How To Understand The Impact Of Malware On A Network



Similar documents
Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

Secure Your Mobile Workplace

Protecting against Mobile Attacks

The Case for Network-based Malware Detection The need for an additional layer of protection

Innovations in Network Security

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Guideline on Safe BYOD Management

Perception and knowledge of IT threats: the consumer s point of view

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Advanced Persistent Threats

Trust Digital Best Practices

Norton Mobile Privacy Notice

Kaspersky Lab. Contents

10 Quick Tips to Mobile Security

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

trends in mobile malware and importance of network based user protection

isheriff CLOUD SECURITY

PULSE SECURE FOR GOOGLE ANDROID

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Protection for Mac and Linux computers: genuine need or nice to have?

white paper Malware Security and the Bottom Line

Kaspersky Security 10 for Mobile Implementation Guide

Protecting the Infrastructure: Symantec Web Gateway

Zenprise Device Manager 6.1.5

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Emerging Security Technological Threats

Putting Operators at the Centre of

ENTERPRISE MOBILE THREATS. 2014: A Year In Review. I. Introduction. Methodology. Key Highlights ENTERPRISE

WHITE PAPER. Understanding How File Size Affects Malware Detection

Malware & Botnets. Botnets

2012 Bit9 Cyber Security Research Report

Securing mobile devices in the business environment

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Security Intelligence Services.

The Hillstone and Trend Micro Joint Solution

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

2014 MOBILE THREAT REPORT

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

MOBILE MALWARE REPORT

SECURING TODAY S MOBILE WORKFORCE

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Streamlining Web and Security

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

What Do You Mean My Cloud Data Isn t Secure?

Security A to Z the most important terms

Networking for Caribbean Development

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager

Defending Against Cyber Attacks with SessionLevel Network Security

Mobile Application Security Sharing Session May 2013

How To Protect Your Mobile Device From Attack

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Copyright 2013, 3CX Ltd.

Mobile App Containers: Product Or Feature?

Using big data analytics to identify malicious content: a case study on spam s

Operation Liberpy : Keyloggers and information theft in Latin America

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Certified Ethical Hacker Exam Version Comparison. Version Comparison

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

Chris Boykin VP of Professional Services

Data Center security trends

Malicious Network Traffic Analysis

Countermeasures against Bots

Stopping zombies, botnets and other - and web-borne threats

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Protect Your Business and Customers from Online Fraud

Internet threats: steps to security for your small business

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Securing and Monitoring BYOD Networks using NetFlow

Introduction (Contd )

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Mobile App Reputation

DDoS Attacks Can Take Down Your Online Services

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Report. Quarter 3 July - September 2013

Are free Android virus scanners any good?

Current Threat Scenario and Recent Attack Trends

10 Smart Ideas for. Keeping Data Safe. From Hackers

Why you need. McAfee. Multi Acess PARTNER SERVICES

How to Practice Safely in an era of Cybercrime and Privacy Fears

Lucent VPN Firewall Security in x Wireless Networks

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Security Intelligence Services. Cybersecurity training.

Spyware: Securing gateway and endpoint against data theft

Description: Course Details:

for businesses with more than 25 seats

Transcription:

Black Hat Mobile Security Summit London 2015

Table of contents Introduction... 1 Monitoring malware in the mobile network... 1 Maintaining the detection rules... 2 Infection rate... 3 Misquoted in the press.... 5 Malware samples... 6 Breakdown by device type... 6 Malware impact... 7 Windows malware..................................... 7 Android malware...................................... 8 Why Android... 9 Sideloading.......................................... 9 Google Play......................................... 10 App hijacking....................................... 10 Some examples of Android malware... 11 Top 20 2014........................................ 11 UAPush............................................ 11 SMSTracker......................................... 12 NotCompatible...................................... 12 Koler............................................. 13 FakeFlash.......................................... 13 Mobile Spyware...................................... 13 DDoS... 14 Impact of scanning.................................... 14 DNS amplification DDoS attack in mobile network............. 14 Conclusion.... 15

