ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER. Ohad Bobrov Avi Bashan



Similar documents
BYPASSING THE ios GATEKEEPER

Enterprise Apps: Bypassing the Gatekeeper

CERTIFIGATE. Front Door Access to Pwning hundreds of Millions of Androids. Avi Bashan. Ohad Bobrov

How To Protect Your Mobile Device From Attack

BYOD Guidance: BlackBerry Secure Work Space

Enterprise Mobile Threat Report

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

Protecting Android Mobile Devices from Known Threats

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Secure Your Mobile Workplace

BYOD in the Enterprise

DUBEX CUSTOMER MEETING

Practical Attacks against Mobile Device Management Solutions

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Mobile Device Management:

Enterprise Mobile Security. Managing App Sideloading Threats on ios

Compliance Management for Mobile Devices

BlackBerry 10.3 Work and Personal Corporate

Feature List for Kaspersky Security for Mobile

Mobile Security: Threats and Countermeasures

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Guidance End User Devices Security Guidance: Apple ios 7

End User Devices Security Guidance: Apple ios 8

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Managing Mobile Devices in a Corporation

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Kaspersky Lab Mobile Device Management Deployment Guide

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

IBM Endpoint Manager for Mobile Devices

Software that provides secure access to technology, everywhere.

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

The Cloud App Visibility Blindspot

White Paper. Data Security. The Top Threat Facing Enterprises Today

Securing Office 365 with MobileIron

Secure, Centralized, Simple

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

Defending Behind The Device Mobile Application Risks

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Marble & MobileIron Mobile App Risk Mitigation

Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking

TrustDefender Mobile Technical Brief

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Guideline on Safe BYOD Management

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

THE THREE Es OF MODERN SECURITY FOR PHISHING

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

IT Self Service and BYOD Markku A Suistola

Zenprise Device Manager 6.1.5

The ForeScout Difference

ForeScout MDM Enterprise

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cloud Services MDM. Management Admin Guide

Mobile App Containers: Product Or Feature?

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

IT Resource Management vs. User Empowerment

Mobile App Management:

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Mobile Device Management

Bell Mobile Device Management (MDM)

Securing Corporate on Personal Mobile Devices

Symantec Mobile Management Suite

Unified Security Management and Open Threat Exchange

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Incident Response Playbook for Android and ios

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Debugging Mobile Apps

Transcription:

ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER Ohad Bobrov Avi Bashan

AGENDA ios Ecosystem overview Enterprise Apps in the ios Ecosystem Bypassing the Gatekeeper Conclusions Q&A 2

ABOUT US OHAD BOBROV Over a decade of experience researching and working in the mobile security space Former Founder & CTO @Lacoon Mobile Security Mobile Threat Prevention Area Manager @Check Point AVI BASHAN Security researcher for over a decade in the PC and mobile areas Former CISO & Security Researcher @Lacoon Mobile Dynamic Analysis Team Leader @Check Point 3

THE ios ECOSYSTEM IOS IS A MODERN OPERATING SYSTEM Sandboxing capabilities Resources access requires permission Signed code verification MANAGED APP PUBLISHING PROCESS Central App Store Developer registration is required to publish apps Anonymous development is not allowed 4

APPLE S APP REVIEW PROCESS EVERY APP PUBLISHED TO THE APP STORE IS REVIEWED Automatic process Manual Process APP STORE REVIEW GUIDELINES INCLUDES App content App behavior Bugs API abuse And more 5

APPLE DEVELOPER ENTERPRISE PROGRAM MOTIVATION Exposure of proprietary In-House Apps Slow review process 6

APPLE DEVELOPER ENTERPRISE PROGRAM Requires signing with a special enterprise certificate An enterprise needs to acquire a certificate Program is for internal enterprise use only Apps can be published directly to Any ios device from corporate server App is not reviewed by Apple 7

CASE SCENARIO FORTUNE 100 COMPANY ~5,000 BYOD devices analyzed RESULT WERE SURPRISING: 318 unique enterprise apps found 116 unique enterprise certificates were used 8

