptoCurrency Miner BitCoin / LiteCoin / DogeCoin [2014-Mar] CryptoCurrency mining malware found in Play Store Image source: http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/03/dogecoinfigure5.png Image source: http://b-i.forbesimg.com/robertwood/files/2013/05/22.jpg
26 Protect your devices Image source: http://blog.mobpartner.com/2012/10/19/android-mobile-threats/
27 Protect your devices How? What?
28 Protect your devices Things to protect Information Device information Personal information Resource Network resource CPU resource Image source: http://chicagoagentmagazine.com/3-awesome-apps-for-protecting-your-smartphone/
29 Protect your devices used by ad libraries to geo-target ads. for spyware, it provides location data data helps botnets keep track of their bots. Image source: http://www.mcafee.com/hk/resources/reports/rp-mobile-security-consumer-trends.pdf
30 Protect your devices Identify the enemy 1. Phishing 2. Malware 3. Vulnerability Image source: http://www.thetechherald.com/articles/syrian-activists-targeted-by-phishing-campaigns-and-malware/16429/
31 Protect your devices Against Phishing 1. Against Phishing Shorten URL / Long Domain Email / SMS / IM message (e.g. WhatsApp, LINE, WeChat, etc.) Social networking website (e.g. Facebook) Advertisements QR-Code / NFC Wi-Fi / Bluetooth connection AWARE
32 Protect your devices Against Phishing [2014-Apr] Apple ID Phishing Scam Image source: http://www.redmondpie.com/new-apple-id-phishing-scam-looks-plausible-enough-to-fool-anyone/
33 Protect your devices Against Malware 2. Against Malware Don t install untrusted apps Don t download from the 3 rd party markets
34 Protect your devices Against Malware Re-package the legitimate app with additional permissions Image source: http://www.f-secure.com/static/doc/labs_global/research/threat_report_h2_2013.pdf
35 Protect your devices Malware in Play Store ~ 0.1% Install apps only from the official store Against Malware Image source: http://www.f-secure.com/static/doc/labs_global/research/threat_report_h2_2013.pdf
36 Protect your devices Against Malware Disable installation from Unknown sources Image source: http://www.androidguys.com/2014/04/05/install-amazon-app-store-android/
37 Protect your devices Install mobile security tools Against Malware Image source: http://www.av-test.org/en/tests/mobile-devices/android/
38 Protect your devices Against Vulnerability 3. Against Vulnerability Keep your System up-to-date Always update your Apps
39 Protect your devices Against Vulnerability [2013-Jul] Vulnerability in WhatsApp for Android Priyanka worm spreading Image source: http://www.theandroidsoul.com/remove-priyanka-whatsapp-virus/
40 Protect your devices Against Vulnerability [2014-Feb] ios flaw allows malicious apps to record touch screen presses Image source: http://www.fireeye.com/blog/technical/2014/02/background-monitoring-on-non-jailbroken-ios-7-devices-and-a-mitigation.html
41 Protect your devices Conclusion Beware of phishing message Install apps from official store Review permissions before apps installation Keep your System/Apps up-to-date Install mobile security tools Image source: http://www.smallbiztechnology.com/archive/2013/05/12-mobile-security-tips-all-small-businesses-must-be-aware-of.html/
42 HKCERT Supports HK Google Play Store s Apps Security Risk Report (https://www.hkcert.org/play-store-srr) Monthly report, 1st released in Jul-2013 HKCERT + NINIS in China Detect malicious/suspicious behaviors apps in Hong Kong Google Play Store
43 HKCERT Supports Guidelines on Mobile Guideline of Mobile Security BYOD Security Guidelines NFC Security Guidelines
Q&A Thank you Website: www.hkcert.org Hotline: 8105-6060 44