INTRODUCTION This paper is based on a presentation given at the Black Hat Mobile Security Summit held in London in June 2015. Mobile devices are becoming the target of choice for cybercriminals. This paper will provide an in-depth view of the mobile malware that is currently active on the Internet. It describes the infection rates, what the malware does, how it is monetized and the impact it has on network resources and the user experience. Motive Security Guardian, s network-based malware detection system, is deployed covering close to 100 million devices in major mobile carriers in the United States, Europe, Asia and the Middle East. It uses deep packet inspection (DPI) technology to detect malware command and control (C&C) traffic to identify the malware infection. Aggregated statistics on the infection rates for malware in these networks has been reported in regular quarterly malware reports. This paper leverages the most recent aggregated information from these deployments. We will start with a brief description of where the data comes from and describe how C&C traffic is used to accurately detect and positively identify the malware. We then review the overall malware infection statistics for mobile devices, including the infection rate, the type of malware involved and the types of devices that are infected. We provide a summary of the top malware infections seen in mobile networks, outlining what the malware does, how the device is infected, the impact on the network and the impact on the user experience. Monitoring malware in the mobile network Figure 1 illustrates how the Motive Security Guardian is deployed in the mobile network. The system consist of multiple detection sensors deployed in the mobile network connected to a centralized Alert Aggregation and Analysis system that is usually deployed in the service providers data center. Figure 1. Deployment diagram Mobile network security analytics Forensic analysis Alert aggregation and analysis Malware detection sensor NodeB RNC SGSN 10 GE or GE RAN Alternate tap (lu-ps and S1-u) Recommended tap (Gn and S5/8) Alternate tap choice (G1 and SG1) Internet GGSN/PGW enodeb SGW 1

The detection sensors are deployed on taps on the Gn interface (3G) or S5/S8 interface (4G). These monitor the GTP-C and GTP-U traffic between the serving gateways (SGWs) and PDN gateways (PGWs). Alternatively, they can tap the S1-u or Gi interfaces. The GTP-C traffic contains control sequences to set up the tunnels to carry the mobile Internet traffic. The system monitors this to extract session identification information such as the international mobile subscriber identity (IMSI), international mobile equipment identifier (IMEI) and access point name (APN) and to provide a mapping between the IP addresses used in the tunneled data traffic and the endpoint devices. The IMSI identifies the user and their mobile carrier. The IMEI identifies the mobile device type and manufacturer. This information is used to map malware alerts to specific devices. The GTP-U provides the tunnels to transport data traffic between the mobile devices and the Internet. The system decapsulates and looks for evidence of malware communications within the data traffic. It uses a snort-based detection engine with customized detection rules to look for: Malware C&C traffic Exploit attempt Evidence of distributed denial of service ( DDoS) activity Hacking activity For the most part the detection system uses malware C&C traffic to positively identify malware infection with a high degree of accuracy. When malware traffic is detected, the detection event is sent to the central analysis system. The event consists of the IP addresses and ports associated with malware communication, a malware identifier, timestamp and other metadata about the alert. The system can optionally capture the trigger packet for the event. The analysis system uses the IP address from the alert to associate it with a specific user/ device and stores the event in a database. The system provides network security specialists with information on the malware that is active in the network, provides input to policy management systems such as the Policy and Charging Rules Function (PCRF) on infected devices, provides customer care with information on which users are infected and can be used as the basis of a customer-facing malware notification service. Maintaining the detection rules The key to doing network-based malware detection is an up-to-date set of detection rules. That is the role of s Motive Security Labs. Figure 2 illustrates how the detection rules are kept up to date. Over 120,000 malware samples are received each day. These are classified using standard antivirus techniques and stored. If the sample is not already known, it is run in a sandbox environment and the network traffic is collected. If this does not trigger an existing detection rule, we develop a new rule and push it out to the field for testing. After successful field tests, it is promoted to an active rule and is used in our production system. 2

