Uploaded by Branson Suzuki

Ch 13

advertisement
Lesson 13
Implementing Secure Mobile Solutions
LESSON INTRODUCTION
Mobile devices are now the preferred client for many common work tasks, and network
management and security systems have had to adapt to accommodate them. The shift
toward mobile also presages a move toward unified management of endpoints, and
the use of virtualized workspaces as a better model for provisioning corporate apps
and data processing.
Lesson Objectives
In this lesson, you will:
•
Implement mobile device management.
•
Implement secure mobile device connections.
DO NOT REDISTRIBUTE
344 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
Topic 13A
Implement Mobile Device Management
EXAM OBJECTIVES COVERED
3.5 Given a scenario, implement secure mobile solutions
As use of mobiles has permeated every type of organization, network management
and security suites have developed to ensure that they are not exploited as
unmanaged attack vectors. As a security professional, you will often have to configure
these management suites, and assist users with the device onboarding process.
Mobile Device Deployment Models
Mobile devices have replaced computers for many email and diary management
tasks and are integral to accessing many other business processes and cloud-based
applications. A mobile device deployment model describes the way employees are
provided with mobile devices and applications.
•
Bring your own device (BYOD)—the mobile device is owned by the employee. The
mobile will have to meet whatever profile is required by the company (in terms of
OS version and functionality) and the employee will have to agree on the installation
of corporate apps and to some level of oversight and auditing. This model is usually
the most popular with employees but poses the most difficulties for security and
network managers.
•
Corporate owned, business only (COBO)—the device is the property of the
company and may only be used for company business.
•
Corporate owned, personally-enabled (COPE)—the device is chosen and supplied
by the company and remains its property. The employee may use it to access
personal email and social media accounts and for personal web browsing (subject
to whatever acceptable use policies are in force).
•
Choose your own device (CYOD)—much the same as COPE but the employee is
given a choice of device from a list.
Virtualization can provide an additional deployment model. Virtual desktop
infrastructure (VDI) means provisioning an OS desktop to interchangeable hardware.
The hardware only has to be capable of running a VDI client viewer, or have browser
support a clientless HTML5 solution. The instance is provided "as new" for each session
and can be accessed remotely. The same technology can be accessed via a mobile
device such as a smartphone or tablet. This removes some of the security concerns
about BYOD as the corporate apps and data are segmented from the other apps on
the device.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 345
Enterprise Mobility Management
Enterprise mobility management (EMM) is a class of management software designed
to apply security policies to the use of mobile devices and apps in the enterprise. The
challenge of identifying and managing attached devices is often referred to as visibility.
EMM software can be used to manage enterprise-owned devices as well as BYOD.
There are two main functions of an EMM product suite:
•
Mobile device management (MDM)—sets device policies for authentication,
feature use (camera and microphone), and connectivity. MDM can also allow device
resets and remote wipes.
•
Mobile application management (MAM)—sets policies for apps that can process
corporate data, and prevents data transfer to personal apps. This type of solution
configures an enterprise-managed container or workspace.
Additionally, distinguishing whether client endpoints are mobile or fixed is not really
a critical factor for many of these management tasks, with the consequence that
the latest suites aim for visibility across PC, laptop, smartphone, tablet, and even IoT
devices. These suites are called unified endpoint management (U M) (redmondmag.
com/Articles/2017/10/01/Unified-Endpoint-Management.aspx).
The core functionality of endpoint management suites extends the concept of
network access control (NAC) solutions. The management software logs the use of a
device on the network and determines whether to allow it to connect or not, based
on administrator-set parameters. When the device is enrolled with the management
software, it can be configured with policies to allow or restrict use of apps, corporate
data, and built-in functions, such as a video camera or microphone.
Some EMM/UEM solutions include AirWatch (air-watch.com), Microsoft Intune
(microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune),
Symantec/Broadcom (broadcom.com/products/cyber-security/endpoint/end-user/
protection-mobile), and Citrix Endpoint Management (formerly XenMobile) (citrix.com/
products/citrix-endpoint-management).
iOS in the nterprise
In Apple's iOS ecosystem, third-party developers can create apps using Apple's
Software Development Kit, available only on MacOS. Apps have to be submitted to
and approved by Apple before they are released to users via the App Store. Corporate
control over iOS devices and distribution of corporate and B2B (Business-to-Business)
apps is facilitated by participating in the Device Enrollment Program (support.apple.
com/business), the Volume Purchase Program, and the Developer Enterprise Program
(developer.apple.com/programs/enterprise). Another option is to use an EMM suite
and its development tools to create a "wrapper" for the corporate app.
