Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets



Similar documents
JRC and GMES GIO-EMS

Joint Research Centre

Safety Assessment of Nanomaterials at the Joint Research Centre

BUGAT TROJAN JOINS THE MOBILE REVOLUTION

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

How we keep harmful apps out of Google Play and keep your Android device safe

Security Threats for Mobile Platforms

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Securing Your Business s Bank Account

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Trust Digital Best Practices

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

BYPASSING THE ios GATEKEEPER

Data Center Security in a World Without Perimeters

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

The Mobile Malware Problem

Secure Your Mobile Workplace

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Enterprise Apps: Bypassing the Gatekeeper

MALWARE TOOLS FOR SALE ON THE OPEN WEB

Figure 1: A screenshot of a known Zeus variant called Citadel

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

F-Secure Labs. Protection around the clock. Mobile Threat Report Q4 2012

Agenda , Palo Alto Networks. Confidential and Proprietary.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

BlackBerry 10.3 Work and Personal Corporate

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Norton Mobile Privacy Notice

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Analyzing HTTP/HTTPS Traffic Logs

Mobile App Reputation

The Benefits of SSL Content Inspection ABSTRACT

Versafe TotALL Online Fraud Protection

Korea s experience of massive DDoS attacks from Botnet

arxiv: v1 [cs.cr] 30 Jan 2013

Unified Security Management and Open Threat Exchange

Realize Innovation of Cyber-Security with Big Data. Qi Xiangdong

Security for Smart Mobile Networks: The NEMESYS Approach

CERT-GOV-GE Activities & International Partnerships

Protecting the Infrastructure: Symantec Web Gateway

NEMESYS: First Year Project Experience in Telecom Italia Information Technology

The relevance of cyber-security to functional safety of connected and automated vehicles

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

OS Security. Malware (Part 2) & Intrusion Detection and Prevention. Radboud University Nijmegen, The Netherlands. Winter 2015/2016

Smartphone Pentest Framework v0.1. User Guide

Top five strategies for combating modern threats Is anti-virus dead?

Studying Security Weaknesses of Android System

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

MOBILE MALWARE REPORT

Cellpot: A Concept for Next Generation Cellular Network Honeypots

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

SR B17. The Threat Landscape Continues to Change: How are You Keeping Pace? Dean Turner

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

10 Things Every Web Application Firewall Should Provide Share this ebook

Security A to Z the most important terms

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security

Protecting against Mobile Attacks

G DATA MOBILE MALWARE REPORT

How Attackers are Targeting Your Mobile Devices. Wade Williamson

How To Secure Your Store Data With Fortinet

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Using big data analytics to identify malicious content: a case study on spam s

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

MRG Effitas 360 Assessment & Certification Programme Q4 2014

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Mobile & Security? Brice Mees Security Services Operations Manager

Information & network security in the new threat landscape. Sarah Greenwood

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

trends in mobile malware and importance of network based user protection

Inspection of Encrypted HTTPS Traffic

How To Protect Your Online Banking From Fraud

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

10 best practice suggestions for common smartphone threats

The Risk Prevention Management System of the European Commission's staff

The Key to Secure Online Financial Transactions

Cyber Security for your Connected Health Device

DoS: Attack and Defense

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

CompuMobile. Technical whitepaper Mobile Encryption. English

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Kaspersky Security 10 for Mobile Implementation Guide

Corrosion and SCC material testing in SCW in JRC IET Petten

Evolution of attacks and Intrusion Detection

Enterprise Mobile Security. Managing App Sideloading Threats on ios

Cyber Security for SCADA/ICS Networks

Transcription:

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Pasquale Stirparo (@pstirparo) Laurent Beslay www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation

Outline ² Introduction and Motivation ² Classical Botnet vs. Mobile Botnet ² Privacy concerns ² Current solutions ² Participatory Honeypot ² Conclusions 2

The Mission of the Joint Research Centre is to provide customer-driven scientific and technical support for the conception, development, implementation and monitoring of EU policies. As a service of the European Commission, the JRC functions as a reference centre of science and technology for the Union. Close to the policy-making process, it serves the common interest of the Member States, while being independent of special interests, whether private or national. 3

IRMM - Geel, Belgium Institute for Reference Materials and Measurements ITU - Karlsruhe, Germany Institute for Transuranium Elements IE - Petten, The Netherlands Institute for Energy IPSC - Ispra, Italy Institute for the Protection and Security of the Citizen IES - Ispra, Italy Institute for Environment and Sustainability IHCP - Ispra, Italy Institute for Health and Consumer Protection IPTS - Seville, Spain Institute for Prospective Technological Studies 4

Introduction ² Mobile malware has reached almost 200k samples, increasing of 1k new samples per day ² Android is leading accounting for 79% of all mobile malware ² Privacy and data protection rights are part of the European Regulatory framework ² A new trend: data subject wants to participate 5

