SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Three Steps To Combat
Mobile Malware
Sajal Sahay
Senior Director Product Marketing, Mobilisafe
2
Saj Sahay
Sr. Director of Product Marketing,
Rapid7
Presenters
Short for “Malicious Software”, there are
multiple types of malware
• Software that can disrupt device operations, gather
sensitive information or gain undue access to the
device
BYOD explosion is the malware growth story
• Attackers adapting and quickly moving to mobile
• Mostly embedded in apps as they are the primary way
users access information on mobile devices
What Is Malware?
3
Key Types Of Mobile Malware
4
Trojans
• Once installed provide access to the device for the
person who originated the program
• Usually in untrustworthy applications in 3rd party app
stores
• Can exfiltrate information and lead to significant
financial and organizational harm
RootKits
• Activate every time your system boots up
• Can be very difficult to detect
• Can allow the installation of hidden files, hidden
user accounts etc.
Why Is Mobile Malware Growing?
5
Cybercriminals see a rich target given that mobile devices usually have a lot
of personal & financial information on them
Spam/Phishing was very successful on desktops, and attackers feel that end
users are susceptible to the same failings on mobile devices
Most popular apps are from lesser known companies so it’s difficult for
consumers to know which ones to trust
The Growth Is Astounding!*
6
123% growth in malware discoveries in ’12
vs. ‘11
95% of infections on Android given diversity
of OS versions still being used
Common ways to exploit the OS were
through application repackaging, malicious
URLs & SMS phishing
Total of 32.8 million Android devices
infected in ‘12, a 200% growth from ’11
* From NQ Mobile’s Yr 2012 Mobile Security Report
So, What Can You Do?
7
Every company should have
written mobile usage policies for
their employees!
• Make sure they are easy to understand
• Make sure that all employees go through
the necessary training for successful
company-wide implementation
Include the following three
malware focused policies in your
company’s written document
Malware Focused Policy #1
Employees Should Only Download Applications From Trusted Sources
8
Google Play (Android) and the iOS App
Store (iOS) are administered by Google &
Apple
• Strict requirements for applications submitted for
inclusion
• Utilize sophisticated filtering mechanisms to discover
and remove apps that may contain malware
Apps should not be downloaded from
untrustworthy 3rd party app stores
9
Malware Focused Policy #2
Employees Should Always Update Their Mobile Devices To The Latest Firmware
Extend the same patch requirements
for your corporate network to mobile
Updating firmware is the best way to
patch vulnerabilities on mobile
devices
10
Mobile Malware Example: DroidKungFu
This type of malware can be
considered both a Trojan and a
Rootkit
• Unique because it can avoid detection by anti
malware software
• Works by installing a backdoor in the Android
OS
• Gives the attacker full control of the user’s
mobile device
• Mainly affects devices running Android 2.2,
exploiting two vulnerabilities in the OS version
Malware Focused Policy #3
Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail
11
Employees should be very careful
when receiving an SMS or email
containing a link
If the URL of the link seems
suspicious they should not click
the link
Inform the Security Department
instead to investigate the URL
Mobile Malware Example: Zitmo (Zeus in the Mobile)
12
A Trojan that can forward SMS’s with
confidential information from the
device to other phone numbers
• Can steal a user’s username and password
• A SMS is sent with a link to update the ‘security
certificate’, while it actually directs the user to
install Zitmo
• Once the installation is completed and info is
received, attackers usually log-into user’s
confidential sites like bank accounts to initiate
unauthorized transactions
1. Employees Should Only Download Applications From Trusted Sources
2. Employees Should Always Update Their Mobile Devices To The Latest
Firmware
3. Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail
13
Summary - Three Steps To Combat Mobile Malware
Try Moblisafe for yourself - http://information.rapid7.com/mobilisafe-
demo.html
14
Thank you!