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
346 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
Configuring iOS device enrollment in Microsoft s Intune EMM suite.
(Screenshot used with permission from Microsoft.)
Most iOS attacks are the same as with any system; users click malicious links or enter
information into phishing sites, for instance. As a closed and proprietary system, it
should not be possible for malware to infect an iOS device as all code is updated from
Apple's servers only. There remains the risk that a vulnerability in either iOS or an app
could be discovered and exploited. In this event, users would need to update iOS or the
app to a version that mitigates the exploit.
Android in the nterprise
Android's open source basis means that there is more scope for vendor-specific
versions. The app model is also more relaxed, with apps available from both Google
Play and third-party sites, such as Amazon's app store. The SDK is available on Linux,
Windows, and macOS. The Android Enterprise (android.com/enterprise) program
facilitates use of EMM suites and the containerization of corporate workspaces.
Additionally, Samsung has a workspace framework called KNOX (samsung.com/us/
business/solutions/samsung-knox) to facilitate EMM control over device functionality.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 347
Enrolling an Android smartphone with Intune.
(Android is a trademark of Google LLC.)
iOS devices are normally updated very quickly. With Android, the situation is less
consistent, as updates often depend on the handset vendor to complete the new
version or issue the patch for their flavor of Android. Android OS is more open and
there is Android malware, though as with Apple it is difficult for would-be hackers and
spammers to get it into any of the major app repositories.
One techni ue used is called Staged Payloads. The malware writers release an app that
appears innocuous in the store but once installed it attempts to download additional
components infected with malware (zdnet.com/article/android-security-sneaky-three-stagemalware-found-in-google-play-store). Google has implemented a server-side malware
scanning product (Play Protect) that will both warn users if an app is potentially damaging
and scan apps that have already been purchased, and warn the user if any security issues
have been discovered.
Since version 4.3, Android has been based on Security-Enhanced Linux. SEAndroid
(source.android.com/security/selinux) uses mandatory access control (MAC) policies to
run apps in sandboxes. When the app is installed, access is granted (or not) to specific
shared features, such as contact details, SMS texting, and email.
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
348 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
Configuring app permissions in Android OS. (Android is a trademark of Google LLC.)
Mobile Access Control Systems
If a threat actor is able to gain access to a smartphone or tablet, they can obtain a huge
amount of information and the tools with which to launch further attacks. Quite apart from
confidential data files that might be stored on the device, it is highly likely that the user has
cached passwords for services such as email or remote access VPN and websites.
Smartphone Authentication
The majority of smartphones and tablets are single-user devices. Access control can be
implemented by configuring a screen lock that can only be bypassed using the correct
password, PIN, or swipe pattern. Many devices now support biometric authentication,
usually as a fingerprint reader but sometimes using facial or voice recognition.
Configuring authentication and profile policies using Intune EMM Note that the policy allows the user
to have a different type of authentication (or none at all) to the workspace hosting corporate apps
and data. (Screenshot used with permission from Microsoft.)
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 349
Strong passwords should always be set on mobile devices, as simple 4-digit PIN codes can
easily be brute-forced. Swipe patterns are vulnerable to poor user choices (arstechnica.
com/information-technology/2015/08/new-data-uncovers-the-surprising-predictability-ofandroid-lock-patterns), such as choosing letter or box patterns, plus the tendency for the
grease trail to facilitate a smudge attack.
Screen Lock
The screen lock can also be configured with a lockout policy. This means that if an
incorrect passcode is entered, the device locks for a set period. This could be configured
to escalate (so the first incorrect attempt locks the device for 30 seconds while the third
locks it for 10 minutes, for instance). This deters attempts to guess the passcode.
Context-Aware Authentication
It is also important to consider newer authentication models, such as context-aware
authentication. For example, smartphones now allow users to disable screen locks
when the device detects that it is in a trusted location, such as the home. Conversely,
an enterprise may seek more stringent access controls to prevent misuse of a device.
