SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Mobile Malware Monetization




Protecting the irreplaceable | f-secure.com
September
© F-Secure / Confidential
2
28, 2010
September
© F-Secure / Confidential
5
28, 2010
Smartphone market shares in 2009

                    Others
   Windows Mobile    4%
        7%                           Apple 14%

        iOS                                        Microsoft   7%
                                                  Symbian
        15 %
                                                    40 %            Symbian
                                                                    BlackBerry
                                                                    Android
     Android
      16 %                             RIM1                         iOS
                        BlackBerry
                                       9%                           Windows Mobile
                           18 %                                     Others




                                 Data source: Canalys
vs             vs


• Nokia: invisible
• Apple: very visible
• Nokia predicted to sell 107 Million smartphones in 2010
• Apple predicted to sell 41 Million smartphones in 2010
• Android in total predicted to sell 47 Million smartphones in 2010
Mobile Security - Where are we today?

• First mobile malware found in 2004
 • Now: 517 viruses, worms and trojans for mobile
   platforms
 • Targeting the most common platforms
 • No exploit-based malware, yet
• Real problems elsewhere
 • Lost, broken or stolen phones
• So: A success story!
Problems will stay on Windows until mobile malware authors get this


• 28 September, 2010
              PC provides existing infra for monetization
               •Information is easily available
               •Ready made exploit kits
               •Existing proven models to make money
               •There is plenty from where mobile malware
               authors can learn from
It’s All About Money
• There are already serious attempts to make money with mobile malware
• So far guys doing this are amateurs
• That’s going to change when some of them strike gold
• Monetization methods we have seen so far
     • Premium SMS messages
     • Premium voice calls
     • Subscription scams
     • Banking attacks
     • Ransomware
     • Fake applications




15   September 28, 2010
Premium SMS senders
• Premium SMS sending trojans are the most common mobile malware
• Typically these trojans are either minimal applications with simple social
  engineering UI, or trojanized versions of clean apps or games
• As premium SMS works only in one country, these trojans are highly localized
     • Most have that we know of operate in Russia
• Typically trojans are spread with rudimentary social engineering
     • As ICQ messages with download/install link
     • Vkontakte (Russian equivalent of facebook)
     • SEO spam
     • SMS spam




16   September 28, 2010
Fakeplayer SMS trojan
• Fakeplayer.A and .B are android trojans that
  pretend to be media player application
• On installation Android will ask for permissions
  that include sending SMS messages
• Unfortunately just about every Android app asks
  for a ton of permissions so user will see anything out of
  place
• When application is run it displays Russian text which
  translates as "Wait, sought access to video library..“
• Fakeplayer.B has been spread with SEO techniques
  targeting on porn related searches [1]




17   September 28, 2010
Premium Rate Call Trojans
• Premium rate SMS numbers work only in one country, which limits victims
• What malware authors want is international monetizing methods
• Too bad, there is one already available, and is being used by some authors
• “International premium” rate numbers work from anywhere in the world
     • They work by user registering a number from premium rate operators
     • After this all calls to this number are treated as international billing from
       which the owner of the number will get a cut from a phone call
          • What actually happens that call is routed locally, but charge is international level

     • Unlike premium SMS messages or other services, there is no way to block
       this unless user blocks international phone calls
     • Of course the billing operators are not at fault, from their point of view
       malware authors are abusing their services



