The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India

Similar documents
Stopping Cyberspace Pollution International Cooperation on Fighting Spam and Botnets (including readout from Monday M3AAWG workshop)

Nuisance Calls and Texts. Neil Cook, Cloudmark Chief Technology Officer

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

Communications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security

PineApp Anti IP Blacklisting

Two-Factor Authentication: Tailor-Made for SMS

Protecting the Last Refuge of Spam-Free Communication. How to Defend Against Spam Text Messaging Attacks

Cisco & Big Data Security

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

Thexyz Premium Webmail

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

Who will win the battle - Spammers or Service Providers?

Security Solutions for the New Threads

Securing Your Business with DNS Servers That Protect Themselves

Arbor s Solution for ISP

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Mobile Connect & FIDO

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Acceptable Use Policy Revision date: 26/08/2013

4 Messaging Technology

Securing Your Business with DNS Servers That Protect Themselves

Cisco Security Intelligence Operations

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Symantec Intelligence Report: February 2013

Solving the SMS Revenue Leakage Challenge

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

Securing Your Business with DNS Servers That Protect Themselves

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager

On and off premises technologies Which is best for you?

Evaluating DMARC Effectiveness for the Financial Services Industry

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Securing Your Business with DNS Servers That Protect Themselves

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious s

Promoting Network Security (A Service Provider Perspective)

A Phased Framework for Countering VoIP SPAM

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper July 08

SPAM: 101 Cause and Effect

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

Top tips for improved network security

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Emerging Trends in Fighting Spam

SPAM-What To Do SUMMERSET COMPUTER CLUB

White Paper. Copyright 2012, Juniper Networks, Inc. 1

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

5 Simple Ways To Avoid Getting An Avalanche of Spam

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Microsoft Exchange 2003

Return Path Intelligence Report Q3 2012

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the beast. Microsoft's online safety strategy

Rogue Mobile Apps: Nuisance or Legit Threat?

Protecting your business from spam

anomaly, thus reported to our central servers.

M 3 AAWG Mobile Messaging Best Practices for Service Providers

Protecting the Last Refuge of Spam-Free Communication. How to Defend Against Spam Text Messaging Attacks

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

The Explosion of Mobile Technology; What s the Impact on the Financial Services Industry?

Use of Honeypots for Network Monitoring and Situational Awareness

Protecting against Mobile Attacks

What You Should Know About Free Text Messaging Services

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

How Cisco IT Protects Against Distributed Denial of Service Attacks

Coordinating Attack Response at Internet Scale (CARIS)

March 2010 Report #39

Software Solutions Digital Marketing Business Services. Marketing. What you need to know

10 Things Every Web Application Firewall Should Provide Share this ebook

How it works: Step 1

Threat Mitigation for VoIP

Advanced Persistent Threats

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

China s Anti-Spam Works

Anti-Spam Measures Survey Pascal Manzano ENISA

Acceptable Use Policy

Definition of Mobile Instant Messaging (MIM) Systems

December 2010 Report #48

SECURITY SOLUTIONS AND SERVICES

Enterprise Marketing: The 8 Essential Success Factors

How Do We Discourage Asia from Continuing to be a Source of Spam? 2.1 Introduction. 2.2 Spam Trends. 2. Messaging Technology

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Innovations in Network Security

How To Stop Spam

Cloud-Security: Show-Stopper or Enabling Technology?

Big Data empowered messaging. How to boost telco legacy services profitability?

Fighting spam in Australia. A consumer guide

2. Bulk SMS Software: Custom Desktop Software application using our API.

Best Practices for a BYOD World

EVILSEED: A Guided Approach to Finding Malicious Web Pages

Why should I get someone else to send my campaign when my CRM/IT Team/web host/can do it?