CASE SCENARIO - FORTUNE 100 COMPANY GOAPP SRL Mobvantage Marketing Ltd. MCE SYS LTD GF Securities Co., Ltd. Miracle Intelligent Network Co., Ltd. Qingdao Qingqi Industry Co., Ltd. QIAO BANG LIMITED FitnessKeeper, Inc. National Public Radio, Inc. Dentsu McGarry Bowen LLC Operator, Inc. evigilo Ltd. Phind Corp. Shanghai Yike Automation Technology Co., Ltd. Proving Ground, LLC. Humin Inc Dropbox, Inc. Hundsun Technologies Inc., Quoord Systems Limited Shenzhen Sunline Tech Co., Ltd. Huatai Securities Co.,Ltd. Shenzhen Baite Gifts Co., Ltd. R/GA Media Group Inc. Dongguan Chiting Trading Co., Ltd. Readdle Inc. Gameview sdn bhd Reserve Media, Inc Hangzhou HR Software Co., Ltd. S.F. EXPRESS GROUP CO., LTD. Fuzhou Yewen Advertising Co., Ltd. Seasonal Spring LLC Shanghai Soco Software Co., Ltd. Shanghai Column Fashion Co., Ltd. Shanghai 37 Degree Technology Co., Ltd. 9

NON APPSTORE CERTIFICATES 70 33 11 2 whitelisted Minimal reputation No reputation compromised 72% 28% Other Asia 10

WHAT CAN ENTERPRISE APPS DO? ABUSE PUBLIC APIs Microphone Location Address Book Calendar Pictures ABUSE PUBLIC APIs Take Screenshot List Apps EXPLOIT Jailbreak Masque 11

What LIMITS the enterprise app developer from doing all of those actions? 12

Trust * * And a user agreement 13

14

ENTERPRISE CERTIFICATE ABUSE 3 RD MARKET Third party App Stores use enterprise certificates to distribute apps. They often re-pack applications and distribute them. This is not a minor phenomenon 25PP more than 40M users, 8M downloads a day in 2013 vshare 40M users, 25% ios. 15,000 ios apps. 15

ENTERPRISE CERTIFICATE ABUSE (2) FinFisher (2013) Masque Attack (2014) Hacking Team (2015) Pangu (2014) WireLurker (2015) YISpecter (2015) 16

HACKING TEAM (1) Hacking Team got breached in July 2015 ios RAT source code was exposed Used an enterprise certificate to install malware Disguised as a newspaper in native Newsstand app Asks for extensive permissions Installs a key logger Leveraging masque attack 17

HACKING TEAM (2) 18

HACKING TEAM (3) 19

LET S TALK ABOUT MDMS 20

MOBILE DEVICE MANAGEMENT Used by enterprises to support BYOD Deploy security policy Remote wipe Install applications Etc.. 21

MOBILE DEVICE MANAGEMENT (2) ios Device 3. Status Request 4. Command MDM Server APNS 22

MOBILE DEVICE MANAGEMENT (2) ios Device MDM Server APNS 23

MiTM MDM Install an ios configuration profile: Can be used to route traffic through VPN/Proxy Can install root CA certificates Easy to deploy through phishing attacks 24

GOING BACK TO ENTERPRISE APPS 25

SECURITY FEATURES INTRODUCED IN ios 9 Apple understood the problem which lies in enterprise apps However, Enterprise apps cannot be eliminated Increase the complexity of executing enterprise apps Apps are cannot execute without explicit user trust 26

ios =< 8 27

ios >= 9 28

WWDC 15 Enterprise uses MDM, Can t do it to complicated.. 29

30

BYPASSING THE GATEKEEPER Set up a remote enterprise app server o Serves the malicious enterprise app Initiate an MiTM attack o Wait for a command sent by the MDM server o Replace the command with an app install request o ios device will fetch and install the enterprise app Enterprise app can now execute without explicit trust o User cannot tell the difference between enterprise and App Store app 31

ATTACK ANATOMY Remote enterprise malicious app server ios Device MDM Server APNS 32

DEMO 33

CONCLUSIONS Unverified code can be introduced to ios ecosystem through Enterprise apps Non-jailbroken device are exposed to attacks Enterprises cannot trust the end user judgment in BYOD environments Enterprises should have a clear way to view and assess the enterprise app in their organizations MiTM attacks can be leveraged to gain access to a device 34

QUESTIONS? 35