For example, even if the device has been unlocked, accessing a corporate workspace
might require the user to authenticate again. It might also check whether the network
connection can be trusted (that it is not an open Wi-FI hotspot, for instance).
Remote Wipe
A remote wipe or kill switch means that if the handset is stolen it can be set to the
factory defaults or cleared of any personal data (sanitization). Some utilities may also
be able to wipe any plug-in memory cards too. The remote wipe could be triggered by
several incorrect passcode attempts or by enterprise management software. Other
features include backing up data from the phone to a server first and displaying a
"Lost/stolen phone—return to XX" message on the handset.
Most corporate messaging systems come with a remote wipe feature (such as this one provided with
Intermedia mail hosting), allowing mail, calendar, and contacts information to be deleted from mobile
devices. (Screenshot used with permission from Intermedia.)
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
350 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
In theory, a thief can prevent a remote wipe by ensuring the phone cannot connect to
the network, then hacking the phone and disabling the security.
Full Device Encryption and External Media
All but the early versions of mobile device OSes for smartphones and tablets provide
full device encryption. In iOS, there are various levels of encryption.
•
All user data on the device is always encrypted but the key is stored on the device.
This is primarily used as a means of wiping the device. The OS just needs to delete
the key to make the data inaccessible rather than wiping each storage location.
•
Email data and any apps using the "Data Protection" option are subject to a second
round of encryption using a key derived from and protected by the user's credential.
This provides security for data in the event that the device is stolen. Not all user
data is encrypted using the "Data Protection" option; contacts, SMS messages, and
pictures are not, for example.
In iOS, Data Protection encryption is enabled automatically when you configure a
password lock on the device. In Android, there are substantial differences to encryption
options between versions (source.android.com/security/encryption). As of Android 10,
there is no full disk encryption as it is considered too detrimental to performance. User
data is encrypted at file-level by default.
A mobile device contains a solid state (flash memory) drive for persistent storage of
apps and data. Some Android handsets support removable storage using external
media, such as a plug-in Micro SecureDigital (SD) card slot; some may support the
connection of USB-based storage devices. The mobile OS encryption software might
allow encryption of the removable storage too but this is not always the case. Care
should be taken to apply encryption to storage cards using third-party software if
necessary and to limit sensitive data being stored on them.
A MicroSD HSM is a small form factor hardware security module designed to store
cryptographic keys securely. This allows the cryptographic material to be used with
different devices, such as a laptop and smartphone.
Location Services
Geolocation is the use of network attributes to identify (or estimate) the physical
position of a device. The device uses location services to determine its current position.
Location services can make use of two systems:
•
Global Positioning System (GPS)—a means of determining the device's latitude and
longitude based on information received from satellites via a GPS sensor.
•
Indoor Positioning System (IPS)—works out a device's location by triangulating
its proximity to other radio sources, such as cell towers, Wi-Fi access points, and
Bluetooth/RFID beacons.
Location services is available to any app where the user has granted the app
permission to use it.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 351
Using Find My Device to locate an Android smartphone. (Android is a trademark of Google LLC.)
The primary concern surrounding location services is one of privacy. Although very
useful for maps and turn-by-turn navigation, it provides a mechanism to track an
individual's movements, and therefore their social and business habits. The problem
is further compounded by the plethora of mobile apps that require access to location
services and then both send the information to the application developers and store
it within the device's file structure. If an attacker can gain access to this data, then
stalking, social engineering, and even identity theft become real possibilities.
Geofencing and Camera/Microphone Enforcement
Geofencing is the practice of creating a virtual boundary based on real-world
geography. Geofencing can be a useful tool with respect to controlling the use of
camera or video functions or applying context-aware authentication. An organization
may use geofencing to create a perimeter around its office property, and subsequently,
limit the functionality of any devices that exceed this boundary. An unlocked
smartphone could be locked and forced to re-authenticate when entering the
premises, and the camera and microphone could be disabled. The device's position is
obtained from location services.
Restricting device permissions such as camera and screen capture using Intune.
(Screenshot used with permission from Microsoft.)
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
352 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
GPS Tagging
GPS tagging is the process of adding geographical identification metadata, such as
the latitude and longitude where the device was located at the time, to media such as
photographs, SMS messages, video, and so on. It allows the app to place the media
at specific latitude and longitude coordinates. GPS tagging is highly sensitive personal
information and potentially confidential organizational data also. GPS tagged pictures
uploaded to social media could be used to track a person's movements and location.