18   September 28, 2010
"Short Stopping" / "Long Lining"




            Nevada – Somalia: $2.55 / minute
            Nevada – Florida: $0.03 / minute




Call Terminations
The numbers


• +882346077      Antarctica
• +17675033611    Dominican republic
• +88213213214    EMSAT satellite prefix
• +25240221601    Somalia
• +2392283261     São Tomé and Príncipe
• +881842011123   Globalstar satellite prefix
User Is Helpless Against “International” Numbers
• How do you figure out how much such a number costs you?
• How do you figure out who owns the number?
• Where do you complain to?
• How do you get such a number shut down?
• How you can block these numbers without preventing international calls?
Windows SMS and premium call trojans
• Used to be popular with modems, two known modern cases
• Using a GPRS USB dongle modem to send SMS messages
• It would be trivial so send SMS messages or make calls using BT enabled
  phone paired with PC
• Nokia PC suite offers easy interface for SMS sending and calls
• Using telephony capabilities to milk more money from user might be
  next botnet standard feature
Premium Rate Subscription Scams
• Premium rate subscription scams work by getting victim subscribed to service
  without them noticing and then starting to bill for services
• Typically these scams work by fooling victim in one time transaction
     • Victim thinks that he is ordering ringtone or joining a lottery
     • While he actually is subscribed to service that bills until terminated
• Alternative method uses WAP push to make scam easier
     • User is sent WAP push link with some social
       engineering pretext
     • If user clicks the link, he will get typical mobile
       ad page
     • But on the same time server gets his MSIDN and
       subscribes the victim



32   September 28, 2010
Premium Rate Service Scams As Facebook Spam
• We used to see premium rate
  scams mostly in SMS
• But now at least one operator
  affiliate is using facebook
• Clicking link leads to premium rate
  ad page by wixawin.com
• Wixawin displays prices and
  subscription information
• But less honest players are soon
  to follow
• Now that using FB spam is
  upfront and honest by itself




33   September 28, 2010
Ikee.B First Attempt At Banking Trojan
• Ikee.A iPhone worm was relatively harmless malware that only spread
• However Ikee.B was created by different author for financial gain [2]
• Upon infection Ikee.B contacted control server to download payload
     • Which modified /etc/hosts to point Dutch ING bank site to server in Japan
     • Compromized site is small flower shop in Japan
• Dutch ING uses SMS TAN codes
     • So Ikee.B forwarded SMS messages containing TAN to HTTP server




34   September 28, 2010 © F-Secure Confidential
First Mobile Ransomware
• SSH default password in unlocked iPhones
  was also used for first attempt at ransomware
• A Dutch teenager used the hole to break into
  number of vulnerable phones and changed
  lock icon to display ransom message [3]
• Site displayed at ransom message asked
  $4.95 for cleanup instructions
• So far we not seen other phone ransom attempts
• However we have met PC ransomware that
  uses SMS messages as payment message
  for unlock code




37   September 28, 2010
Fake Applications
• Fake applications are not malware
• They are apps that have no functionality
  but are sold for low enough amount
  that people don’t bother to complain
• Fake banking applications claim to
  provide mobile banking for given bank
• When executed they launch that banks
  own site in browser
• However they could have been easily
  used for phishing or banker trojan attack
• People actually bought these and tried
  to use them for banking
• Scary .
Banks targeted by "09droid"
 Abbey Bank                      LloydsTSB
 Alaska USA FCU                  M&I
 Alliance & Leicester (v. 1.1)   Mechanics Bank v.1.1
                                 MFFCU v.1.1
 Bank Atlantic                   Midwest
 Bank of America                 Nationwide (v. 1.1)
 Bank of Queensland              NatWest (v. 1.1)
 Barclaycard (v. 1.1)            Navy Federal Credit Union (v. 1.1)
 Barclays Bank (v. 1.2)          PNC
                                 Royal Bank of Canada
 BB&T                            RBS v.1.1
 Chase                           SunTrust
 City Bank Texas                 TD Bank v.1.1
 Commerce Bank                   US Bank v.1.2
 Compass Bank                    USAA v.1.1
                                 Valley Credit Union
 Deutsche Bank                   Wachovia Corp (v. 1.2)
 Fifty Third Bank v.1.1          Wells Fargo (v. 1.1)
 First Republic Bank v.1.1
 Great Florida Bank
What’s Going To Happen Next?
• Now as some malware authors have made money, blood is in the water
• Most likely authors are going to switch from premium SMS to premium calls
• Next question is that how bad this is going to get
• PC malware explosion started in 2004 when first malware got profit
• It is very likely that we are going to see a lot more activity in mobile front
• Already now in 2010 most of the mobile malware is profit motivated
• And we are going to see a lot more of it




40   September 28, 2010
Sources
• [1] http://www.securelist.com/en/blog/2286/Android_SMS_Trojan_Now_Being_Delivered_via_SEO_Techniques
•    [2] http://www.f-secure.com/v-descs/worm_iphoneos_ikee_b.shtml

