Practical Attacks against Mobile Device Management Solutions



Similar documents
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Practical Attacks against Mobile Device Management (MDM)

Chris Boykin VP of Professional Services

Defending Behind The Device Mobile Application Risks

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Feature List for Kaspersky Security for Mobile

Guideline on Safe BYOD Management

Enterprise Mobile Threat Report

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

How To Protect Your Mobile Device From Attack

Protecting Android Mobile Devices from Known Threats

BYOD Guidance: BlackBerry Secure Work Space

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

The Incident Response Playbook for Android and ios

Mobile First Government

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Device Management

Marble & MobileIron Mobile App Risk Mitigation

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

BYOD in the Enterprise

Secure Your Mobile Workplace

Enterprise Mobility Management

Addressing NIST and DOD Requirements for Mobile Device Management

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Securing Office 365 with MobileIron

Whitepaper. Mobile Security. The 5 Questions Modern Organizations Are Asking

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Mobile Security Solution BYOD

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Security Best Practices for Mobile Devices

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

IT Resource Management vs. User Empowerment

How to Successfully Roll Out an Android BYOD Program

CHECK POINT THE MYTHS OF MOBILE SECURITY

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

RFI Template for Enterprise MDM Solutions

The Cloud App Visibility Blindspot

Samsung Mobile Security

BYPASSING THE ios GATEKEEPER

Norton Mobile Privacy Notice

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

CERTIFIGATE. Front Door Access to Pwning hundreds of Millions of Androids. Avi Bashan. Ohad Bobrov

IT Resource Management & Mobile Data Protection vs. User Empowerment

Mobile Application Security and Penetration Testing Syllabus

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

How Attackers are Targeting Your Mobile Devices. Wade Williamson

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

Endpoint protection for physical and virtual desktops

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Bell Mobile Device Management (MDM)

Device Independence - BYOD -

If you can't beat them - secure them

Mobile Security: Threats and Countermeasures

BYOD AND NEXT- GENERATION MOBILE SECURITY

Technical Note. ForeScout MDM Data Security

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Readiness Assessments: Vital to Secure Mobility

Security for Moving Targets: BYOD Changes the Game

The ForeScout Difference

Embracing Complete BYOD Security with MDM and NAC

Endpoint protection for physical and virtual desktops

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Advanced ANDROID & ios Hands-on Exploitation

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Cyber Security. John Leek Chief Strategist

Enterprise Apps: Bypassing the Gatekeeper

Codeproof Mobile Security & SaaS MDM Platform

Transcription:

Practical Attacks against Mobile Device Management Solutions Michael Shaulov, CEO michael@lacoon.com Daniel Brodie, Sr Security Researcher daniel@lacoon.com

About: Daniel Security researcher for nearly a decade From PC to Mobile Researcher and Developer at Lacoon Developing an App Analysis framework for spyphones and mobile malware

About: Michael Decade of experience researching and working in the mobile security space From feature-phones to smartphones Mobile Security Research Team Leader at NICE Systems CEO and co-founder of Lacoon Mobile Security

Targeted Attacks: From PC to Malware Convergence of Personal and Business Ubiquitous Perfect Surveillance Hardware

Targeted Attacks: From PC to Malware 137g Convergence of Personal and Business Ubiquitous Perfect Surveillance Hardware

Targeted Attacks: From PC to Malware Convergence of Personal and Business Ubiquitous Perfect Surveillance Hardware

Agenda Rise of the spyphones Introduction to MDM and Secure Containers Bypassing secure container encryption capabilities Recommendations and summary

TARGETED MOBILE THREATS

Business Impact The Mobile Threatscape Spyphones Targeted: Personal Organization Cyber espionage Mobile Malware Apps Consumer-oriented. Mass. Financially motivated, e.g.: Premium SMS Fraudulent charges Botnets Complexity

Mobile Remote Access Trojans (aka Spyphones)

Recent High-Profiled Examples

Commercial mrats

A Double-Edged Sword Back-Up mrat

Survey: Cellular Network 2M Subscribers Sampling: 500K Infection rates: June 2013: 1 / 800 devices