For example, a Russian soldier revealed troop positions by uploading GPS tagged
selfies to Instagram (arstechnica.com/tech-policy/2014/08/opposite-of-opsec-russiansoldier-posts-selfies-from-inside-ukraine).
Application Management
When a device is joined to the corporate network through enrollment with
management software, it can be configured into an enterprise workspace mode in
which only a certain number of authorized applications can run.
Endpoint management software such as Microsoft Intune can be used to approve or prohibit apps.
(Screenshot used with permission from Microsoft.)
A trusted app source is one that is managed by a service provider. The service provider
authenticates and authorizes valid developers, issuing them with a certificate to use
to sign their apps and warrant them as trusted. It may also analyze code submitted to
ensure that it does not pose a security or privacy risk to its customers (or remove apps
that are discovered to pose such a risk). It may apply other policies that developers
must meet, such as not allowing apps with adult content or apps that duplicate the
function of core OS apps.
The mobile OS defaults to restricting app installations to the linked store (App Store for
iOS and Play for Android). Most consumers are happy with this model but it does not
work so well for enterprises. It might not be appropriate to deliver a custom corporate
app via a public store, where anyone could download it. Apple operates enterprise
developer and distribution programs to solve this problem, allowing private app
distribution via Apple Business Manager (developer.apple.com/business/distribute).
Google's Play store has a private channel option, called Managed Google Play. Both
these options allow an EMM/UEM suite to push apps from the private channel to
the device.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 353
Unlike iOS, Android allows for selection of different stores and installation of untrusted
apps from any third party, if this option is enabled by the user. With unknown sources
enabled, untrusted apps can be downloaded from a website and installed using the
.apk file format. This is referred to as sideloading.
Conversely, a management suite might be used to prevent the use of third-party stores
or sideloading and block unapproved app sources.
Content Management
Containerization allows the employer to manage and maintain the portion of the
device that interfaces with the corporate network. An enterprise workspace with a
defined selection of apps and a separate container is created. This container isolates
corporate apps from the rest of the device. There may be a requirement for additional
authentication to access the workspace.
The container can also enforce storage segmentation. With storage segmentation the
container is associated with a directory on the persistent storage device that is not
readable or writable by apps that are not in the container. Conversely, apps cannot
write to areas outside the container, such as external media or using copy and paste
to a non-container app. App network access might be restricted to a VPN tunneled
through the organization's security system.
The enterprise is thereby able to maintain the security it needs, without having to
enforce policies that affect personal use, apps, or data.
Containerization also assists content management and data loss prevention (DLP)
systems. A content management system tags corporate or confidential data and
prevents it from being shared or copied to unauthorized external media or channels,
such as non-corporate email systems or cloud storage services.
Rooting and ailbreaking
Like Windows and Linux, the account used to install the OS and run kernel-level
processes is not the one used by the device owner. Users who want to avoid the
restrictions that some OS vendors, handset OEMs, and telecom providers (carriers) put
on the devices must use some type of privilege escalation:
•
Rooting—this term is associated with Android devices. Some vendors provide
authorized mechanisms for users to access the root account on their device. For
some devices it is necessary to exploit a vulnerability or use custom firmware.
Custom firmware is essentially a new Android OS image applied to the device. This
can also be referred to as a custom ROM, after the term for the read only memory
chips that used to hold firmware.
•
Jailbreaking—iOS is more restrictive than Android so the term "jailbreaking"
became popular for exploits that enabled the user to obtain root privileges,
sideload apps, change or add carriers, and customize the interface. iOS jailbreaking
is accomplished by booting the device with a patched kernel. For most exploits,
this can only be done when the device is attached to a computer when it boots
(tethered jailbreak).
•
Carrier unlocking—for either iOS or Android, this means removing the restrictions
that lock a device to a single carrier.
Rooting or jailbreaking mobile devices involves subverting the security measures on
the device to gain administrative access to it. This also has the side effect of leaving
many security measures permanently disabled. If the user has root permissions, then
essentially any management agent software running on the device is compromised.
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
354 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
If the user has applied a custom firmware image, they could have removed the
protections that enforce segmentation. The device can no longer be assumed to run a
trusted OS.
