Mobile Exploit Intelligence Project



Similar documents
Defending Behind The Device Mobile Application Risks

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

01. Introduction of Android

Android Architecture. Alexandra Harrison & Jake Saxton

Agenda , Palo Alto Networks. Confidential and Proprietary.

Enterprise Apps: Bypassing the Gatekeeper

BYPASSING THE ios GATEKEEPER

Tutorial on Smartphone Security

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Workday Mobile Security FAQ

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Enterprise Mobile Threat Report

Secure Your Mobile Workplace

Henry Ford Health System Citrix Access Gateway Support Details

Android Security - Common attack vectors

Enterprise Mobile Security. Managing App Sideloading Threats on ios

BYOD Guidance: BlackBerry Secure Work Space

Post-Access Cyber Defense

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How To Protect Your Mobile Device From Attack

Adobe Flash Player and Adobe AIR security

Anti-exploit tools: The next wave of enterprise security

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Rational AppScan & Ounce Products

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Presented by: Mike Morris and Jim Rumph

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Critical Security Controls

Android vs. Apple ios Security Showdown Tom Eston

Analysis of advanced issues in mobile security in android operating system

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Software that provides secure access to technology, everywhere.

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Mobile Device Management

Thick Client Application Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Harvesting Developer Credentials in Android Apps

Penetration Testing Report Client: Business Solutions June 15 th 2015

Top five strategies for combating modern threats Is anti-virus dead?

Beyond the Hype: Advanced Persistent Threats

The Web AppSec How-to: The Defenders Toolbox

The Case for SE Android. Stephen Smalley Trust Mechanisms (R2X) National Security Agency

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Computer Security DD2395

Practical Attacks against Mobile Device Management (MDM)

5 Steps to Advanced Threat Protection

Breaking the Cyber Attack Lifecycle

Exactly the Same, but Different

Security challenges for internet technologies on mobile devices

Passing PCI Compliance How to Address the Application Security Mandates

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Spear Phishing Attacks Why They are Successful and How to Stop Them

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Seven Things To Consider When Evaluating Privileged Account Security Solutions

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Android Programming and Security

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Securing OS Legacy Systems Alexander Rau

Making Client-side Java Secure with Bromium vsentry

Mobile Device Security: What s Coming Next?

Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Transcription:

Mobile Exploit Intelligence Project Dan Guido, Trail of Bits Mike Arpaia, isec Partners Blackberry, 06/2013

Mobile Device Security Thesis Mobile devices are loading up with data E- mail, line of business apps, login credentials Lots of possibilities to compromise mobile devices Insecure data storage, app- to- app, NFC, web browser, Very few vectors explored in actual attacks Why is that? What motivates attackers? Isn t it easy? What attacks do I need to defend against now? Actual vs Probable vs Possible How will things change (or not) tomorrow? 2

Millions of Mobile Attacks Attack Vector Exploits Platform * Android and ios, 2011-2012 3

What are we doing wrong?

Look at Attacks, Not Vulnerabilities X X ßActual attacks ßProbable X ßStunt hacking X ßFUD Attackers choose the least cost path to their objective 5

Attacker Math 101 Cost(Attack) < Potential Revenue Attacks must be financially profitable Attacks must scale according to resources Cost(Attack) = Cost(Vector) + Cost(Escalation) What we know from Mobile OS architectures Cost of Attack Ease Enforcement Established Process Potential Revenue # of Targets Value of Data Ability to Monetize 6

Setting it up Develop malware Mobile Malware Today Add malware to many applications Scaling it out Put malware online (app store) Drive installations (SMS, e- mail, ads) Accessing data Exploit a flaw to access user data Send stolen data back to attacker 7

Intrusion Kill Chains Systematic process that an intrusion must follow Deficiency in one step will disrupt the process Evolves response beyond point of compromise Prevents myopic focus on vulnerabilities or malware Identifies attacker reuse of tools and infrastructure Guides our analysis and implementation of defenses Align defenses to specific processes an attacker takes Force attackers to make difficult strategic adjustments Mike Cloppert - Security Intelligence: Defining APT Campaigns 8

Where are Mobile Drive-Bys? Mobile Town Desktop City

Less Mobile Web Targets ~8% of total web traffic comes from mobile devices Breakdown by version / features (+ varying rates of feature support) 10

Lack of Ads Limits Targeting Potential Normal Website Mobile Website Mobile App 11

