Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security



Similar documents
Prac%cal A)acks against Mobile Device Management (MDM) Daniel Brodie Senior Security Researcher Lacoon Mobile Security

Practical Attacks against Mobile Device Management Solutions

Practical Attacks against Mobile Device Management (MDM)

Practical Attacks against Mobile Device Management (MDM) Solutions

Practical Attacks against MDM Solutions (and What Can You Do About It)

Chris Boykin VP of Professional Services

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Defending Behind The Device Mobile Application Risks

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Kaspersky Security 10 for Mobile Implementation Guide

Guideline on Safe BYOD Management

Trust Digital Best Practices

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

BYOD in the Enterprise

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

Secure Your Mobile Workplace

Enterprise Mobile Threat Report

Mobile Security: Controlling Growing Threats with Mobile Device Management

Hands on, field experiences with BYOD. BYOD Seminar

Mobile First Government

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

3 Steps to Implementing an Effective BYOD Mobile Security Strategy

If you can't beat them - secure them

Protecting Android Mobile Devices from Known Threats

Mobile Device. Management-

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

The Incident Response Playbook for Android and ios

Enterprise Apps: Bypassing the Gatekeeper

MOBILE SECURITY: DON T FENCE ME IN

Exactly the Same, but Different

BYPASSING THE ios GATEKEEPER

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Mobile Application Security Sharing Session May 2013

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Detecting Cyber Attacks in a Mobile and BYOD Organization

How to Successfully Roll Out an Android BYOD Program

CHECK POINT 3 STEPS TO IMPLEMENTING AN EFFECTIVE BYOD MOBILE SECURITY STRATEGY

4 Steps to Effective Mobile Application Security

Mobile Device Management

BYOD: End-to-End Security

Tutorial on Smartphone Security

Feature List for Kaspersky Security for Mobile

Mobile Application Security: Who, How and Why

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Device Independence - BYOD -

The Mobile Malware Problem

BYOD Guidance: BlackBerry Secure Work Space

What Is BYOD? Challenges and Opportunities

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Enterprise Mobility Report 12/2014. Creation date: Vlastimil Turzík

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Marble & MobileIron Mobile App Risk Mitigation

Samsung Mobile Security

Smartphone Security Winners & Losers

Kaspersky Security for Mobile

Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman

The Truth About Enterprise Mobile Security Products

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

BYOD Policy for [AGENCY]

10 best practice suggestions for common smartphone threats

Addressing NIST and DOD Requirements for Mobile Device Management

Tom Schauer TrustCC cell

RFI Template for Enterprise MDM Solutions

IT Resource Management & Mobile Data Protection vs. User Empowerment

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík

[BRING YOUR OWN DEVICE POLICY]

Information Security Updates Mobile Security Best Practices for General User

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo.

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Five Trends to Track in E-Commerce Fraud

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

2/23/2013 BY VORAPOJ LOOKMAIPUN CISA, CISM, CRISC, CISSP Agenda. Security Cases What is BYOD Best Practice Case Study

Threat Model for Mobile Applications Security & Privacy

Mobile Security BYOD and Consumer Apps

Android vs. Apple ios Security Showdown Tom Eston

Mobile Security: Are You at Risk (Yet)?

The Risks and Rewards of Social Media and Mobile Devices

The Cloud App Visibility Blindspot

Strategies for Managing Disparate Devices in Your Mobile Fleet

My CEO wants an ipad now what? Mobile Security for the Enterprise

Mobile Security Attacks

Kaspersky Lab Mobile Device Management Deployment Guide

CHECK POINT THE MYTHS OF MOBILE SECURITY

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

OS Security. Malware (Part 2) & Intrusion Detection and Prevention. Radboud University Nijmegen, The Netherlands. Winter 2015/2016

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Transcription:

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013

About: Daniel Security researcher for almost a decade From PC to Mobile Low level OS research Researcher at Lacoon Mobile Security Developing a dynamic analysis framework for analyzing spyphones and mobile malware

About: Michael Decade of experience researching and working in the mobile security space From feature-phones to smartphones Mobile Security Research Team leader at NICE Systems CEO and co-founder of Lacoon Mobile Security

Agenda Introduction to MDM and Secure Containers Rise of the Spyphones Bypassing secure container encryption capabilities Recommendations and summary

MDM AND SECURE CONTAINERS 101

Mobile Device Management Helps enterprises manage BYOD (Bring Your Own Device) and corporate mobile devices Policy and configuration management tool Offerings include separating between business data and personal data

MDM: Penetration in the Market Over the next five years, 65 percent of enterprises will adopt a mobile device management (MDM) solution for their corporate liable users Gartner, Inc. October 2012

MDM Key Capabilities Software management Network service management Hardware management Security management Remote wipe Secure configuration enforcement Encryption

Secure Containers All leading MDM solutions provide secure containers MobileIron AirWatch Fiberlink Zenprise Good Technologies