EMM/UEM has routines to detect a rooted or jailbroken device or custom firmware with
no valid developer code signature and prevent access to an enterprise app, network,
or workspace. Containerization and enterprise workspaces can use cryptography to
protect the workspace in a way that is much harder to compromise than a local agent,
even from a rooted/jailbroken device.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 355
Review Activity:
Mobile Device Management
Answer the following questions:
1.
What type of deployment model(s) allow users to select the mobile device
make and model?
2.
How does VDI work as a mobile deployment model?
3.
Company policy requires that you ensure your smartphone is secured from
unauthorized access in case it is lost or stolen. To prevent someone from
accessing data on the device immediately after it has been turned on, what
security control should be used?
4.
An employee's car was recently broken into, and the thief stole a company
tablet that held a great deal of sensitive data. You've already taken the
precaution of securing plenty of backups of that data. What should you do
to be absolutely certain that the data doesn't fall into the wrong hands?
5.
What is containerization?
6.
What is the process of sideloading?
7.
Why might a company invest in device control software that prevents the
use of recording devices within company premises?
8.
Why is a rooted or jailbroken device a threat to enterprise security?
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13A
356 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
Topic 13B
Implement Secure Mobile
e ice onnec ions
EXAM OBJECTIVES COVERED
1.4 Given a scenario, analyze potential indicators associated with network attacks
3.5 Given a scenario, implement secure mobile solutions
As well as authentication and authorization for features and apps, management
suites can also assist with networking options for mobile. You must be able to disable
communication types that are not secure for local networks, and advise users about
the security of communications when they use their devices remotely.
Cellular and GPS Connection Methods
Mobile devices use a variety of connection methods to establish communications in
local and personal area networks and for Internet data access via service providers.
Locking down Android connectivity methods with Intune note that most settings can be applied only
to Samsung KNOX-capable devices. (Screenshot used with permission from Microsoft.)
Cellular Data Connections
Smartphones and some tablets use the cell phone network for calls and data access. A
cellular data connection is less likely to be subject to monitoring and filtering. It may be
appropriate to disable it when a device has access to an enterprise network or data, to
prevent its use for data exfiltration.
There have been attacks and successful exploits against the major infrastructure
and protocols underpinning the telecoms network, notably the SS7 hack (theregister.
com/2017/05/03/hackers fire up ss7 flaw). There is little that either companies or
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 357
individuals can do about these weaknesses. The attacks require a high degree of
sophistication and are relatively uncommon.
Global Positioning System (GPS)
A global positioning system (GPS) sensor triangulates the device position using
signals from orbital GPS satellites. As this triangulation process can be slow, most
smartphones use Assisted GPS (A-GPS) to obtain coordinates from the nearest cell
tower and adjust for the device's position relative to the tower. A-GPS uses cellular
data. GPS satellites are operated by the US Government. Some GPS sensors can
use signals from other satellites, operated by the EU (Galileo), Russia (GLONASS), or
China (BeiDou).
GPS signals can be jammed or even spoofed using specialist radio equipment. This
might be used to defeat geofencing mechanisms, for instance (kaspersky.com/blog/
gps-spoofing-protection/26837).
Wi-Fi and Tethering Connection Methods
Mobile devices usually default to using a Wi-Fi connection for data, if present. If the
user establishes a connection to a corporate network using strong WPA3 security,
there is a fairly low risk of eavesdropping or man-in-the-middle attacks. The risks from
Wi-Fi come from users connecting to open access points or possibly a rogue access
point imitating a corporate network. These allow the access point owner to launch any
number of attacks, even potentially compromising sessions with secure servers (using
a DNS spoofing attack, for instance).
Personal Area Networks (PANs)
Personal area networks (PANs) enable connectivity between a mobile device and
peripherals. Ad hoc (or peer-to-peer) networks between mobile devices or between
mobile devices and other computing devices can also be established. In terms of
corporate security, these peer-to-peer functions should generally be disabled. It might
be possible for an attacker to exploit a misconfigured device and obtain a bridged
connection to the corporate network.