When Reputation is Not Enough. Barracuda Security Gateway s Predictive Sender Profiling. White Paper

Secure Your Mobile Workplace

Transcription:

The Mobile Problem Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit

Desired Outcomes 1. Deploy This is Spam reporting 2. Deploy spam filters in SMS messaging 3. International collaboration Enforcement Abuse data exchange Attend forums (M3AAWG, GSMA, ) 2

History: North American SMS Spam 2010 Mobile spam and malware grew because then-current defenses couldn t break the attackers business cases SIM Shutdown (late 2010) Detect by 7726 spam reporting Shut down SIMs after 5-10 days Attacker buys new SIMs Spam continues Lawsuits Spammer sued after many months Spammer stops for weeks Spam continues 3

7726 Spam Reporting (North America) Subscriber s abuse report (example) 1. Subscriber forwards spam to 7726 ( SPAM ) 2. 7726 system asks subscriber who sent it? 3. Subscriber supplies abuser s MSISDN Spam management process: deactivate/block 4

Spam Control (India) TRAI SMS Limits 100 SMS/day (prepaid SIM) 3000 SMS/month (postpaid SIM) Higher if sender signs undertaking Opt out Send Start 0 to short code 1909 Manual SMS spam reports to carrier User sends to short code 1909 Format: COMP TEL NO XXXXXXXXXX;dd/mm/yy;Time in hh:mm; short description of Unsolicited Commercial Communication Carrier must respond 5

1909 Spam Reporting App Android app on Google play Automates 1909 reporting 6

History: 2011/2012 North American Messaging Threats SMS abuse growing <100%/year Sources Phone-Originated Spam Mobile Phones: dominant today Over The Top: significant and exploding Mobile botnets/malware: significant threat ESME &Emailà SMS: small and controlled Over The Top 5.80% Wireless 94.20% SMS Spam Volume (daily complaints) TotalReports FromEmail FromESME FromPhone Linear (TotalReports) 7

Apple is looking for people to test & keep iphone 5 New York Times Front Page 4/8/12 300+ new SIMs/day Over 200,000,000 similar messages sent Sent from over 10,000 phone numbers ipad/iphone/giftcard Scam Complaint rate 8

Affiliate Spam Why SMS Spam Has Exploded Create an Incredible Offer website (often too good to be true) Free $1000 gift card if you sign up for these programs And give us your credit card #zz Affiliate spammers advertise website and get $1.75 for each subscriber that visits offer site 9

How Affiliates Make Mobile Spam Boxes of of cheap anonymous SIMs Cheap anonymous rate plan: Prepaid unlimited SMS for $2/day Bulk SIMs - $0.46 each on ebay 10, 100, 1000, 10,000, name your lot size Overwhelms manual shutdown defense 10

SMS Spam Visiting the spamvertized website 11

Monetization Take a survey SMS monetization! 12

SMS Monetization Instantly received on my Blackberry Note that the short codes do not match. Was 91022 shut down? 13

Other Monetization And I was soon called from... about diabetes, one of the Survey s question topics that I replied yes to 14

Develop a Strategy Legend Active defense area Shutdown domain Shutdown server Planned defense Lower priority area Shutdown Domain Control bulk purchases Detect bulk activation Shutdown or block M3AAWG 15 Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit Shutdown Server Legal Intervention

Add a This is Spam Button 7726 limitations Without publicity, 7726 won t work If users don t know what to do, they will do nothing Body-only reporting loses envelope Timestamps lost Source and routing information lost Typical email user agents have This is Spam and Not Spam buttons A standard Report Spam button Use OMA Standard SpamRep SpamRep standard completed 16

Filter Defense (takes time/resource) Layered Defense Architecture Message Flow Deploy spam/virus filters Build better spam reporting This is Spam button in UA Abuse detection - the human brain Ideally nimble, adaptable abuse detector Stochastic - error rate of ~ 1% Often off-duty Occasionally malign Reputation filters Volumetric filters This a is sp m Content filters 17

