Malware in ios and Android The Gathering Storm?



Similar documents
Defending Behind The Device Mobile Application Risks

BYOD Guidance: BlackBerry Secure Work Space

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Why The Security You Bought Yesterday, Won t Save You Today

BlackBerry 10.3 Work and Personal Corporate

Android vs. Apple ios Security Showdown Tom Eston

BYOD in the Enterprise

Mobile Application Security and Penetration Testing Syllabus

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, This document is the property of Bomgar Corporation.

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Mobile Banking. Click To Begin

Chris Boykin VP of Professional Services

Advanced ANDROID & ios Hands-on Exploitation

BYOD: End-to-End Security

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services

Attacks from the Inside

Practical Attacks against Mobile Device Management Solutions

Enterprise Application Security Workshop Series

Building a Mobile Information Management Strategy

Mobile Security Standard

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Why you need. McAfee. Multi Acess PARTNER SERVICES

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Global Security Report 2011

Windows Phone 7 Internals and Exploitability

Norton Mobile Privacy Notice

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Agenda , Palo Alto Networks. Confidential and Proprietary.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Mobile Print/Scan Guide for Brother iprint&scan

MXview ToGo Quick Installation Guide

UNI - WINDOWS. How to... Access your University on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

You will need your District Google Mail username (e.g. and password to complete the activation process.

Fear and Loathing in BYOD

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

Tutorial on Smartphone Security

Android Security - Common attack vectors

Mobile Operating Systems & Security

Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík

Kaspersky Security 10 for Mobile Implementation Guide

Patch and Vulnerability Management Program

TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead

Administering Jive Mobile Apps

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

[BRING YOUR OWN DEVICE POLICY]

Mobile Print/Scan Guide for Brother iprint&scan

ONE Mail Direct for Mobile Devices

How to configure your mobile devices post migrating to Microsoft Office 365

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

U.S. Cellular Mobile Data Security. User Guide Version 00.01

This software will update your Samsung Galaxy S II to Android software version GB28.

Are free Android virus scanners any good?

MDM User Guide June 2012

Hands on, field experiences with BYOD. BYOD Seminar

RIA SECURITY TECHNOLOGY

Secure Your Mobile Workplace

ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT

Booth Gmail Configuration

Penetration Testing for iphone Applications Part 1

Pentesting Android Mobile Application

Mobile Device Management and Security Glossary

Google Identity Services for work

Kaseya 2. User Guide. Version 1.0

Protecting Your Organisation from Targeted Cyber Intrusion

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Client Training Manual

The Raiser s Edge Mobile Application Guide

Mobile Print/Scan Guide for Brother iprint&scan

Exactly the Same, but Different

Smartphone Pentest Framework v0.1. User Guide

Legal notices. Legal notices. For legal notices, see

Transcription:

Malware in ios and Android The Gathering Storm?

2 Introduction

About Me Security consultant Android and ios security testing Researcher in Android malware 3

Agenda Introduction to Mobile Malware Introduction to Android and ios Protection against Malware & Bypasses Consequences of Malware Mitigation 4

5 Malware in Mobile

Malware in Mobile Traditional malware vectors 1. Limit malware infection = Limit user install privileges Limit services exposed 6

Malware in Mobile Traditional malware vectors 2. Limit malware actions = Limit user privileges 7

Malware in Mobile Traditional malware vectors 3. Detection and removal = AV / Traffic analysis 8

Malware in Mobile Mobile malware vectors 1. Limit malware infection = Mobile vendor market place protections User review 9

Malware in Mobile Mobile malware vectors 2. Limit malware actions = Sandbox 10

Malware in Mobile Mobile malware vectors 3. Detection and removal = Vendor identification 11

12 Android & ios

Android Unveiled 2007 Open source license Applications can be downloaded from Google Play (formerly Android Market) Apps mostly written in Java 13

ios Released by Apple in 2007 Not licensed to non-apple hardware Applications downloaded from the Apple app store Applications written in objc (and C) 14

Protection Against Malware 15

Protection from Malware - Android In the marketplace Bouncer Simulates running application On device - Sandboxing applications Can still talk to other apps using their end-points Restricts actions by permissions Supports ASLR and DEP (but not implemented) Google can uninstall applications without user interaction 16

Protection from Malware - ios Devices can only run code signed by Apple (unless Jail Broken) Applications are reviewed before being added to the app store On device security: ASLR W^X Sandboxing File encryption (when at rest) Apple can remove apps from devices 17

Bypassing Protection Charlie Miller s ios application Post install code download MADDEN NFL 12 (IRC bot / SMS) for Android Root exploit Premium rate SMS IRC bot communication Users trusting the developer 18

User permissive attacks Installing apps request permissions they want: 19

User permissive attacks Example by MWR The ricker app 20

User permissive attacks What the user sees: 21

User permissive attacks What is actually happening: 22

User permissive attacks Top 10 hot apps: Would you accept the following? Internet Access? Read your contacts? Modify/Delete SD card contents? Write / Modify your contacts? 23

Android - logs Android applications write to a common log file Any application with READ_LOGS permission can see all the logging from all applications. Includes Radio logs Android is found to be logging sensitive information: Text messages 05-10 13:45:48.447 1453 1542 I RIL-MX : toksmsrsp: datalen = 81 0791447728008000040C9144976815581200002150013154154006C2329BFDBE03+GC MT=66 Call information D/HTC_RIL ( 70): RX::> +CLCC: 1,1,4,0,0,"07786172419",129\r\n0\r D/HTC_RIL ( 70): (t=1336655587)<< +CLCC: 1,1,4,0,0,"07786172459",129\r\n0\r 24

Zero permission app 0 permissions!= No access By Default Android applications can access: SD card (read only) Public functions of other applications (i.e. Endpoints) 25

Zero permission app - example 26 HTC Wildfire S bought in October 2011 Scanned with Mercury application Other application s allowed communication to 130 database files that contained: All my APN settings (including passwords!) The current web page I'm browsing My location (thanks weather app!) My messages and attachments through HTC s social application All my download history All my calendar history

Zero permission app - FOTA FOTA Firmware Over the Air Checks site for updates of the phone s firmware Installs if newer. Testing showed that: These details were in a database The database had SQL injection The database was world writable 27

Consequences of Malware 28

Consequences How bad can malware really be? User information can be sold User credentials Premium rate charges Spam DDos What s in your phone? 29

30 Mitigation

Mitigation Is there a solution? One opinion: Who here has an iphone? Who here has a BlackBerry? Who here uses Gmail? Well, you're all screwed - Julian Assange 31

Mitigation It s the responsibility of the User Control what is on the device Sensitive information Connections Applications 32

Mitigation It s the responsibility of the Developer Need to develop for the platform Data in memory Secure storage Secure connections Application interaction control 33

Mitigation It s the responsibility of the Company Unique to mobile approach ios has basic management controls through enterprise solutions. Android has Device Policy 34

Mitigation Device review Tailored to mobile problems Creation of trusted devices that uses a trusted market Review of devices and the applications and services installed Source code review of applications 35

36 Questions?