Ad Hoc Wi-Fi and Wi-Fi Direct
Wireless stations can establish peer-to-peer connections with one another, rather than
using an access point. This can also called be called an ad hoc network, meaning that
the network is not made permanently available. There is no established, standardsbased support for ad hoc networking, however. MITRE have a project to enable Android
smartphones to configure themselves in an ad hoc network (mitre.org/research/
technology-transfer/open-source-software/smartphone-ad-hoc-networking-span).
Wi-Fi Direct allows one-to-one connections between stations, though in this case one
of the devices actually functions as a soft access point. Wi-Fi Direct depends on Wi-Fi
Protected Setup (WPS), which has many vulnerabilities. Android supports operating as
a Wi-Fi Direct AP, but iOS uses a proprietary multipeer connectivity framework. You can
connect an iOS device to another device running a Wi-Fi direct soft AP, however.
There are also wireless mesh products from vendors such as Netgear and Google
that allow all types of wireless devices to participate in a peer-to-peer network. These
products might not be interoperable, though more are now supporting the EasyMesh
standard (wi-fi.org/discover-wi-fi/wi-fi-easymesh).
Tethering and Hotspots
A smartphone can share its Internet connection with another device, such as a PC.
Where this connection is shared over Wi-Fi with multiple other devices, the smartphone
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
358 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
can be described as a hotspot. Where the connection is shared by connecting the
smartphone to a PC over a USB cable or with a single PC via Bluetooth, it can be
referred to as tethering. However, the term "Wi-Fi tethering" is also quite widely
used to mean a hotspot. This type of functionality would typically be disabled when
the device is connected to an enterprise network, as it might be used to circumvent
security mechanisms, such as data loss prevention or a web content filtering policies.
Bluetooth Connection Methods
Bluetooth is one of the most popular technologies for implementing PANs. While native
Bluetooth has fairly low data rates, it can be used to pair with another device and then
use a Wi-Fi link for data transfer. This sort of connectivity is implemented by iOS's
AirDrop feature.
Bluetooth devices have a few known security issues:
•
Device discovery—a device can be put into discoverable mode meaning that it will
connect to any other Bluetooth devices nearby. Unfortunately, even a device in nondiscoverable mode is quite easy to detect.
•
Authentication and authorization—devices authenticate ("pair") using a simple
passkey configured on both devices. This should always be changed to some secure
phrase and never left as the default. Also, check the device's pairing list regularly to
confirm that the devices listed are valid.
•
Malware—there are proof-of-concept Bluetooth worms and application exploits,
most notably the BlueBorne exploit (armis.com/blueborne), which can compromise
any active and unpatched system regardless of whether discovery is enabled
and without requiring any user intervention. There are also vulnerabilities in
the authentication schemes of many devices. Keep devices updated with the
latest firmware.
Pairing a computer with a smartphone. (Screenshot used with permission from Microsoft.)
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 359
It is also the case that using a control center toggle may not actually turn off the Bluetooth
radio on a mobile device. If there is any doubt about patch status or exposure to
vulnerabilities, Bluetooth should be fully disabled through device settings.
Unless some sort of authentication is configured, a discoverable device is vulnerable to
bluejacking, a sort of spam where someone sends you an unsolicited text (or picture/
video) message or vCard (contact details). This can also be a vector for malware,
as demonstrated by the Obad Android Trojan malware (securelist.com/the-mostsophisticated-android-trojan/35929).
Bluesnarfing refers to using an exploit in Bluetooth to steal information from
someone else's phone. The exploit (now patched) allows attackers to circumvent
the authentication mechanism. Even without an exploit, a short (4 digit) PIN code is
vulnerable to brute force password guessing.
Other significant risks come from the device being connected to. A peripheral device
with malicious firmware can be used to launch highly effective attacks. This type of
risk has a low likelihood, as the resources required to craft such malicious peripherals
are demanding.
Infrared and RFID Connection Methods
Infrared signaling has been used for PAN in the past (IrDA), but the use of infrared in
modern smartphones and wearable technology focuses on two other uses:
•
IR blaster—this allows the device to interact with an IR receiver and operate a device
such as a TV or HVAC monitor as though it were the remote control handset.
•
IR sensor—these are used as proximity sensors (to detect when a smartphone is
being held to the ear, for instance) and to measure health information (such as
heart rate and blood oxygen levels).