Figure 2. Rules development process Malware samples Traffic policy Virus vault Sandbox Malware Rules Rules 120K+ analyzed traffic development library per day library 30M+ active sample Deployment + specific rules sets Rules repository Rule activation Zero day behavioral rules Quality testing Field testing in live networks Feedback from field tests Infection rate Figure 3 shows the infection rate aggregated across mobile deployments from December 2012 until the end of May 2015. Figure 3. Infection rates 0.80% 0.70% 0.60% 0.50% 0.40% 0.30% 0.20% 0.10% 0.00% July 2012 Oct Jan 2013 May August Nov March 2014 June Sept Dec April 2015 July It includes all infected devices, including tethered PCs running Microsoft Windows. In 2015 the drop in the infection rate is mostly due to a decrease in infections on devices running the Android operating system. Recently there have been two reports that offer a significantly different view. In its 2015 Data Breach Investigation Report, Verizon says that only 0.03% of mobile devices in its network are infected. At the 2015 RSA conference, a researcher from Damballa reported only 0.0064%. 3

The graph in Figure 4 includes these numbers and data points from Google and Lookout. Figure 4. Infection rate comparison 0.8% 0.7% 0.6% 0.5% 0.4% 0.3% Lookout Google Verizon Damballa 0.2% 0.1% 0.0% April 2012 October May 2013 November June 2014 December July 2015 The Google data point is from its Android Security 2014 Year In Review. They have used information from their Verify apps component to determine how many devices have installed Potentially Harmful Applications (PHAs). The report says US English devices have a PHA installed on about 0.4% of devices, which is about 0.2% below the worldwide average. The Lookout data point is from its State of Mobile Security 2012 where they report infection rates for a number of geographic locations. They show infection rates ranging from 0.2% to over 1.0% depending on the location. The average was about 0.4%. This difference is predominantly due to different definitions of what exactly constitutes malware. Verizon counts only very high threat level malware that is obviously not yet prevalent in the mobile environment. Damballa is using a mobile blacklist that is based on a small number of common Android malware families. Google, Lookout and have a less restrictive view that includes moderate threat level malware and some aggressive adware. A common thread among all parties is that regular adware is now so common that it should not generally be counted as malware. 4

Misquoted in the press Sometimes legitimate results can be misquoted in the press. Figure 5 shows a chart published by NQ Mobile in their 2013 report. Figure 5. Chart from NQ Mobile report 31.71% 17.15% 10.38% 6.53% 6.04% China Russia India U.S. Thailand Source: NQ Mobile In the report they very clearly stated that: 31.7% of infected devices are in China Unfortunately this was subsequently reported in the press as: 31.7% of devices in China are infected A slight change in word order resulted in a huge change in meaning. 5

Malware samples Figure 6 shows the number of mobile malware samples we have in our data base since 2012. Figure 6. Mobile malware samples 1400000 1200000 1000000 800000 600000 400000 200000 0 July 2012 October January 2013 April July October January 2014 April July October In 2013 the number of samples doubled each quarter. In 2014 the rate has been more linear with an increase of 160%. 95% of the samples are Trojanized Android apps. Breakdown by device type Figure 7 shows the infection breakdown by device type. Figure 7. Infection breakdown by device type 2013-2015 100 90 80 Android 70 60 50 40 30 20 10 Windows 0 Jan 2013 Mar May July Sept Nov Jan 2014 Mar May July Sept Nov Jan 2015 Mar May 6

Throughout this period on average: ~50% of infected devices run the Android operating system ~50% of devices are PCs running the Windows operating system and connected to the mobile network <1% are iphone, Blackberry, Symbian, Windows Mobile devices However in 2015 we have seen a significant reduction in the proportion of infections on Android devices. This is illustrated in the graph below. Figure 8. Malware infection rates by device type 0.80% 0.70% 0.60% 0.50% 0.40% 0.30% Windows/PC Android Total 0.20% 0.10% 0.00% Oct 2012 January 2013 March August November March 2014 June September December April 2015 July The noticeable drop in the infection rate in 2015 is due to a significant decrease in the Android infection rate. This is due to the efforts of Google to reduce the malware on Google Play and their introduction of the Verify apps feature. Malware impact Windows malware Professional cybercrime has a considerable investment in the Windows PC platform. The technology for exploiting the Windows platform is mature and effective. The platform is targeted by exploit kits. Rootkit technology is well entrenched and C&C is mature and robust. A cybercriminal economy is built around this platform, with different players creating and packaging the exploits, infecting endpoints, creating and managing botnets, monetizing the bots and finally laundering the financial gains. In fixed broadband networks we see infection rates close to 15% 5% if you count only high threat level malware. We see the same infection profile in Windows PCs and on laptops that are active on the mobile network. Despite their relatively small number compared with mobile phones, they make up over 50% of the malware activity that we observe in the mobile network. They are primarily connected via mobile Wi-Fi devices or USB dongles, but some are tethered through phones. 7

