SlideShare a Scribd company logo
1 of 42
Mobile Malware Monetization




Protecting the irreplaceable | f-secure.com
September
© F-Secure / Confidential
2
28, 2010
September
© F-Secure / Confidential
5
28, 2010
Smartphone market shares in 2009

                    Others
   Windows Mobile    4%
        7%                           Apple 14%

        iOS                                        Microsoft   7%
                                                  Symbian
        15 %
                                                    40 %            Symbian
                                                                    BlackBerry
                                                                    Android
     Android
      16 %                             RIM1                         iOS
                        BlackBerry
                                       9%                           Windows Mobile
                           18 %                                     Others




                                 Data source: Canalys
vs             vs


• Nokia: invisible
• Apple: very visible
• Nokia predicted to sell 107 Million smartphones in 2010
• Apple predicted to sell 41 Million smartphones in 2010
• Android in total predicted to sell 47 Million smartphones in 2010
Mobile Security - Where are we today?

• First mobile malware found in 2004
 • Now: 517 viruses, worms and trojans for mobile
   platforms
 • Targeting the most common platforms
 • No exploit-based malware, yet
• Real problems elsewhere
 • Lost, broken or stolen phones
• So: A success story!
Problems will stay on Windows until mobile malware authors get this


• 28 September, 2010
              PC provides existing infra for monetization
               •Information is easily available
               •Ready made exploit kits
               •Existing proven models to make money
               •There is plenty from where mobile malware
               authors can learn from
It’s All About Money
• There are already serious attempts to make money with mobile malware
• So far guys doing this are amateurs
• That’s going to change when some of them strike gold
• Monetization methods we have seen so far
     • Premium SMS messages
     • Premium voice calls
     • Subscription scams
     • Banking attacks
     • Ransomware
     • Fake applications




15   September 28, 2010
Premium SMS senders
• Premium SMS sending trojans are the most common mobile malware
• Typically these trojans are either minimal applications with simple social
  engineering UI, or trojanized versions of clean apps or games
• As premium SMS works only in one country, these trojans are highly localized
     • Most have that we know of operate in Russia
• Typically trojans are spread with rudimentary social engineering
     • As ICQ messages with download/install link
     • Vkontakte (Russian equivalent of facebook)
     • SEO spam
     • SMS spam




16   September 28, 2010
Fakeplayer SMS trojan
• Fakeplayer.A and .B are android trojans that
  pretend to be media player application
• On installation Android will ask for permissions
  that include sending SMS messages
• Unfortunately just about every Android app asks
  for a ton of permissions so user will see anything out of
  place
• When application is run it displays Russian text which
  translates as "Wait, sought access to video library..“
• Fakeplayer.B has been spread with SEO techniques
  targeting on porn related searches [1]




17   September 28, 2010
Premium Rate Call Trojans
• Premium rate SMS numbers work only in one country, which limits victims
• What malware authors want is international monetizing methods
• Too bad, there is one already available, and is being used by some authors
• “International premium” rate numbers work from anywhere in the world
     • They work by user registering a number from premium rate operators
     • After this all calls to this number are treated as international billing from
       which the owner of the number will get a cut from a phone call
          • What actually happens that call is routed locally, but charge is international level

     • Unlike premium SMS messages or other services, there is no way to block
       this unless user blocks international phone calls
     • Of course the billing operators are not at fault, from their point of view
       malware authors are abusing their services