Browser Exploits are Harder Internet Browser Permissions.INTERNET.ACCESS_FINE_LOCATION.ACCESS_COARSE_LOCATION.ACCESS_FINE_LOCATION.ACCESS_DOWNLOAD_MANAGER.ACCESS_NETWORK_STATE.ACCESS_WIFI_STATE.SET_WALLPAPER Kernel Drivers.WAKE_LOCK.WRITE_EXTERNAL_STORAGE.SEND_DOWNLOAD_COMPLETED_INTENTS 12

Mobile Browser Tradeoffs Cost of Attack How to Drive Installs? No Flash Limited Ads 2x Exploits Required Where to get them? Version support? New Payload Required What code to run? How to persist access? Potential Revenue Lower # of targets Mobile web, meh Fragmented market Different vendors Different versions 13

Scaling the Setup 1. Develop malware 2. Add malware to many applications 3. Put malware online

Better Targets, Unique to Mobile Incentives Browser Exploits Malicious Apps # of Targets Minimal All Devices (300 mil+) Ability to Target Ads App Store SEO, Lures Ease of Exploit Multiple Exploits Single Exploit Enforcement Anonymous Anonymous? App stores look like a great value proposition! 15

Scaling Malicious App (Android) Automated Controls Signup Cost Malicious App Developed Use New IP Submit Credit Card Payment Receive SMS Review Cost App on Google Play Pass Security Review Security Review Less Effective Submit App (Dynamic OK) Apps Can Change 16

17

Scaling Malicious App (Apple) Signup Cost Malicious App Developed Unknown Fraud Controls + CC# Submit App (No Dynamic Code) Verify Identity Automated Controls Review Cost App on ios App Store Pass Security Review Pass Content Review Human Review 18

Think Different Automate new LLCs > Automate new CC#/SMS/IPs Forces malware authors to scale with humans Restrict dynamic code by policy Easy to detect attempts to circumvent Enables review of code that actually runs on device 19

Charlie Miller, a Success Story Identified vulnerability in ios code- signing Send down new executable code at runtime Bypass Apple review (default on Android!) InstaStock got Charlie InstaBanned Removed from dev program Charlie can t submit any more apps Get fake gov- backed ID, LLC and DUNS # Or, another human with those documents 20

Malicious App Campaigns Apple App Store Google Marketplace * data from 2012, still the same in spirit 21

Scaling the Heist 5. Access data outside the app sandbox 6. Send stolen data to a remote location 7. Abuse the data somehow to make money

Jailbreak Development Mitigation ios Android BB10 Code Injection (1) Code Signing No- execute No- execute Randomization (2) Strong ASLR ASLR ASLR Containment (3) Seatbelt UNIX Perms Abilities PathTrust Shell Available (4) No Yes Yes 1. Payload development w/ code- signing is a PITA (Partial vs Full ROP) 2. Does ASLR matter for local exploits? 3. UNIX permissions expose a large kernel attack surface 4. Shell access makes jailbreak development easier (ex. ASLR less effective) 23

Jailbreaks are a Reality! My Gingerbreak works, but I wont release it before a couple of devices are in the wild so the issue is not fixed before it can become useful. - - stealth (prior to releasing Gingerbreak) Must prevent malicious use of jailbreaks 1. Mitigations slow down development 2. Patch quickly to decrease potential revenue 3. Discourage remote jailbreaks, enable local ones 4. Disincentivize jailbreak community (Chromebook) Effective patching lets users self- segregate Choose to be patched or choose run a jailbreak 24

Waiting for Handouts Malware Authors 0 Dan Rosenberg Justin Case Ken Millington unrevoked sc2k Oberheide / Larimer Revolutionary Scott Walker Stealth 0 2 4 6 8 10 12 Affects Android Affects Particular Handset 25

Malware Devs are Choosy Exploit Name Last Affected Version Abused? Exploid 2.1 YES RageAgainstTheCage 2.2.1 YES Zimperlich 2.2.1 No KillingInTheNameOf 2.2.2 No Psneuter 2.2.2 No GingerBreak 2.3.4 YES zergrush** 2.3.5 No Levitator 2.3.5 No Mempodroid** 4.0.3 No (diff offset per device) PERF_EVENTS CURRENT! Not yet! 26

Market Size How does patching affect potential revenue?