Behind the Scenes: Secure Containers Application Enterprise Sandbox Secure Container Secure Communication (SSL/VPN) Encrypted Storage

RISE OF THE SPYPHONES

The Mobile Threatscape Business Impact Targeted: Personal Organization Cyber espionage Spyphones Mobile Malware Apps Consumer-oriented. Mass. Financially motivated, e.g.: - Premium SMS - Fraudulent charges - Botnets Complexity

Why Mobile? Convergence of Personal Info Contacts Emails Messages Calls Corporate Information Follows us everywhere Office Meetings Home Travel Perfect Spy Hardware Always Online Location Microphone Camera

Spyphone Capabilities Eavesdropping and Surround Recording Extracting Call and Text Logs Tracking Location Infiltrating Internal LAN Snooping on Emails and Application Data Collecting Passwords

Examples More Than 50 Different Families in the Wild

Low End High End The High-End FinSpy Gamma Group DaVinci RCS Hacking Team LuckyCat Chinese LeoImpact

Low End High End The Low-End Starting at $4.99 a month! What a steal! For ios, Android, Blackberry, Windows Mobile/Phone, Symbian, Professional worldwide support Very simple and mainstream So simple that even your mother could use it On your father Available at a reseller near you!

Spyphones: Varying Costs, Similar Results From high-end to low-end Difference is in infection vector -> price End-result is the same For $5, you get nearly all the capabilities of a $350K tool

SPYPHONE DEMO

Spyphones in the Wild Partnered with worldwide cellular network operators: Sampled 250K subscribers Two separate sampling occasions Infection rates: March 2012: 1 in 3000 devices October 2012: 1 in 1000 devices

Spyphone Distribution by OS 7% 6% 35% 52% ios Android Symbian Unknown

Spyphone Distribution by OS Mobile OS Market Share 1.40% Android 7% 6% 35% 52% ios Android Symbian 30.79% 3.90% 51% Blackberry ios Unknown 12.39% Symbian Windows Phone 7 and Windows Mobile Comscore, March 2012

IT S ALRIGHT, IT S OK, SECURE CONTAINER IS THE WAY?

Secure Container Re-Cap Secure Containers: Detect JailBreak/Root Prevent malicious application installation Encrypt data Dependent on the OS sandbox

Opening the Secure Container (1) JailBreaking (ios)/ Rooting (Android) detection mechanism Let Me Google That For You Usually just check features of JB/ Root devices (e.g. is Cydia/ SU installed) Cannot detect exploitation

Opening the Secure Container (2) Prevention of malicious app installation (Android) Targeted towards mass malware Third-Party App restrictions Should protect against malware Has been bypassed Both for Android and iphone

ANDROID DEMO

Android Demo: Technical Details (1) Install Malicious Application Possible Vector Publish an app through the market Use Two-Stage : Download the rest of the dex laterand only for the targets we want Get the target to install the app through spearphishing Physical access to the device would also work

Android Demo: Technical Details (2) Privilege Escalation We used the Exynos exploit. (Released Dec., 2012) Create a hidden suid binary and use it for specific actions Place in a folder with --x--x--x permissions Undetected by generic root-detectors

Android Demo: Technical Details (3) We listen to events in the logs For <=2.3 we can just use the logging permissions For >4.0 we use access the logs as root When an email is read.

Android Demo: Technical Details (3) We dump the heap using /proc/<pid>/maps and /mem Then search for the email structure, extract it, and send it home

Android Heap Searching

IOS DEMO

ios Demo: Technical Details (1) Install Malicious Application Possible Vectors Use the JailBreak just for the installation Install signed code using Enterprise/Developer certificate Remove any trace of the JailBreak Or just jailbreak and hide the jailbreak Repackage the original application

ios Demo: Technical Details (2) Load malicious dylib into memory (it s signed!) Hook using standard Objective-C hooking mechanisms Get notified when an email is read Pull the email from the UI classes Send every email loaded home

Code Injection DYLD_INSERT_LIBRARIES Was very common previously, a bit harder now MACH-O editing Requires to resign code or leave device jailbroken Number of tools to do the work for you Objective-C Hooking Objc_setImplementation.

Objective-C Hooking

CONCLUSIONS

Secure Containers Secure? Secure Containers depend on the integrity of the host system 1. If the host system is uncompromised: what is the added value? 2. If the host system is compromised: what is the added value? We ve been through this movie before!

Infection is Inevitable MDM provides Management, not absolute Security Beneficial to separate between business and personal data Main use-case Remote wipe of enterprise content only Copy & Paste DLP

Mitigating Spyphone Threats Use MDM as a baseline defense for a multilayer approach Needs rethinking outside the box (mobile) Solutions on the network layer: C&C communications Heuristic behavioral analysis Sequences of events Data intrusion detection

THANK YOU! QUESTIONS? Email us at: michael@lacoon.com daniel@lacoon.com