18   September 28, 2010
"Short Stopping" / "Long Lining"




            Nevada – Somalia: $2.55 / minute
            Nevada – Florida: $0.03 / minute




Call Terminations
The numbers


• +882346077      Antarctica
• +17675033611    Dominican republic
• +88213213214    EMSAT satellite prefix
• +25240221601    Somalia
• +2392283261     São Tomé and Príncipe
• +881842011123   Globalstar satellite prefix
User Is Helpless Against “International” Numbers
• How do you figure out how much such a number costs you?
• How do you figure out who owns the number?
• Where do you complain to?
• How do you get such a number shut down?
• How you can block these numbers without preventing international calls?
Windows SMS and premium call trojans
• Used to be popular with modems, two known modern cases
• Using a GPRS USB dongle modem to send SMS messages
• It would be trivial so send SMS messages or make calls using BT enabled
  phone paired with PC
• Nokia PC suite offers easy interface for SMS sending and calls
• Using telephony capabilities to milk more money from user might be
  next botnet standard feature
Premium Rate Subscription Scams
• Premium rate subscription scams work by getting victim subscribed to service
  without them noticing and then starting to bill for services
• Typically these scams work by fooling victim in one time transaction
     • Victim thinks that he is ordering ringtone or joining a lottery
     • While he actually is subscribed to service that bills until terminated
• Alternative method uses WAP push to make scam easier
     • User is sent WAP push link with some social
       engineering pretext
     • If user clicks the link, he will get typical mobile
       ad page
     • But on the same time server gets his MSIDN and
       subscribes the victim



32   September 28, 2010
Premium Rate Service Scams As Facebook Spam
• We used to see premium rate
  scams mostly in SMS
• But now at least one operator
  affiliate is using facebook
• Clicking link leads to premium rate
  ad page by wixawin.com
• Wixawin displays prices and
  subscription information
• But less honest players are soon
  to follow
• Now that using FB spam is
  upfront and honest by itself




33   September 28, 2010
Ikee.B First Attempt At Banking Trojan
• Ikee.A iPhone worm was relatively harmless malware that only spread
• However Ikee.B was created by different author for financial gain [2]
• Upon infection Ikee.B contacted control server to download payload
     • Which modified /etc/hosts to point Dutch ING bank site to server in Japan
     • Compromized site is small flower shop in Japan
• Dutch ING uses SMS TAN codes
     • So Ikee.B forwarded SMS messages containing TAN to HTTP server




34   September 28, 2010 © F-Secure Confidential
First Mobile Ransomware
• SSH default password in unlocked iPhones
  was also used for first attempt at ransomware
• A Dutch teenager used the hole to break into
  number of vulnerable phones and changed
  lock icon to display ransom message [3]
• Site displayed at ransom message asked
  $4.95 for cleanup instructions
• So far we not seen other phone ransom attempts
• However we have met PC ransomware that
  uses SMS messages as payment message
  for unlock code




37   September 28, 2010
Fake Applications
• Fake applications are not malware
• They are apps that have no functionality
  but are sold for low enough amount
  that people don’t bother to complain
• Fake banking applications claim to
  provide mobile banking for given bank
• When executed they launch that banks
  own site in browser
• However they could have been easily
  used for phishing or banker trojan attack
• People actually bought these and tried
  to use them for banking
• Scary .
Banks targeted by "09droid"
 Abbey Bank                      LloydsTSB
 Alaska USA FCU                  M&I
 Alliance & Leicester (v. 1.1)   Mechanics Bank v.1.1
                                 MFFCU v.1.1
 Bank Atlantic                   Midwest
 Bank of America                 Nationwide (v. 1.1)
 Bank of Queensland              NatWest (v. 1.1)
 Barclaycard (v. 1.1)            Navy Federal Credit Union (v. 1.1)
 Barclays Bank (v. 1.2)          PNC
                                 Royal Bank of Canada
 BB&T                            RBS v.1.1
 Chase                           SunTrust
 City Bank Texas                 TD Bank v.1.1
 Commerce Bank                   US Bank v.1.2
 Compass Bank                    USAA v.1.1
                                 Valley Credit Union
 Deutsche Bank                   Wachovia Corp (v. 1.2)
 Fifty Third Bank v.1.1          Wells Fargo (v. 1.1)
 First Republic Bank v.1.1
 Great Florida Bank
What’s Going To Happen Next?
• Now as some malware authors have made money, blood is in the water
• Most likely authors are going to switch from premium SMS to premium calls
• Next question is that how bad this is going to get
• PC malware explosion started in 2004 when first malware got profit
• It is very likely that we are going to see a lot more activity in mobile front
• Already now in 2010 most of the mobile malware is profit motivated
• And we are going to see a lot more of it




40   September 28, 2010
Sources
• [1] http://www.securelist.com/en/blog/2286/Android_SMS_Trojan_Now_Being_Delivered_via_SEO_Techniques
•    [2] http://www.f-secure.com/v-descs/worm_iphoneos_ikee_b.shtml