Account-Level Defense: Detect and Block Goal: minimize attackers cost (msg/$) Detection By subscriber reports By message rate/volume By message content Exchange reports with other MNOs Whack SIMs Automated shutdown 18

Short Term Defense Legal action Block mass SIM purchases Buy SIMs Collaborate with other MNOs Automated shutdown Detect abusing SIMs via 7726 spam complaints Call data records Sale fingerprint (e.g., name/address/seller on account) Activation fingerprint (e.g., IP address, other forensics) Shutdown Disable SMS/MMS origination in HLR Deprovision SIMs Block intercarrier senders in intercarrier gateway M3AAWG Workshop New Delhi, October 2012 Page 19

US Domestic Spam Status Now Under Control: iphone/ipad/gift Card Spam Spam termination below pre-storm levels Improved defense is responsible o o o o o Automatic detection & shutdown Improved 7726 reporting Bulk SIM availability/cost Reseller control Manual backup (Fraud) 7726 Reporting ratio improvement 1 complaint per X spam messages (9/20) Y x September 2011 rate Cautions: 2012-7726 Complaints (daily) Spammers will return with new methods Spoofing Malware (Bots)» China has active mobile botnet of > 100k phones» GGtracker malware infected > 250k US phones M3AAWG 20 Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit

Problems Growing abuse Spam Malware Fraud Harassment Network disruption Growing internationalization of abuse and global homogenization of abuse technologies Toolkits Criminal economy Intra-carrier sensors (e.g., SRS) are effective against attacks which include intra-carrier targets Oceans do not separate PC malware-based technology (e.g., kits that focus on specific exploits) We re fighting a growing and increasingly similar and mobile spam problem across continents and oceans

USA IP Address 22

Internationalization Netherlands IP 23

Internationalization Paris IP Address 24

Internationalization - Germany 25

9/12/2012 9/10/2012 9/8/2012 9/6/2012 9/4/2012 9/2/2012 8/31/2012 8/29/2012 8/27/2012 8/25/2012 8/23/2012 8/21/2012 8/19/2012 8/17/2012 8/15/2012 8/13/2012 8/11/2012 8/9/2012 8/7/2012 8/5/2012 8/3/2012 8/1/2012 7/30/2012 7/28/2012 7/26/2012 New Spam Plan: Spam Canada Instead Canada US Australia Brazil Canada New Zealand UK US 26

A Framework for Abuse Data Exchange Political boundaries are exploited by attackers IF OUR SUBSCRIBERS DON T COMPLAIN, CAN WE STOP IT? Defense requires coordination Sensing abuse Tracing to source Acting at source Technical Framework Policy/Legal Framework Privacy and access constraints Must support multiple nations laws Business framework Getting parties to contribute data Who pays? Collaboration forums 27

Abuse Data and Data Flows Some typical abuse ecosystem endpoints/ flows Subscriber à MNO (manual spam reports) MNO A à MNO B MNO à Vendor Vendor à MNO Messaging Network Element à Business (provisioning) Systems à Researcher à Regulator Regulator à MNO Typical semantics I got spammed High rate Botnet C&C traffic report Passive DNS <MSISDN> is a spammer assertions 28

Data Flow Topology 600+ MNOs on planet Earth Hundreds of government agencies Vendors Senders Service providers Do we want n*( n 1) 2 bilateral data sharing agreements? 29

Needed: A Framework for Abuse Data Exchange Technical Framework elements include: Data format specifications Data transport protocol specifications Software libraries Software tools Host systems Information repositories Data access controls M3AAWG and GSMA can make this happen Your participation is needed Legal Framework Privacy and access constraints Must support multiple nations laws and data-contributors constraints Business framework Getting parties to participate by contributing data Solve important problems Provide good ROI: low costs/high value Who pays? Data access policies Collaboration forums 30

Mitigating Abuse: The Solution is Multifaceted Automated technical defense This is Spam SpamRep standard reporting Network Spam filters Attend forums: Collaboration/education in defense Abuse (spam) data exchange 31