Android Maximizes Potential Revenue Platform 03/12/2012 4/18/2012 06/04/2012 06/03/2013 1.X Cupcake / Donut 1.2 1.0 0.9 0.1 2.1 Eclair 6.6 6.0 5.2 1.5 2.2 Froyo 25.3 23.1 19.1 3.2 2.3 Gingerbread 62.0 63.7 65.0 36.5 3.X Honeycomb 3.3 3.3 2.7 0.1 4.X ICS 1.6 2.9 7.1 25.6 4.1.x Jelly Bean 29.0 4.2.x Jelly Bean 4.0 Android Exploit Exploid (2.1) RageAgainstTheCage (2.2.1) Time to Patch 50% 294 days > 240 days 28

Android Jailbreak Equivalents Android Private Signing Keys jsmshider: http://goo.gl/vpzjg Affects custom ROMs only Request Device Admin API Privs DroidLive: http://goo.gl/c3eet Request SMS privileges Almost 100% of non- jailbreak malware SMS short codes, bank two- factor auth, etc 29

ios Limits Potential Revenue Vulnerability Exploit Patch Availability Malformed CFF Star (JailbreakMe 2.0) 10 days T1 Font Int Overflow Saffron (JailbreakMe 3.0) 9 days http://david- smith.org/blog/2012/03/10/ios- 5- dot- 1- upgrade- stats/index.html 30

Privilege Escalation Takeaways Malware authors have no ability to write exploits The only exploits abused are public jailbreak exploits Cost to exploit Android is significantly lower than ios App permissions required to jailbreak? NONE Many available jailbreaks, easier to deliver to device Lack of Android patches create an opportunity 60% of Android devices affected by a public jailbreak If you can install an app, you can take over Android 31

Recap

Attacker Workflow Recap (ios) MalwareDev Learn Objective- C programming AppDev Expose Repackage app with an already public jailbreak (no runtime mods) Register an LLC / steal a real ID, make app store account Hope that a public jailbreak in your app evades detection Installs Hire a spammer to drive install of jailbreak app (can t be ad- hoc) Escalate Run the jailbreak and payload embedded in your app C&C Call out to a server you control, dump data there Actions Sell data to broker and cash out 33

Attacker Workflow Recap (Android) MalwareDev Learn C programming AppDev Repackage app with malware you just wrote Expose Purchase stolen credit card, submit app to store (repeat as needed) Installs Hire a spammer to drive installs of innocuous app (can be adhoc) Escalate Download and run jailbreak when available C&C Call out to a server you control, dump data there Actions Sell data to broker and cash out 34

Android Mitigation Outlook Chrome for Android Makes browser exploits hard Not an exploited vector now No effect on current Android malware SEAndroid Kills userspace jailbreaks, but not kernel! Kernel exploits demonstrated on ios What handsets will use it? ASLR in Ice Cream Sandwich 4.x Little to no effect on privilege escalations Useful to make browser exploits difficult Can t help 300+ million existing devices Google is ahead of threats that don t exist yet, but far behind on ones that do 35

What Works? Require identification during App Store signup Discrepancy in value between malware and legit devs Ban real- world identities, not e- mail addresses Use policy to make app review more effective Deny apps obfuscation, runtimes, self- updating Detect unique patterns of malicious app distribution AppStore SEO, spam e- mails, SMS, advertisements Patch quickly to deny profitability of jailbreaks Disincentivize creation of them at all! Further tighten Abilities, restrict ability to run new code 36

Predictions Malware continues to be App and Android- centric Bouncer gained only a temporary upper hand Inability to patch creates market opportunity Innovation will revolve around Driving Installs Eg. NotCompatible via web, Zeus via sideloading, etc Lots of possible attacks ignored by real attackers ios will steer clear of similar attacks for now Web is probable vector only when value high enough Attackers are resource- constrained and rational 37

Questions / Comments dan@trailo{its.com www.trailo{its.com @TrailofBits 38

References Attacker Math 101, Dino Dai Zovi www.trailo{its.com/research/#attackermath ios Security Evaluation, Dino Dai Zovi www.trailo{its.com/research/#ios- eval Exploit Intelligence Project, Dan Guido www.trailo{its.com/research/#eip Lookout Security Mobile Threat Report https://www.mylookout.com/mobile- threat- report Contagio Mini Dump, Mila http://contagiominidump.blogspot.com/ Dissecting Android Malware, Yajin Zhou, Xuxian Jiang http://goo.gl/aorcj Androguard, Anthony Desnos https://code.google.com/p/androguard/ Dissecting the Android Bouncer, Jon Oberheide and Charlie Miller http://goo.gl/bk82s 39