•    [3] http://www.zdnet.com/blog/security/ihacked-jailbroken-iphones-compromised-5-ransom-demanded/4805




42   September 28, 2010 © F-Secure Confidential

More Related Content

Viewers also liked

Electronic Program Guides using SVG
Electronic Program Guides using SVGElectronic Program Guides using SVG
Electronic Program Guides using SVGCyril Concolato
 
Developing an Outsourcing Industry
Developing an Outsourcing IndustryDeveloping an Outsourcing Industry
Developing an Outsourcing IndustryRob Cayzer
 
The Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a ScienceThe Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a Sciencempapish
 
E-Commerce for Malaysia
E-Commerce for MalaysiaE-Commerce for Malaysia
E-Commerce for MalaysiaRob Cayzer
 
Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)room13tnis
 

Viewers also liked (10)

Electronic Program Guides using SVG
Electronic Program Guides using SVGElectronic Program Guides using SVG
Electronic Program Guides using SVG
 
Section12
Section12Section12
Section12
 
Bayard Saunders
Bayard SaundersBayard Saunders
Bayard Saunders
 
Aibb
AibbAibb
Aibb
 
Developing an Outsourcing Industry
Developing an Outsourcing IndustryDeveloping an Outsourcing Industry
Developing an Outsourcing Industry
 
The Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a ScienceThe Dark Art: Is Music Recommendation Science a Science
The Dark Art: Is Music Recommendation Science a Science
 
Topic 12
Topic 12Topic 12
Topic 12
 
E-Commerce for Malaysia
E-Commerce for MalaysiaE-Commerce for Malaysia
E-Commerce for Malaysia
 
Topic 9
Topic 9Topic 9
Topic 9
 
Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)Wendy's Treaty of waitangi (national conflict)
Wendy's Treaty of waitangi (national conflict)
 

Similar to F-Secure: Mobile malware monetization

IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationBrennan Hayden
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereDennis Heinle
 
Online mobile game(nguyenle)
Online mobile game(nguyenle)Online mobile game(nguyenle)
Online mobile game(nguyenle)action.vn
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftSimpletel
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europekevin han
 
Mobile Market : Past Present Now and Then
Mobile Market : Past Present Now and ThenMobile Market : Past Present Now and Then
Mobile Market : Past Present Now and ThenSittiphol Phanvilai
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Navigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 CondensedNavigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 CondensedAlex Housley
 
Widgets, 360s and Androids
Widgets, 360s and AndroidsWidgets, 360s and Androids
Widgets, 360s and AndroidsSales Hub Pro
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 

Similar to F-Secure: Mobile malware monetization (20)

IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments Presentation
 
Mobile input lukew
Mobile input lukewMobile input lukew
Mobile input lukew
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
Online mobile game(nguyenle)
Online mobile game(nguyenle)Online mobile game(nguyenle)
Online mobile game(nguyenle)
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europe
 
Mobile Market : Past Present Now and Then
Mobile Market : Past Present Now and ThenMobile Market : Past Present Now and Then
Mobile Market : Past Present Now and Then
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Navigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 CondensedNavigation & Location Europe 2009 Condensed
Navigation & Location Europe 2009 Condensed
 
Widgets, 360s and Androids
Widgets, 360s and AndroidsWidgets, 360s and Androids
Widgets, 360s and Androids
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 

More from Procontent.Ru Magazine

WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...Procontent.Ru Magazine
 
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФMoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФProcontent.Ru Magazine
 
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...Procontent.Ru Magazine
 
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&MMoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&MProcontent.Ru Magazine
 
российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013Procontent.Ru Magazine
 
Рынок мобильных приложений в России и мире
Рынок мобильных приложений в России и миреРынок мобильных приложений в России и мире
Рынок мобильных приложений в России и миреProcontent.Ru Magazine
 
МТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 годуМТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 годуProcontent.Ru Magazine
 
Российский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки ЕвросетиРоссийский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки ЕвросетиProcontent.Ru Magazine
 
J'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисовJ'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисовProcontent.Ru Magazine
 
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 годаJ'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 годаProcontent.Ru Magazine
 
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa..."Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...Procontent.Ru Magazine
 
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
 «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ... «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...Procontent.Ru Magazine
 
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...Procontent.Ru Magazine
 
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...Procontent.Ru Magazine
 
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...Procontent.Ru Magazine
 
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...Procontent.Ru Magazine
 
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...Procontent.Ru Magazine
 

More from Procontent.Ru Magazine (20)

Android fragmentation 2013
Android fragmentation 2013Android fragmentation 2013
Android fragmentation 2013
 
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
WapStart: Как показывать 200 миллионов баннеров ежедневно и быть готовым пока...
 