•    [3] http://www.zdnet.com/blog/security/ihacked-jailbroken-iphones-compromised-5-ransom-demanded/4805




42   September 28, 2010 © F-Secure Confidential

Weitere ähnliche Inhalte

Andere mochten auch

Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)
room13tnis
 

Andere mochten auch (10)

Electronic Program Guides using SVG
Electronic Program Guides using SVGElectronic Program Guides using SVG
Electronic Program Guides using SVG
 
Section12
Section12Section12
Section12
 
Bayard Saunders
Bayard SaundersBayard Saunders
Bayard Saunders
 
Aibb
AibbAibb
Aibb
 
Developing an Outsourcing Industry
Developing an Outsourcing IndustryDeveloping an Outsourcing Industry
Developing an Outsourcing Industry
 
The Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a ScienceThe Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a Science
 
Topic 12
Topic 12Topic 12
Topic 12
 
E-Commerce for Malaysia
E-Commerce for MalaysiaE-Commerce for Malaysia
E-Commerce for Malaysia
 
Topic 9
Topic 9Topic 9
Topic 9
 
Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)
 

Ähnlich wie F-Secure: Mobile malware monetization

IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments Presentation
Brennan Hayden
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
jraja01
 
Online mobile game(nguyenle)
Online mobile game(nguyenle)Online mobile game(nguyenle)
Online mobile game(nguyenle)
action.vn
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Simpletel
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europe
kevin han
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 

Ähnlich wie F-Secure: Mobile malware monetization (20)

IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments Presentation
 
Mobile input lukew
Mobile input lukewMobile input lukew
Mobile input lukew
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
Online mobile game(nguyenle)
Online mobile game(nguyenle)Online mobile game(nguyenle)
Online mobile game(nguyenle)
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europe
 
Mobile Market : Past Present Now and Then
Mobile Market : Past Present Now and ThenMobile Market : Past Present Now and Then
Mobile Market : Past Present Now and Then
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Navigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 CondensedNavigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 Condensed
 
Widgets, 360s and Androids
Widgets, 360s and AndroidsWidgets, 360s and Androids
Widgets, 360s and Androids
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 

Mehr von Procontent.Ru Magazine

WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
Procontent.Ru Magazine
 
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФMoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
Procontent.Ru Magazine
 
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
Procontent.Ru Magazine
 
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&MMoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
Procontent.Ru Magazine
 
российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013
Procontent.Ru Magazine
 
Рынок мобильных приложений в России и мире
Рынок мобильных приложений в России и миреРынок мобильных приложений в России и мире
Рынок мобильных приложений в России и мире
Procontent.Ru Magazine
 
МТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 годуМТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 году
Procontent.Ru Magazine
 
Российский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки ЕвросетиРоссийский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки Евросети
Procontent.Ru Magazine
 
J'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисовJ'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисов
Procontent.Ru Magazine
 
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa..."Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
Procontent.Ru Magazine
 
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Procontent.Ru Magazine
 
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Procontent.Ru Magazine
 
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Procontent.Ru Magazine
 
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Procontent.Ru Magazine
 

Mehr von Procontent.Ru Magazine (20)

Android fragmentation 2013
Android fragmentation 2013Android fragmentation 2013
Android fragmentation 2013
 
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
 
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФMoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
 
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
 
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&MMoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
 
российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013
 
Рынок мобильных приложений в России и мире
Рынок мобильных приложений в России и миреРынок мобильных приложений в России и мире
Рынок мобильных приложений в России и мире
 
МТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 годуМТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 году
 
Российский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки ЕвросетиРоссийский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки Евросети
 
Ac&m 4 q12_stat_eng-ukraine
Ac&m 4 q12_stat_eng-ukraineAc&m 4 q12_stat_eng-ukraine
Ac&m 4 q12_stat_eng-ukraine
 
Ac&m 4 q12_stat_eng
Ac&m 4 q12_stat_engAc&m 4 q12_stat_eng
Ac&m 4 q12_stat_eng
 
J'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисовJ'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисов
 