Radio Frequency ID (RFID) is a means of encoding information into passive tags,
which can be easily attached to devices, structures, clothing, or almost anything else. A
passive tag can have a range from a few centimeters to a few meters. When a reader
is within range of the tag, it produces an electromagnetic wave that powers up the tag
and allows the reader to collect information from it or to change the values encoded in
the tag. There are also battery-powered active tags that can be read at much greater
distances (hundreds of meters).
One type of RFID attack is skimming, which is where an attacker uses a fraudulent
RFID reader to read the signals from a contactless bank card. Any reader can access
any data stored on any RFID tag, so sensitive information must be protected using
cryptography. It is also possible (in theory) to design RFID tags to inject malicious code
to try to exploit a vulnerability in a reader.
ear Field Communications and Mobile Payment Services
NFC is based on a particular type of radio frequency ID (RFID). NFC sensors and
functionality are now commonly incorporated into smartphones. An NFC chip can
also be used to read passive RFID tags at close range. It can also be used to configure
other types of connections (pairing Bluetooth devices for instance) and for exchanging
information, such as contact cards. An NFC transaction is sometimes known as a bump,
named after an early mobile sharing app, later redeveloped as Android Beam, to use
NFC. The typical use case is in "smart" posters, where the user can tap the tag in the
poster to open a linked web page via the information coded in the tag. Attacks could
be developed using vulnerabilities in handling the tag (securityboulevard.com/2019/10/
nfc-false-tag-vulnerability-cve-2019-9295). It is also possible that there may be some
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
360 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
way to exploit NFC by crafting tags to direct the device browser to a malicious web
page where the attacker could try to exploit any vulnerabilities in the browser.
NFC does not provide encryption, so eavesdropping and man-in-the-middle attacks are
possible if the attacker can find some way of intercepting the communication and the
software services are not encrypting the data.
The widest application of NFC is to make payments via contactless point-of-sale (PoS)
machines. To configure a payment service, the user enters their credit card information
into a mobile wallet app on the device. The wallet app does not transmit the original
credit card information, but a one-time token that is interpreted by the card merchant
and linked backed to the relevant customer account. There are three major mobile
wallet apps: Apple Pay, Google Pay (formerly Android Pay), and Samsung Pay.
Despite having a close physical proximity requirement, NFC is vulnerable to several
types of attacks. Certain antenna configurations may be able to pick up the RF signals
emitted by NFC from several feet away, giving an attacker the ability to eavesdrop
from a more comfortable distance. An attacker with a reader may also be able to skim
information from an NFC device in a crowded area, such as a busy train. An attacker
may also be able to corrupt data as it is being transferred through a method similar
to a DoS attack—by flooding the area with an excess of RF signals to interrupt the
transfer.
Skimming a credit or bank card will give the attacker the long card number and expiry date.
Completing fraudulent transactions directly via NFC is much more difficult as the attacker
would have to use a valid merchant account and fraudulent transactions related to that
account would be detected very uickly.
USB Connection Methods
Android devices can be connected to a computer via the USB port. Apple devices
require a lightning-to-USB converter cable. Once attached the computer can access the
device's hard drive, sync or backup apps, and upgrade the firmware.
Some Android USB ports support USB On The Go (OTG) and there are adapters for
iOS devices. USB OTG allows a port to function either as a host or as a device. For
example, a port on a smartphone might operate as a device when connected to a
PC, but as a host when connected to a keyboard or external hard drive. The extra pin
communicates which mode the port is in.
There are various ways in which USB OTG could be abused. Media connected to
the smartphone could host malware. The malware might not be able to affect the
smartphone itself but could be spread between host computers or networks via the
device. It is also possible that a charging plug could act as a Trojan and try to install
apps (referred to as juice-jacking), though modern versions of both iOS and Android
now require authorization before the device will accept the connection.
SMS MMS RCS and Push
otifications
The Short Message Service (SMS) and Multimedia Message Service (MMS) are
operated by the cellular network providers. They allow transmission of text messages
and binary files. Vulnerabilities in SMS and the SS7 signaling protocol that underpins
it have cast doubt on the security of 2-step verification mechanisms (kaspersky.com/
blog/ss7-hacked/25529).
