Automated Remote Repair for Mobile Malware

advertisement
Automated Remote Repair for
Mobile Malware
Yacin Nadji, Jonathon Giffin,
Patrick Traynor
Georgia Institute of Technology
ACSAC’ 11
Outline
•
•
•
•
•
•
•
Introduction
Related Work
Mobile Malware
Airmid Architecture
Implementation
Discussion
Conclusion
Introduction
• 70000 new mobile malware samples per day
Introduction
• Cellular providers will not be able to rely solely
upon the rapid identification and removal of
malware by mobile market operators
Introduction
• A system for automated detection of and
response to malicious software infections on
handheld mobile devices – Airmid
• Airmid: the goddess of healing
Introdution
• We developed laboratory samples of mobile
malware
▫ Leak private data
▫ Dial premium numbers
▫ Participate in botnet activity
And…
▫ Detect the presence of an emulated environment
▫ Change their behavior, create hidden background
process, scrub logs, and restart on reboot
Introduction
• Contribution
▫ Identification of current remediation shortcomings
▫ Design and implementation of advanced prototype
malware
▫ Cooperatively neutralize malware on infected
mobile phones
Related Work
• Traynor et al. On Cellular Botnets: Measuring
the Impact of Malicious Devices on a Cellular
Network Core
• Xu et al. Stealthy Video Capturer: A New Videobased Spyware in 3G Smartphones
• TaintDroid
• PiOS
Mobile Malware
• In the wild…
▫
▫
▫
▫
Privilege escalation to root (DroidDream)
Bots (Drad.A)
Data exfiltration (DroidKungFu, StreamyScr.A)
Backdoor triggered via SMS (Bgyoulu.A)
• Jailbroken iPhone
▫ iKee.B Bot
Mobile Malware
• Deficiencies of marketplaces:
▫ Malware authors can write their apps with logic to
evade detection of analysis
▫ The Android platform allows users to install apps
from third-party marketplaces
Mobile Malware
• Enhanced prototype malware
▫ Loudmouth
 a Twitter client that leaks private data
▫ 2Faced
 A Facebook client sync app that dials premium
numbers
▫ Thor
 A mobile bot
Mobile Malware
• Loudmouth
▫ Malicious mobile functionality
 Data exfiltration
▫ Evasive functionality
 Malware analysis environment detection
▫ Benign host app
 Twitter client
Mobile Malware
• 2Faced
▫ Malicious mobile functionality
 Premium number dialer
▫ Evasive functionality
 Log sanitization and a hidden native process
▫ Benign host app
 Facebook sync
Mobile Malware
• Thor
▫ Malicious mobile functionality
 Bot client
▫ Evasive functionality
 Persistence across reboot
▫ Benign host app
 Weather display
Mobile Malware
• Permissions use:
Architecture
• Threat model
▫ Install malware via a variety of usual mechanisms
 Drive-by downloads or automated propagation
 Distribution on marketplaces
▫ Attackers can subvert the correct execution of a
benign app
 Exploiting a security defect in the app’s design
Architecture
• Assume…
▫ A protected software layer on the device lower
than the level at which the malware executes
 Kernel (if kernel-level malware can be prevented)
 Hypervisor (if virtualized environments can be
created on a mobile device)
▫ A communication channel between the network
and each device
▫ Detectable malicious behavior in the network
Architecture
• Remote repair
Architecture
• Side-effects:
▫
▫
▫
▫
▫
▫
Process termination
On-device traffic filtering
App update
Device update
File removal
Factory reset
Architecture
• Authenticated communication
▫
▫
▫
▫
[UMTS Security Wiki]
[REF]
[SPEC]
[AKA Mechanism RFC]
Implementation
• Hardware
▫ HTC Dream with Android 1.6
Implementation
• Network component
▫ Snort
▫ Airmid Server by using Python packet creation
library Scapy
Implementation
• Device component
▫ A modified Linux kernel 2.6.29
▫ Disable dynamically load kernel modules
▫ 1200 lines of C
Implementation
• Infection provenance
Implementation
• Infection provenance
Implementation
• Remediation strategies
▫
▫
▫
▫
▫
Block the malicious traffic
Termination of process
Removal of the apk owned by the UID
Removal of all files owned by the UID
UID < 10000  system user ID
 Only block the malicious traffic
▫ UID ≧ 10000
 Terminate & Remove
▫ Any native ARM processes?
 If yes  full scan !
Implementation
• Performance evaluation
Discussion
• Airmid control
▫ Some may not trust a cellular network provider
▫ Airmid is not a “one size fits all” solution
▫ Proxied via VPN
▫ Roaming?
▫ Relaying on IDS
Discussion
• Device hardening
▫ Disable LKM
▫ Virtualization?
 L4Android
Download