Should we care? 6

Should we care? 7

Should we care? 8

Evolution Timeline ² 2009-11 ikee for (jailbroken) iphone ² 2010-09 First Zitmo for Symbian and BB ² 2011-01 SpyEye and Zeus Merged ² 2011-02 Zitmo for WinCE ² 2011-03 Spitmo for SymbOS ² 2011-06 Zitmo for Andorid ² 2011-09 Android Spitmo Discovered ² 2012-10 SpamSoldier (Android) ² 2012-12 Citmo for Android ² 2012-12 Dexter for PoS ². ² 2013-09 SMS.AndroidOS.Opfake.a botnet used to distribute Backdoor.AndroidOS.Obad.a 9

Classical Botnet vs. Mobile Botnet ² Infection vector and botnet topology ² Honeypots Def: a computer system, built and deployed just for the goal of being attacked and compromised in order to study new attacks and to serve as an early warning system. ² Botnet monitoring / tracking Data collection and Analysis ² Mitigation Shall we block SMSs? 10

Current Mobile Botnets Tasks ² Fraudster Zitmo, Spitmo, Citmo ² SMS Spam SpamSoldier ² DDoS TheAndroid.DDoS.1.origin ² what s next? 11

What about Privacy? 12

What about Privacy and Data Protection? ² Stealing contacts, personal information; ² Opening a backdoor on the device and sending the IP address to the remote server; ² Sending SMS messages to premium numbers; ² Sending copies of SMS messages, IMSI and IMEI; ² GPS tracking; ² Recording calls and uploading to a server; ² Capturing unencrypted web sessions; ² Capturing keyboard inputs; ² Building profile without the consent of the data subject; ² Etc 13

Mobile Honeypot: current solutions 1. Nomadic Honeypot Two VM, a HoneypotVM running Android and an InfrastructureVM, which implements the communication part with the sensors, logging capabilities and a backchannel to communicate with the operator. Potential risks are that a) if for any reason, the VM separation get compromised the device will be out of control from the infection point of view; and b) it may be very invasive, and not many users may be willing to participate/collaborate knowing that everything (SMS, calls, Internet traffic, etc.) is being monitored by a third party. Liebergeld, S., Lange, M., Mulliner, C.; Nomadic honeypots: A novel concept for smartphone honeypots. In: Proc. Workshop on Mobile Security Technologies (MoST13), in conjunction with the 34th IEEE Symp. on Security and Privacy 14

Mobile Honeypot: current solutions 2. Mobile Honeypot Honeypot systems implemented using well-known honeypot tools and connected to the UMTS network via USB stick; The attempt is to make the honeypot looking like a mobile phone; The choice of such architecture has also been driven by the aim to focus on remote attacks via the Internet; The authors state that there is no need to operate the mobile honeypot on real device. Wahlisch, M., Vorbach, A., Keil, C., Schonfelder, J., Schmidt, T.C., Schiller, J.H.; Design, implementation, and operation of a mobile honeypot. arxiv preprint arxiv:1301.7257 (2013) 15

Participatory Honeypot We introduce the concept of Participatory Honeypot, a privacy-bydesign system where users become partners of the collection of meaningful information subsequently used for the analysis. ² Remote sandbox system ² The user downloads the application he intend to purchase ² He will use it during a limited test phase remotely on our system from his mobile phone, via a mobile application provided by us 16

Usage Scenario 17

Advantages of this solution ² Meaningful touches Modern malware can detect random touches on the screen, meaning that they are being under dynamic analysis Therefore they may keep the malicious activity dormant; ² Privacy by design principle Being executed outside the user's real device, we avoid to overcollect extra information related to the user private activities that may not be always indispensable for the analysis. The system is based on an anonymity preserving reputation framework using periodic pseudonyms generated by blind signatures as proposed by Delphine Chrisitin and Matthias Hollick 18

Advantages of this solution (cont d) ² The success of such system depends on the active contributions of the users, rewards and voting schemes will be put in place as incentive to participate, as well as for the operator to grade the level of users' contribution. ² As a contribution for a trustworthy relationships between the PBDS and the user acting as a partner, a Data Protection Impact Assessment will be conducted and its results provided to the user prior to his/her registration to our system. 19

Conclusions ² Mobile botnet will be a growing concern and we should care about it; ² Due to its nature, classical approaches may not work in the mobile environment; ² The mobile dimension brings high risks also for user privacy: Attackers have access to many personal data; Analyst may over-collect information for analysis; ² Novel concept of Participatory Honeypot; 20

Joint Research Centre (JRC) Web: www.jrc.ec.europa.eu Contacts: pasquale.stirparo@jrc.ec.europa.eu laurent.beslay@jrc.ec.europa.eu 21