Rich Communication Services (RCS) is designed as a platform-independent advanced
messaging app, with a similar feature set to proprietary apps like WhatsApp and
iMesssage. These features include support for video calling, larger binary attachments,
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
DO NOT REDISTRIBUTE
The Official CompTIA Security+ Student Guide (Exam SY0-601) | 361
group messaging/calling, and read receipts. RCS is supported by carriers via Universal
Profile for Advanced Messaging (gsma.com/futurenetworks/digest/universal-profileversion-2-0-advanced-rcs-messaging). The main drawbacks of RCS are that carrier
support is patchy (messages fallback to SMS if RCS is not supported) and there is no
end-to-end encryption, at the time of writing (theverge.com/2020/5/27/21271186/
google-rcs-t-mobile-encryption-ccmi-universal-profile).
Vulnerabilities in processing attachments and rich formatting have resulted in DoS
attacks against certain handsets in the past, so it is important to keep devices patched
against known threats.
Push notifications are store services (such as Apple Push Notification Service and
Google Cloud to Device Messaging) that an app or website can use to display an alert
on a mobile device. Users can choose to disable notifications for an app, but otherwise
the app developer can target notifications to some or all users with that app installed.
Developers need to take care to properly secure the account and services used to
send push notifications. There have been examples in the past of these accounts being
hacked and used to send fake communications.
Firmware Over-the-Air Updates
A baseband update modifies the firmware of the radio modem used for cellular, Wi-Fi,
Bluetooth, NFC, and GPS connectivity. The radio firmware in a mobile device contains
an operating system that is separate from the end-user operating system (for example,
Android or iOS). The modem uses its own baseband processor and memory, which
boots a real-time operating system (RTOS). An RTOS is often used for time-sensitive
embedded controllers, of the sort required for the modulation and frequency shifts
that underpin radio-based connectivity.
The procedures for establishing radio connections are complex and require strict
compliance with regulatory certification schemes, so incorporating these functions in
the main OS would make it far harder to bring OS updates to market. Unfortunately,
baseband operating systems have been associated with several vulnerabilities over the
years, so it is imperative to ensure that updates are applied promptly. These updates
are usually pushed to the handset by the device vendor, often as part of OS upgrades.
The updates can be delivered wirelessly, either through a Wi-Fi network or the data
connection, referred to as over-the-air (OTA). A handset that has been jailbroken
or rooted might be able to be configured to prevent baseband updates or apply a
particular version manually, but in the general course of things, there is little reason to
do so.
There are various ways of exploiting vulnerabilities in the way these updates work. A
well-resourced attacker can create an "evil base station" using a Stingray/International
Mobile Subscriber Identity (IMSI) catcher. This will allow the attacker to identify the
location of cell devices operating in the area. In some circumstances it might be
possible to launch a man-in-the-middle attack and abuse the firmware update process
to compromise the phone.
Microwave Radio Connection Methods
Cellular networks are microwave radio networks provisioned for multiple subscribers.
Microwave radio is also used as a backhaul link from a cell tower to the service
provider's network. These links are important to 5G, where many relays are required
and provisioning fiber optic cabled backhaul can be difficult. Private microwave links
are also used between sites. A microwave link can be provisioned in two modes:
•
Point-to-point (P2P) microwave uses high gain antennas to link two sites. High
gain means that the antenna is highly directional. Each antenna is pointed directly
at the other. In terms of security, this makes it difficult to eavesdrop on the signal,
DO NOT REDISTRIBUTE
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
362 | The Official CompTIA Security+ Student Guide (Exam SY0-601)
as an intercepting antenna would have to be positioned within the direct path. The
satellite modems or routers are also normally paired to one another and can use
over-the-air encryption to further mitigate against snooping attacks.
•
Point-to-multipoint (P2M) microwave uses smaller sectoral antennas, each
covering a separate quadrant. Where P2P is between two sites, P2M links multiple
sites or subscriber nodes to a single hub. This can be more cost-efficient in high
density urban areas and requires less radio spectrum. Each subscriber node is
distinguished by multiplexing. Because of the higher risk of signal interception
compared to P2P, it is crucial that links be protected by over-the-air encryption.
Multipoint can be used in other contexts. For example, Bluetooth supports a multipoint
mode. This can be used to connect a headset to multiple sources (a PC and a
smartphone, for instance) simultaneously.
Lesson 13: Implementing Secure Mobile Solutions | Topic 13B
DO NOT REDISTRIBUTE
Download