Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO CyberCrime: Threats Against Mobile Devices “User-owned computers and smart phones are more than twice as likely to be infected with malware” October 2012 2 Advanced Persistent Threats • APTs typically involve compromises of users’ devices or credentials • 45% of enterprises see increase in spear phishing attacks targeting employees 3 9 Critical Threats Against Mobile Workers 1. 2. 3. 4. 5. 6. 7. 8. 9. Malware, Trojans, Zero-day Attacks Key loggers Compromised Wi-Fi Hotpots Poisoned DNS Malicious & Privacy Leaking Apps Jail broken & Rooted Devices Un-patched OS Versions Spear Phishing Advanced Persistent Threats 4 Bring Your Own Device = New Threats • Multiple users per device, with many apps and websites visited • Users connect to 10+ networks a month • Attacks against end-users give access to corporate networks, data, and cloud services • Cyber-criminals know this 5 Phishing Continues To Explode • Phishing and Spear-Phishing is At Record Levels 7 Spear-Phishing • Spear-phishing is the #1 way that APTs are instigated • Use DNS blacklisting to prevent access to phishing sites 8 9 10 Email Service Providers Are An Important Attack Vector 11 • RSA Security breached • Targeted spear phishing infected several employees’ computers • Seeds and serial numbers for tens of millions of SecureID tokens stolen • Key customers attacked after this 12 13 13 14 Android Fragmentation 15 Exponential Growth in Mobile Malware 16 Source: Kaspersky Labs, March 2013 • Sites infected with bad iFrame • Checks User-Agent • Update.apk sent to browser • Installed if device allows apps from unknown sources • com.Security.Update 17 Hacked Apps Posted to Markets 18 Example: Fake Instagram 19 Example: Fake Authentication Apps 20 Example: Battery Monitor Trojan 21 Compromised WiFi Hotpots • WiFi hotspots can intercept and redirect traffic • Evil-Twin attacks, DNS attacks, network snooping, session hijacking & sidejacking • You need a VPN service for all users, on every WiFi 22 Sidejacking on Public WiFi 23 Poisoned DNS • DNS poisoning takes remote employees to criminal sites • Can be poisoned upstream at the ISP, not just at the WiFi hotspot • Apps are particularly vulnerable due to poor implementations of certificate validation 24 DNS attacks recently reported 25 Privacy Leaking Apps • Legitimate apps may upload your corporate directory to a service in the cloud • That service may be hacked or resold, exposing all of your employees to spear-phishing attacks • You should deploy a cloud service to scan and analyze apps for malicious behavior and privacy violations 26 Jail-broken & Rooted Devices • You should prevent access from jail-broken iPhones and rooted Android devices • Jail-broken/rooted devices have almost zero security protections 27 Unpatched OS Versions • Unpatched OS and plug-ins are the main attack vector of criminals against your users 28 Live Example • This example is a live example of taking over the iTunes app on an iPad • Click twice and enter your device password. You’re owned. 29 Phishing or Spear-Phishing Lure 30 iOS Allows Unsigned and Unverified Profiles 31 Click “Install Now” 32 Enter Your Device Password (if you have set one) 33 iTunes App Removed, Fake iTunes Installed 34 Use Fake iTunes To Steal Passwords, etc 35 Things That A Profile Can Change • Safari security settings can be disabled • Javascript settings • Local app settings • Allow untrusted TLS connections • Device settings • Install X.509 certificates 36 Even Worse: Hostile MDM Profile • Expands the scope of malicious capabilities to include ‒ App replacement and installation ‒ OS replacement ‒ Delete data ‒ Route all traffic to Man-In-The-Middle sites 37 Architecture Network Feeds Marble Threat Lab App Feeds Propose or discover threat Design PoC Create Remediation or Detection in our Product Marble Access Instrumented Marble Access Networks WiFis DNS reports App reports Device fingerprints Marble App Analysis Marble Control Policies & Data Threat Detection Implement and test Poc Monitor for threat Prioritize App Marble App Reputation Database Download App Analyze and add to database Marble Threat Reports Marble Threat Database 38 App Analysis Architecture 3rd Party Feeds Rate High Priority App Download from client or app store Analyze automatically and possibly manually Rate by newness, behaviour, publisher, spread rates Download from various app stores & sideloading sites Use Android Grinder and other tools for analysis Prioritize App Download App Marble App Reputation DB Analyze and add to database Incident Response & Analysts Team 39 Marble’s Dynamic App Security Architecture Google Play Apple App Store Other App Stores Marble Control Service Marble Access Mobile Device Client Alerts & Reports Rules User Interface Analytics Engine App Crawler Controller/ Scheduler Database Database Risk Engine Stored Apps Correlation Engine Customer’s Security Admin App Queue Marble Security Lab Jammer Scanner Network Information Marble Security Analysts Data Feeds Network Threat Database Analyzer DNS lookups, network threat correlation engine Dynamic App Analysis Engine Real-time user interface simulation 40