Survey: Cellular Network 2M Subscribers Sampling: 500K

MDM and SECURE CONTAINERS 101

Mobile Device Management Policy and configuration management tool Helps enterprises manage BYOD and mobile computing environment Offerings include separating between business data and personal data

MDM: Penetration in the Market Over the 5 years, 65% of enterprises will adopt a mobile device management (MDM) solution for their corporate liable users Gartner, Inc. October 2012

MDM Key Capabilities Software management Network service management Hardware management Security management Remote wipe Secure configuration enforcement Encryption

Secure Containers All leading MDM solutions provide secure containers MobileIron AirWatch Fiberlink Zenprise Good Technology

Behind the Scenes: Secure Containers Application Sandbox Secure Communication (SSL) Encrypted Storage Enterprise

MDMs and Secure Containers 3 assumptions: Encrypt business data Encrypt communications to the business (SSL/ VPN) Detect Jailbreak/ Rooting of devices

MDMs and Secure Containers Let s test these assumptions

BYPASSING MOBILE DEVICE MANAGEMENT (MDM) SOLUTIONS

Overview Infect the device Install Backdoor Bypass containerization Exfiltrate Information

DEMO ANDROID

Step 1: Infect the Device

Step 1: Technical Details Publish an app through the market Use Two-Stage : Download the rest of the dex later and only for the targets we want Get the target to install the app Through spearphishing or physical access to the device

Step 2: Install a Backdoor (i.e. Rooting) Root Any process can run as root user if it is able to trigger a vulnerability in the OS Vulnerability Android device vulnerabilities are abundant Exploit On-Device detection mechanisms can t look at apps exploiting the vulnerability

Step 2: Technical Details Privilege escalation We used the Exynos exploit (Released Dec., 2012) Create the hidden suid binary and use it for specific actions Place in a folder with --x--x--x permissions Undetected by generic root detectors

Step 3: Bypass Containerization Jo, yjod od sm r,so; Storage

Step 3: Bypass Containerization Jo, yjod od sm r,so; Storage

Step 3: Bypass Containerization Jo, yjod od sm r,so; Hi, This is an email Storage Memory

Step 3: Technical Details We listen to events in the log For <= 2.3 we can just use the logging permissions For >4.0 we access the logs as root When an email is read

Step 4: Exfiltrate Information Jo, yjod od sm r,so; Hi, This is an email Exfiltrate information Storage Memory

Step 4: Technical Details We dump the heap using /proc/<pid>/ maps and /mem Then search for the email structure, extract it, and send it home

DEMO IOS

Step 1: Infect the device

Step 2: Install a Backdoor (i.e. Jailbreaking) Community Jailbroken xcon

Step 2: Technical Details Install signed application Using Enterprise/ Developer certificate Use the Jailbreak To complete the hooking Remove any trace of the Jailbreak

Step 3: Bypass Containerization Load malicious dylib into memory (it's signed!) Hook using standard Objective-C hooking mechanisms Get notified when an email is read Pull the email from the UI classes

MITIGATION TECHNIQUES

MDM MDMs are good for: Management Compliance Enforcement DLP Physical Loss However

MDM is static and inefficient against the dynamic nature of cybercrime

Do We Have Visibility?

Can We Assess Risk in Real-Time?

Can We Mitigate Targeted Threats?

Attacks are going to happen It s a question of assessing risk And mitigating the effects

Life is inherently risky. There is only one big risk you should avoid at all costs, and that is the risk of doing nothing. Denis Waitley

Risk Metrics / Visibility Vulnerabilities and Usage Is the device up-to-date? Any known vulnerabilities pertaining to the OS? Is the device connecting to a public hotspot? App Behavioral Analysis What is the common app behavior? (static analysis) What is the app doing? (dynamic analysis) Funky Correlation of Events Is the device sending an SMS when the phone is locked?

Risk Metrics / Real-Time Assessment Network Behavioral Analysis Anomaly detection of communications of apps Outgoing content inspection (unencrypted) Blocking of exploit and drive-by attacks

Thank You. Michael Shaulov, CEO michael@lacoon.com Daniel Brodie, Sr Security Researcher daniel@lacoon.com