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФMoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
MoCO 2013: Мобильное государство, - Дмитрий Сатин, Минкомсвязь РФ
 
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
MoCO 2013: "Потребности рынка VAS в новых бизнес-моделях. Проблемы и решения"...
 
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&MMoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
MoCO 2013: Рынок VAS в России: взгляд аналитика - Оксана Панкратова, AC&M
 
российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013российский рынок смартфонов и телефонов в 1 q 2013
российский рынок смартфонов и телефонов в 1 q 2013
 
Рынок мобильных приложений в России и мире
Рынок мобильных приложений в России и миреРынок мобильных приложений в России и мире
Рынок мобильных приложений в России и мире
 
МТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 годуМТС: Российский рынок смартфонов и телефонов в 2012 году
МТС: Российский рынок смартфонов и телефонов в 2012 году
 
Российский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки ЕвросетиРоссийский рынок портативной электроники - оценки Евросети
Российский рынок портативной электроники - оценки Евросети
 
Ac&m 4 q12_stat_eng-ukraine
Ac&m 4 q12_stat_eng-ukraineAc&m 4 q12_stat_eng-ukraine
Ac&m 4 q12_stat_eng-ukraine
 
Ac&m 4 q12_stat_eng
Ac&m 4 q12_stat_engAc&m 4 q12_stat_eng
Ac&m 4 q12_stat_eng
 
J'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисовJ'son&Partners: Российский рынок дистанционных финансовых сервисов
J'son&Partners: Российский рынок дистанционных финансовых сервисов
 
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 годаJ'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
J'son&Partners: российский рынок мобильного интернет-доступа по итогам 2012 года
 
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa..."Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
"Мировой и российский рынки инфраструктуры 4G" - аналитический отчет J'son&Pa...
 
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
 «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ... «Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
«Sprinlke - how to float in an ocean of games» - Mediocre's presentation at ...
 
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
Тенденции мобильного рынка: think global, act local - Дарья Трушкина, вице-пр...
 
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
Подводные камни» сертификации Windows Phone и Windows 8 приложений - Александ...
 
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
Особенности быстрого тестирования мобильных интерфейсов - Антон Алябьев, UI D...
 
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
Недвусмысленные намеки на Second Screen - Александр Вяткин, Account Director,...
 
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
Типовые ошибки в iOS приложениях. Классификация ошибок в iOS приложении. - Дм...
 