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 годаJ'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
 
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa..."Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
 
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
 «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ... «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
 
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
 
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
 
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
 
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
 
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

F-Secure: Mobile malware monetization

  • 1. Mobile Malware Monetization Protecting the irreplaceable | f-secure.com
  • 2. September © F-Secure / Confidential 2 28, 2010
  • 3.
  • 4.
  • 5. September © F-Secure / Confidential 5 28, 2010
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Smartphone market shares in 2009 Others Windows Mobile 4% 7% Apple 14% iOS Microsoft 7% Symbian 15 % 40 % Symbian BlackBerry Android Android 16 % RIM1 iOS BlackBerry 9% Windows Mobile 18 % Others Data source: Canalys
  • 12. vs vs • Nokia: invisible • Apple: very visible • Nokia predicted to sell 107 Million smartphones in 2010 • Apple predicted to sell 41 Million smartphones in 2010 • Android in total predicted to sell 47 Million smartphones in 2010
  • 13. Mobile Security - Where are we today? • First mobile malware found in 2004 • Now: 517 viruses, worms and trojans for mobile platforms • Targeting the most common platforms • No exploit-based malware, yet • Real problems elsewhere • Lost, broken or stolen phones • So: A success story!
  • 14. Problems will stay on Windows until mobile malware authors get this • 28 September, 2010 PC provides existing infra for monetization •Information is easily available •Ready made exploit kits •Existing proven models to make money •There is plenty from where mobile malware authors can learn from
  • 15. It’s All About Money • There are already serious attempts to make money with mobile malware • So far guys doing this are amateurs • That’s going to change when some of them strike gold • Monetization methods we have seen so far • Premium SMS messages • Premium voice calls • Subscription scams • Banking attacks • Ransomware • Fake applications 15 September 28, 2010
  • 16. Premium SMS senders • Premium SMS sending trojans are the most common mobile malware • Typically these trojans are either minimal applications with simple social engineering UI, or trojanized versions of clean apps or games • As premium SMS works only in one country, these trojans are highly localized • Most have that we know of operate in Russia • Typically trojans are spread with rudimentary social engineering • As ICQ messages with download/install link • Vkontakte (Russian equivalent of facebook) • SEO spam • SMS spam 16 September 28, 2010
  • 17. Fakeplayer SMS trojan • Fakeplayer.A and .B are android trojans that pretend to be media player application • On installation Android will ask for permissions that include sending SMS messages • Unfortunately just about every Android app asks for a ton of permissions so user will see anything out of place • When application is run it displays Russian text which translates as "Wait, sought access to video library..“ • Fakeplayer.B has been spread with SEO techniques targeting on porn related searches [1] 17 September 28, 2010
  • 18. Premium Rate Call Trojans • Premium rate SMS numbers work only in one country, which limits victims • What malware authors want is international monetizing methods • Too bad, there is one already available, and is being used by some authors • “International premium” rate numbers work from anywhere in the world • They work by user registering a number from premium rate operators • After this all calls to this number are treated as international billing from which the owner of the number will get a cut from a phone call • What actually happens that call is routed locally, but charge is international level • Unlike premium SMS messages or other services, there is no way to block this unless user blocks international phone calls • Of course the billing operators are not at fault, from their point of view malware authors are abusing their services 18 September 28, 2010
  • 19. "Short Stopping" / "Long Lining" Nevada – Somalia: $2.55 / minute Nevada – Florida: $0.03 / minute Call Terminations
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. The numbers • +882346077 Antarctica • +17675033611 Dominican republic • +88213213214 EMSAT satellite prefix • +25240221601 Somalia • +2392283261 São Tomé and Príncipe • +881842011123 Globalstar satellite prefix