The types of Windows malware have the same profile as in the fixed broadband case; they include botnets, rootkits, spam, identity theft, banking Trojans, DDoS, ad-click, Bitcoin, fake antivirus (FakeAV), ransomware, hacktivism, spyware The impact on the network varies depending on the type of malware. Spam and ad-click bots can have a significant impact on network bandwidth consumption. However with the advent of Long Term Evolution (LTE) networks, this impact is somewhat reduced due to the higher capacity of the underlying network infrastructure. Often the C&C protocol can have a significant impact on the radio resources due to 24/7 air time or high radio signaling activity caused by periodic heartbeat packets. Examples: A laptop running Windows infected with a proxy-bot created 800,000 TCP sessions and consumed 3 gigabytes of bandwidth in a 24-hour period. A roaming user infected with the ZeroAccess p2p bot draws traffic from over 4000 peers around the Internet. All this is backhauled from his home network to the network he s roaming in. A bot checks in every minute with its C&C server. This ensures that if the device is otherwise idle, the radio connection must be re-established each time. Impact on the user includes: Identity theft due to key loggers and password stealers Financial loss due to banking Trojans Excessive charges due to bandwidth usage Extortion due to ransomware Performance degradation due to consumption of computing and network resources Embarrassment from spamming and infecting friends Android malware Android malware comes mostly in the form of Trojanized apps that are downloaded from third-party app stores or Google Play and installed by the user. The malware is often embedded in free games or ripped off versions of commercial apps that are offered for free on third-party stores. Sometimes some sort of phishing or social engineering campaign is used to entice the user to install the malware. For example the NotCompatible proxy bot gets its name from the fact that when potential victims visited infected web sites, they were told that their browser was not compatible with the site and that they should download and install the update, which of course contained the malware. The Koler ransomware bot enticed visitors to Internet-based pornographic sites to download and install a premium access video player. Generally speaking, when compared with the more mature Windows variety, Android malware is not nearly as sophisticated or threatening. Specifically: C&C servers are hard-coded in the source code as URLs, domain names or IP addresses. The C&C protocol is not robust and can be disrupted by taking out a single server. The malware makes no real attempt to conceal itself or avoid detection by antivirus software. The malware makes no attempt at persistence and can be removed by a simple uninstall. 8

Adware is very common, to the point where we don t actually count it as malware at all. Ad networks will offer software development kits (SDKs) that developers can embed into apps to provide targeted advertising that is used to fund the application. These SDKs will typically use the devices IMSI and IMEI to identify the device to the ad server. Often location and demographic information is also provided. In some cases the adware will send additional information, such as the contact list or list of installed apps. Here the distinction between adware and malware get a bit blurred. Infostealers send information from the device to the C&C server where it can be used for a variety of purposes. Often the phone s contact list is stolen and used in subsequent spam campaigns. More serious are the password stealers that look for social media credentials. Spy phone apps are very common. These are apps that are used to spy on the phone s owner. They track the phone s location, monitor ingoing and outgoing calls and text messages, monitor email and track the victim s web browsing. A number of these apps are available commercially. They are often used by parents to monitor their children, but can also be used to track a spouse, employee or business associate. Mobile spyware is definitely on the increase. Six of the mobile malware infections in the 2014 top 20 list are mobile spyware. SMS Trojans make money by sending text message to premium short message service (SMS) numbers where the user is billed for the message. This is more common in geographies where it is easy for the cybercriminals to launder the proceeds. This is an example of a green field opportunity for cybercrime to take advantage of a facility that was not available in the traditional Windows malware ecosystem. The impact in the user s phone bill depends on how aggressive the malware is. Banking Trojans are now making the move to the mobile space. Originally this was in the form of malware, like Spitmo, that was designed to intercept the one-time access credentials sent to the user via SMS. However as people start banking from their phones, we expect to see a large increase in this area. Ransomware in the form of encryptors and fake security software are also common on the mobile space. As the phone becomes the network access device of choice, we expect to see more of these. Why Android Why is the Android platform most targeted by malware? Modern mobile phone operating systems (Android and ios) have been designed with security in mind, so the easiest attack path is through Trojanized apps. The Android app ecosystem is the most vulnerable because it allows apps to be installed from third-party app stores, and due to lax app signing practices Android apps are very easy to hijack. A large market share and open source environment also contribute to its popularity. Sideloading The main reason Android is so highly targeted is the ability to download and install apps from just about anywhere. This provides the malware developer with an easy way to deliver the malware. iphone apps are only available from Apple, but anyone can distribute Android apps. Most third-party app stores offer good quality apps that have been checked for malware, but a few have been specifically set up to provide pirated software with a high malware content. 9

