Title: A Comprehensive Guide to Mobile Targeted Attacks
1A Comprehensive Guide to Mobile Targeted
Attacks (and What Can You Do About It)
Ohad Bobrov, CTO ohadl_at_lacoon.com twitter.com/Laco
onSecurity
2Agenda
- The collapse of the perimeter
- Why mobile devices are targeted
- Mobile Remote Access Trojans (mRATs)
- Demo
- Infection vectors
- Detection, remediation, and building a secure
BYOD / HYOD architecture
3About Lacoon Mobile Security
- Protecting organizations from mobile threats
- HQ SF, USA. RD Israel
- Cutting edge mobile security research team
- Protecting tier-1 financial, manufacturing, legal
and defense organizations
4The Collapse Of The Corporate Perimeter
gt 2011
5TARGETED MOBILE THREATS
6Why To Hack Mobile Device?
Snooping on corporate emails and application data
Infiltrating internal LANs
Eavesdropping
Extracting contact lists, call text logs
Tracking location
7The Mobile Threatscape
Targeted Personal Organization Cyber espionage
mRATs / Spyphones
Business Impact
Consumer-oriented. Mass. Financially motivated,
e.g. Premium SMS Fraudulent charges Botnets
Mobile Malware Apps
Complexity
8The Mobile Threatscape
High End Government / Military grade Mid
Range Cybercrime toolkits Low End Commercial
surveillance toolkits
9HIGH ENDGOV / MIL mRATs
10FinSpy Mobile
Extracted from http//wikileaks.org/spyfiles/docs
/gamma/291_remote-monitoring-and-infection-solutio
ns-finspy-mobile.html
11MID CYBERCRIME TOOLKITS
12Recent High-Profiled Examples
13LOWER ENDCOMMERCIAL SURVEILLANCE TOOLKITS
14Commercial Mobile Surveillance Tool (Spyphone)
15Commercial Mobile Surveillance Tools A Comparison
16Varying Costs, Similar Results
Capability FlexiSpy AndroRAT FinFisher
Real-time listening on to phone calls
Surround recording
Location tracking (GPS)
Retrieval of text
Retrieval of emails
Invisible to the user
SMS CC fallback
Infection vector Physical Repackage Exploit?
Cost 279 Free 287,000
Activation screen - -
17STATISTICS
18Survey Cellular Network 2M Subscribers
Sampling 650K
Data sample 1 GB traffic sample of spyphone
targeted traffic, collected over a 2-day
period. Collected from a channel serving 650K
subscribers Traffic constrained to communications
to selected malicious IP address Communications Tr
affic included both encrypted and non-encrypted
content
19Survey Cellular Network 2M Subscribers
Sampling 650K
Infection rates June 2013 1 / 1000 devices
20Survey Cellular Network 2M Subscribers
Sampling 650K
21DEMO
22INFECTION VECTORS
23Infection Vectors - Android
24Infection Vectors iOS (iPhones and iPads)
25Current SecurityStatus
26Current Solutions FAIL to Protect
27Mitigation Current Controls
Mobile Device Management (MDM)
Multi-Persona
Wrapper
Active Sync
NAC
28Mitigation Current Controls
Mobile Device Management (MDM)
Multi-Persona
Wrapper
Active Sync
NAC
29Detection Adding Behavior-based Risk
Malware Analysis
Threat Intelligence
Vulnerability Research
30Detection Adding Behavior-based Risk
Application Behavioral Analysis
Malware Analysis
Device Behavioral Analysis
Threat Intelligence
Vulnerability Research
Vulnerability Assessment
31Detection Adding Behavior-based Risk
Application Behavioral Analysis
Malware Analysis
Device Behavioral Analysis
Threat Intelligence
Vulnerability Research
Vulnerability Assessment
32Lacoon Solution
33Ohad Bobrov , CTO Lacoon Security
Inc. ohad_at_lacoon.com twitter.com/LacoonSecurity