  • 30. User Is Helpless Against “International” Numbers • How do you figure out how much such a number costs you? • How do you figure out who owns the number? • Where do you complain to? • How do you get such a number shut down? • How you can block these numbers without preventing international calls?
  • 31. Windows SMS and premium call trojans • Used to be popular with modems, two known modern cases • Using a GPRS USB dongle modem to send SMS messages • It would be trivial so send SMS messages or make calls using BT enabled phone paired with PC • Nokia PC suite offers easy interface for SMS sending and calls • Using telephony capabilities to milk more money from user might be next botnet standard feature
  • 32. Premium Rate Subscription Scams • Premium rate subscription scams work by getting victim subscribed to service without them noticing and then starting to bill for services • Typically these scams work by fooling victim in one time transaction • Victim thinks that he is ordering ringtone or joining a lottery • While he actually is subscribed to service that bills until terminated • Alternative method uses WAP push to make scam easier • User is sent WAP push link with some social engineering pretext • If user clicks the link, he will get typical mobile ad page • But on the same time server gets his MSIDN and subscribes the victim 32 September 28, 2010
  • 33. Premium Rate Service Scams As Facebook Spam • We used to see premium rate scams mostly in SMS • But now at least one operator affiliate is using facebook • Clicking link leads to premium rate ad page by wixawin.com • Wixawin displays prices and subscription information • But less honest players are soon to follow • Now that using FB spam is upfront and honest by itself 33 September 28, 2010
  • 34. Ikee.B First Attempt At Banking Trojan • Ikee.A iPhone worm was relatively harmless malware that only spread • However Ikee.B was created by different author for financial gain [2] • Upon infection Ikee.B contacted control server to download payload • Which modified /etc/hosts to point Dutch ING bank site to server in Japan • Compromized site is small flower shop in Japan • Dutch ING uses SMS TAN codes • So Ikee.B forwarded SMS messages containing TAN to HTTP server 34 September 28, 2010 © F-Secure Confidential
  • 35.
  • 36.
  • 37. First Mobile Ransomware • SSH default password in unlocked iPhones was also used for first attempt at ransomware • A Dutch teenager used the hole to break into number of vulnerable phones and changed lock icon to display ransom message [3] • Site displayed at ransom message asked $4.95 for cleanup instructions • So far we not seen other phone ransom attempts • However we have met PC ransomware that uses SMS messages as payment message for unlock code 37 September 28, 2010
  • 38. Fake Applications • Fake applications are not malware • They are apps that have no functionality but are sold for low enough amount that people don’t bother to complain • Fake banking applications claim to provide mobile banking for given bank • When executed they launch that banks own site in browser • However they could have been easily used for phishing or banker trojan attack • People actually bought these and tried to use them for banking • Scary .
  • 39. Banks targeted by "09droid" Abbey Bank LloydsTSB Alaska USA FCU M&I Alliance & Leicester (v. 1.1) Mechanics Bank v.1.1 MFFCU v.1.1 Bank Atlantic Midwest Bank of America Nationwide (v. 1.1) Bank of Queensland NatWest (v. 1.1) Barclaycard (v. 1.1) Navy Federal Credit Union (v. 1.1) Barclays Bank (v. 1.2) PNC Royal Bank of Canada BB&T RBS v.1.1 Chase SunTrust City Bank Texas TD Bank v.1.1 Commerce Bank US Bank v.1.2 Compass Bank USAA v.1.1 Valley Credit Union Deutsche Bank Wachovia Corp (v. 1.2) Fifty Third Bank v.1.1 Wells Fargo (v. 1.1) First Republic Bank v.1.1 Great Florida Bank
  • 40. What’s Going To Happen Next? • Now as some malware authors have made money, blood is in the water • Most likely authors are going to switch from premium SMS to premium calls • Next question is that how bad this is going to get • PC malware explosion started in 2004 when first malware got profit • It is very likely that we are going to see a lot more activity in mobile front • Already now in 2010 most of the mobile malware is profit motivated • And we are going to see a lot more of it 40 September 28, 2010
  • 41.
  • 42. Sources • [1] http://www.securelist.com/en/blog/2286/Android_SMS_Trojan_Now_Being_Delivered_via_SEO_Techniques • [2] http://www.f-secure.com/v-descs/worm_iphoneos_ikee_b.shtml • [3] http://www.zdnet.com/blog/security/ihacked-jailbroken-iphones-compromised-5-ransom-demanded/4805 42 September 28, 2010 © F-Secure Confidential