Google Play The official Google Play store has also been known to harbor malware. In 2014 over a 3-month period we downloaded 130,000 free apps from Google Play and submitted them to VirusTotal. 2.3% were identified by at least three antivirus vendors. Of those 94% were adware However that leaves 0.138% that were identified as malware, about 1 in 700 However, since then Google has made significant progress in reducing the level of malware on Google Play and also introduces a Verify app feature that reduced infection in the field. We have noticed a significant reduction in the Android infection rate since then. App hijacking All Android apps must be digitally signed by the developer. The following is from the Android developer s web site. Android requires that all apps be digitally signed with a certificate before they can be installed. Android uses this certificate to identify the author of an app, and the certificate does not need to be signed by a certificate authority. Android apps often use self-signed certificates. Since the certificate is self-signed, the developer can put whatever information into that certificate that they want. For example I could sign an app as developed by the Queen of England. iphone apps, on the other hand, are signed by a developer s certificate that is issued to the developer by Apple. So Apple controls the content of the certificate used in the signing process. This is from Apple: Before your Mac app or ios app can be used with store services, installed on an ios device for development or testing, or submitted to the App Store, it must be signed with a certificate issued by Apple. When you combine this lax signing policy with some standard developer tools, it becomes very easy to hijack an existing application, inject some malware and republish the app on a third-party app store. 1. Get the APK file for the target app. 2. Open it using apktool d. 3. Cut and paste the Trojan smali code directories into target app. 4. Edit the oncreate() function in the apps main activity to invoke the Trojan service. 5. Edit manifest to add the Trojan service and any required permissions. 6. Rebuild the app using apktool b. 7. Use jarsigner to sign the app (any key will do). 8. Use zipalign to complete the process. This of course can be scripted for mass production. 10

Some examples of Android malware Top 20 2014 Table 1. Top 20 Android malware detected in H2 2014 NAME THREAT LEVEL % OF TOTAL H1 2014 Android.Adware.Uapush.A l Moderate 45.57 New Android.Trojan.Ackposts.a l High 17.08 6 Android.MobileSpyware.SmsTracker l High 14.67 3 Android.Adware.Counterclank l Moderate 9.56 New* Android.MobileSpyware.SpyMob.a l High 1.87 12 Android.Bot.Notcompatible l High 1.65 5 Android.Trojan.FakeFlash l Moderate 1.62 New Android.Trojan.Wapsx l High 1.09 8 Android.MobileSpyware.GinMaster l High 0.85 32 Android.Trojan.Qdplugin l High 0.82 7 Android.Trojan.Sms.Send.B l High 0.76 4 Android.MobileSpyware.SpyBubble l High 0.64 9 Android.ScareWare.Koler.C l High 0.64 New Android.Backdoor.Advulna l High 0.52 10 Android.MobileSpyware.Phonerec l High 0.45 13 Android.MobileSpyware.Tekswon.A l High 0.33 New Android.ScareWare.Lockdroid.F l High 0.25 New Android.Adware.Kuguo.A l Moderate 0.2 15 Android.Trojan.MMarketPay.a l High 0.16 29 Android.Trojan.JSmsHider.D l High 0.16 64 UAPush Uapush.A is an Android adware Trojan with a moderate threat level. It sends IMSI, IMEI, contact information, bookmarks and call history to a C&C server in China. It also may send SMS messages without the user s consent. Activity on this decreased steadily since the first half of the year. 11