Weitere ähnliche Inhalte

Mehr von Rapid7

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...Rapid7
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionRapid7
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Rapid7
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher EducationRapid7
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityRapid7
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 

Mehr von Rapid7 (13)

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL Injection
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Three Steps to Combat Mobile Malware

  • 1. Three Steps To Combat Mobile Malware Sajal Sahay Senior Director Product Marketing, Mobilisafe
  • 2. 2 Saj Sahay Sr. Director of Product Marketing, Rapid7 Presenters
  • 3. Short for “Malicious Software”, there are multiple types of malware • Software that can disrupt device operations, gather sensitive information or gain undue access to the device BYOD explosion is the malware growth story • Attackers adapting and quickly moving to mobile • Mostly embedded in apps as they are the primary way users access information on mobile devices What Is Malware? 3
  • 4. Key Types Of Mobile Malware 4 Trojans • Once installed provide access to the device for the person who originated the program • Usually in untrustworthy applications in 3rd party app stores • Can exfiltrate information and lead to significant financial and organizational harm RootKits • Activate every time your system boots up • Can be very difficult to detect • Can allow the installation of hidden files, hidden user accounts etc.
  • 5. Why Is Mobile Malware Growing? 5 Cybercriminals see a rich target given that mobile devices usually have a lot of personal & financial information on them Spam/Phishing was very successful on desktops, and attackers feel that end users are susceptible to the same failings on mobile devices Most popular apps are from lesser known companies so it’s difficult for consumers to know which ones to trust
  • 6. The Growth Is Astounding!* 6 123% growth in malware discoveries in ’12 vs. ‘11 95% of infections on Android given diversity of OS versions still being used Common ways to exploit the OS were through application repackaging, malicious URLs & SMS phishing Total of 32.8 million Android devices infected in ‘12, a 200% growth from ’11 * From NQ Mobile’s Yr 2012 Mobile Security Report
  • 7. So, What Can You Do? 7 Every company should have written mobile usage policies for their employees! • Make sure they are easy to understand • Make sure that all employees go through the necessary training for successful company-wide implementation Include the following three malware focused policies in your company’s written document
  • 8. Malware Focused Policy #1 Employees Should Only Download Applications From Trusted Sources 8 Google Play (Android) and the iOS App Store (iOS) are administered by Google & Apple • Strict requirements for applications submitted for inclusion • Utilize sophisticated filtering mechanisms to discover and remove apps that may contain malware Apps should not be downloaded from untrustworthy 3rd party app stores
  • 9. 9 Malware Focused Policy #2 Employees Should Always Update Their Mobile Devices To The Latest Firmware Extend the same patch requirements for your corporate network to mobile Updating firmware is the best way to patch vulnerabilities on mobile devices
  • 10. 10 Mobile Malware Example: DroidKungFu This type of malware can be considered both a Trojan and a Rootkit • Unique because it can avoid detection by anti malware software • Works by installing a backdoor in the Android OS • Gives the attacker full control of the user’s mobile device • Mainly affects devices running Android 2.2, exploiting two vulnerabilities in the OS version
  • 11. Malware Focused Policy #3 Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail 11 Employees should be very careful when receiving an SMS or email containing a link If the URL of the link seems suspicious they should not click the link Inform the Security Department instead to investigate the URL
  • 12. Mobile Malware Example: Zitmo (Zeus in the Mobile) 12 A Trojan that can forward SMS’s with confidential information from the device to other phone numbers • Can steal a user’s username and password • A SMS is sent with a link to update the ‘security certificate’, while it actually directs the user to install Zitmo • Once the installation is completed and info is received, attackers usually log-into user’s confidential sites like bank accounts to initiate unauthorized transactions
  • 13. 1. Employees Should Only Download Applications From Trusted Sources 2. Employees Should Always Update Their Mobile Devices To The Latest Firmware 3. Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail 13 Summary - Three Steps To Combat Mobile Malware
  • 14. Try Moblisafe for yourself - http://information.rapid7.com/mobilisafe- demo.html 14 Thank you!