The document provides an overview of security threats presented by Goh, Su Gim from F-Secure. It discusses the growing threat landscape, with social media and mobile malware becoming major risks. It highlights recent malware like Stuxnet and DroidDream that targeted critical infrastructure and Android devices. It warns that mobile malware can steal personal data, conduct phishing scams, and make unauthorized phone calls. The document advises users to only download apps from trusted app stores, review app permissions, and use mobile security software to protect against growing mobile threats.
2. About me 10 years in the IT Security industry IT network security infrastructure design Assessment and penetration testing Standards and Compliance Security Operation Center / Incident Response Born and Raised in Malaysia Spent 12 years in Hawaii, USA Joined F-Secure about 9 months ago, now based in F-Secure Response Labs, Kuala Lumpur 04 July, 2011 2
3. Agenda About F-Secure The Threat Landscape today Social Media Networking More than just $$ The un-tethered world Malware for the mobile world
7. 1988 Founded 1999 IPO (Helsinki Stock Exchange) Today “Protecting the irreplaceable” Enabling the safe use of computers and smartphones Strong solution portfolio covering both consumers and business The leading Software as a Service (SaaS) partner for operators globally Over 200 operator partnerships in more than 40 countries Strong market presence in Europe, North America and Asia Distributors/resellers in more than 100 countries 20 offices globally and over 800 professionals worldwide F-Secure - Summary 2007
8. F-Secure in Malaysia 04 July, 2011 8 Operations started 2006 KL Sentral office opened 2006 Moved to Bangsar South May 2009 Today, 2011, 25% of the employees in Asia 2005 2006 2007 2008 2009 2011
48. The ever growing Smartphone… 04 July, 2011 48 “Smartphones to break 100 million shipment mark in Asia/Pacific (Excluding Japan) by 2011” - IDC “IDC expects 137 million units in 2011, double the units in 2010” “53% of Chinese citizens in key urban centres own a smartphone, well ahead of countries like the US, where penetration stands at around 30%, and Japan, on 10%” Consultancy Accenture
54. Windows Mobile Trojan Poses as 3D Anti-Terrorist Action War Game Developed by Beijing Huike Technology in China Distributed in windows freeware download sites Packaged with virus written in Russia Malicious code initiate silently international calls to Premium Numbers 04 July, 2011 54
61. Geinimi, Aka 給你米 Android BOT Opens a backdoor and calls home Calls home to various servers: 04 July, 2011 61 www.frijd.comwww.aiucr.com www.uisoa.comwww.islpast.comwww.piajesj.comwww.qoewsl.com www.weolir.comwww.riusdu.comwww.widifu.comwww.udaore.com
62. The Variants… HongTouTou紅頭頭 / ADRD Targeting users in China Distributed on free file sharing websites as wallpaper apps Gather IMEI/IMSI - encrypted Search as a mobile user Emulate clicks as a mobile user Monitor SMS conversations 04 July, 2011 62
63. Do Androids Dream? [THE MOTHER OF THEM ALL] Root your phone (Admin access) Sends IMEI/IMSI to remote server Steals sensitive data More than 50 applications infected Repackaged by app developer by Myournet Kingmail2010 we20090202 Hosted on Android Market 50,000 to 200,000 downloads in 4 days 04 July, 2011 63 DroidDream
64. Trojanised apps by Myournet 04 July, 2011 64 Falling Down Super Guitar Solo Super History Eraser Photo Editor Super Ringtone Maker Super Sex Positions Hot Sexy Videos Chess 下坠滚球_Falldown Hilton Sex Sound Screaming Sexy Japanese Girls Falling Ball Dodge Scientific Calculator Dice Roller 躲避弹球 Advanced Currency Converter App Uninstaller 几何战机_PewPew Funny Paint Spider Man 蜘蛛侠
65. Real App on left and virused-up version (Myournet) 04 July, 2011 65
66. In case of emergency, press this: 04 July, 2011 66 The KILL SWITCH
67. On March 1st 2011, Google yanked 58 apps in Android Market March 6th, Google created the Android Market Security Tool to REMOTELY remove the malicious apps and the DroidDreamtrojan from hundreds of thousands of devices Gives me a mixed feeling… 04 July, 2011 67 The Google KILL SWITCH
77. (1) TRUSTED & REPUTABLE SOURCES Download from reputable app markets Avoid third party app stores (Sideloading) Review developer name, reviews and star ratings If it is too good to be true.. IT IS There is NO FREE LUNCH 04 July, 2011 75
78. (2) Scrutinize permissions Check on permissions when installing an app Ensure the permissions match the features it provides 04 July, 2011 76
79. (3) Auto-locking, reset and wipe (Housekeeping) Automatic locking after a few minutes of no activity Reset and wipe when disposing or recycling your phone 04 July, 2011 77
80. (4) Install a mobile security app Install an Anti-virus for your SmartPhone against trojans/viruses/malware Other security vendor features (Anti Theft) include Remote Wipe, Lock & Alarm Remote Alarm GPS Locator Remote backup 04 July, 2011 78
Virus Eras. Email is no longer the most common way of getting infected, web is. And web infections do not come via vulnerabilities in Windows or in the browser, they come through plugins like Flash And Adobe Reader, which are very common and always out-of-date as Microsoft Update won't patch them. In the future, more of the attacks are done via Social Networks. Your facebook account gets Phished and then the bad boys send status updates to your friends, posing as you. "Check out this cool link!" etc
Siemens PLC 1787 unit.
Still shot from a youtube video showing a test scada attack destroying an engine. Video on youtube, search for: scada aurora cnn engine