SMSTracker SMSTracker is an Android spy phone app that provides a complete remote phone tracking and monitoring system for Android phones. It allows the attacker to remotely track and monitor all SMS, Multimedia Messaging Service (MMS), text messages, voice calls, GPS locations and browser history. This is also known as Android.Monitor. Gizmo.A. NotCompatible Web proxy bot ported from Windows to the Android environment Uses same C&C as Windows version Allows remote miscreants to anonymously browse the web through the victim s phone Consumes lots of bandwidth 165 megabytes in two hours over 300,000 TCP sessions Infection rate is currently only 0.03% In a network of 1 million users, that s 600 gigabytes per day 12

Koler Koler is an Android scareware Trojan that claims it has encrypted all the data on your phone and demands a ransom to restore the data. The victims are usually visitors to Internet-based pornographic sites, who are duped into downloading and installing a premium access video player. The malware lock-screen is customized depending on the location of the phone. FakeFlash FakeFlash is a scam application distributed under the name Install Flash Player 11. It charges money for downloading and installing the Adobe Flash Player. Mobile Spyware Mobile spyware is definitely on the increase. Six of the mobile malware infections in the 2014 Top 20 list are mobile spyware. These are apps that are used to spy on the phone s owner. They track the phone s location, monitor ingoing and outgoing calls and text messages, monitor email and track the victim s web browsing. 13

DDoS Impact of scanning Cybercriminals and security researchers often scan the Internet for vulnerable devices. In mobile networks these scans can cause excessive radio paging and signaling as large numbers of idle devices must be reconnected to the network to respond to the scan. Not a problem if the mobile subnets are NATed DNS amplification DDoS attack in mobile network Mobile Wi-Fi devices have been used in DNS DDoS amplification attacks. Device configuration problem caused some devices to provide an Internetfacing recursive DNS service This attack is very similar to the Spark DDoS attack on Sept 8-9, 2014 in New-Zealand, where the mobile and fixed data services were down for almost two days due to 138 compromised devices. 14

CONCLUSION Malware targeting mobile devices is currently not as sophisticated as the typical malware that infects PCs and laptops running Windows. The malware is typically distributed as a Trojanized application that users must install themselves due to social engineering or phishing. It makes no serious attempt to conceal itself and can be removed by uninstalling the app. The C&C is not very robust, often using hard-coded IP addresses or domain names. The infection rate is significantly less than in fixed broadband networks. Currently Windows PCs and Laptops account for more than 50% of the malware infections that are seen on the mobile network. The computers running Windows are either tethered to phones or connected via dongles or mobile wireless hotspots. Obviously Windows is still the platform of choice for professional cybercriminals, who have years of experience invested in the platform. However, as people use their mobile phone as the Internet connectivity device of choice, cybercrime will certainly move onto the mobile platform, the C&C protocols will become more sophisticated and the malware more difficult to detect and remove. Cybercrime has certainly been quick to move in to green field opportunities provided by premium SMS numbers and spyphone capabilities. Android is currently the most targeted mobile platform. This mostly due to: The ability to sideload apps from third-party app stores The fact that it is relatively easy to hijack an Android app Weak rules governing app signing Going forward we expect malware to take advantage of unique opportunities presented by the smartphone platform. Specifically: Botnets move to mobile devices for SMS and voice spam More sophisticated C&C, persistence & stealth DDoS against SMS and voice Hacktivism goes mobile Internet of Things gets hit 15

For more information contact: kevin.mcnamee@alcatel-lucent.com Or visit the Motive Security Guardian web site at: https://www.alcatel-lucent.com/solutions/security-guardian www.alcatel-lucent.com Alcatel, Lucent, and the logo are trademarks of. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. assumes no responsibility for inaccuracies contained herein. Copyright 2015. All rights reserved. PR1506011979EN (June)