Recently uploaded

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

F-Secure: Mobile malware monetization

  • 1. Mobile Malware Monetization Protecting the irreplaceable | f-secure.com
  • 2. September © F-Secure / Confidential 2 28, 2010
  • 3.
  • 4.
  • 5. September © F-Secure / Confidential 5 28, 2010
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Smartphone market shares in 2009 Others Windows Mobile 4% 7% Apple 14% iOS Microsoft 7% Symbian 15 % 40 % Symbian BlackBerry Android Android 16 % RIM1 iOS BlackBerry 9% Windows Mobile 18 % Others Data source: Canalys
  • 12. vs vs • Nokia: invisible • Apple: very visible • Nokia predicted to sell 107 Million smartphones in 2010 • Apple predicted to sell 41 Million smartphones in 2010 • Android in total predicted to sell 47 Million smartphones in 2010
  • 13. Mobile Security - Where are we today? • First mobile malware found in 2004 • Now: 517 viruses, worms and trojans for mobile platforms • Targeting the most common platforms • No exploit-based malware, yet • Real problems elsewhere • Lost, broken or stolen phones • So: A success story!
  • 14. Problems will stay on Windows until mobile malware authors get this • 28 September, 2010 PC provides existing infra for monetization •Information is easily available •Ready made exploit kits •Existing proven models to make money •There is plenty from where mobile malware authors can learn from
  • 15. It’s All About Money • There are already serious attempts to make money with mobile malware • So far guys doing this are amateurs • That’s going to change when some of them strike gold • Monetization methods we have seen so far • Premium SMS messages • Premium voice calls • Subscription scams • Banking attacks • Ransomware • Fake applications 15 September 28, 2010
  • 16. Premium SMS senders • Premium SMS sending trojans are the most common mobile malware • Typically these trojans are either minimal applications with simple social engineering UI, or trojanized versions of clean apps or games • As premium SMS works only in one country, these trojans are highly localized • Most have that we know of operate in Russia • Typically trojans are spread with rudimentary social engineering • As ICQ messages with download/install link • Vkontakte (Russian equivalent of facebook) • SEO spam • SMS spam 16 September 28, 2010
  • 17. Fakeplayer SMS trojan • Fakeplayer.A and .B are android trojans that pretend to be media player application • On installation Android will ask for permissions that include sending SMS messages • Unfortunately just about every Android app asks for a ton of permissions so user will see anything out of place • When application is run it displays Russian text which translates as "Wait, sought access to video library..“ • Fakeplayer.B has been spread with SEO techniques targeting on porn related searches [1] 17 September 28, 2010
  • 18. Premium Rate Call Trojans • Premium rate SMS numbers work only in one country, which limits victims • What malware authors want is international monetizing methods • Too bad, there is one already available, and is being used by some authors • “International premium” rate numbers work from anywhere in the world • They work by user registering a number from premium rate operators • After this all calls to this number are treated as international billing from which the owner of the number will get a cut from a phone call • What actually happens that call is routed locally, but charge is international level • Unlike premium SMS messages or other services, there is no way to block this unless user blocks international phone calls • Of course the billing operators are not at fault, from their point of view malware authors are abusing their services 18 September 28, 2010
  • 19. "Short Stopping" / "Long Lining" Nevada – Somalia: $2.55 / minute Nevada – Florida: $0.03 / minute Call Terminations
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. The numbers • +882346077 Antarctica • +17675033611 Dominican republic • +88213213214 EMSAT satellite prefix • +25240221601 Somalia • +2392283261 São Tomé and Príncipe • +881842011123 Globalstar satellite prefix
  • 30. User Is Helpless Against “International” Numbers • How do you figure out how much such a number costs you? • How do you figure out who owns the number? • Where do you complain to? • How do you get such a number shut down? • How you can block these numbers without preventing international calls?
  • 31. Windows SMS and premium call trojans • Used to be popular with modems, two known modern cases • Using a GPRS USB dongle modem to send SMS messages • It would be trivial so send SMS messages or make calls using BT enabled phone paired with PC • Nokia PC suite offers easy interface for SMS sending and calls • Using telephony capabilities to milk more money from user might be next botnet standard feature
  • 32. Premium Rate Subscription Scams • Premium rate subscription scams work by getting victim subscribed to service without them noticing and then starting to bill for services • Typically these scams work by fooling victim in one time transaction • Victim thinks that he is ordering ringtone or joining a lottery • While he actually is subscribed to service that bills until terminated • Alternative method uses WAP push to make scam easier • User is sent WAP push link with some social engineering pretext • If user clicks the link, he will get typical mobile ad page • But on the same time server gets his MSIDN and subscribes the victim 32 September 28, 2010
  • 33. Premium Rate Service Scams As Facebook Spam • We used to see premium rate scams mostly in SMS • But now at least one operator affiliate is using facebook • Clicking link leads to premium rate ad page by wixawin.com • Wixawin displays prices and subscription information • But less honest players are soon to follow • Now that using FB spam is upfront and honest by itself 33 September 28, 2010
  • 34. Ikee.B First Attempt At Banking Trojan • Ikee.A iPhone worm was relatively harmless malware that only spread • However Ikee.B was created by different author for financial gain [2] • Upon infection Ikee.B contacted control server to download payload • Which modified /etc/hosts to point Dutch ING bank site to server in Japan • Compromized site is small flower shop in Japan • Dutch ING uses SMS TAN codes • So Ikee.B forwarded SMS messages containing TAN to HTTP server 34 September 28, 2010 © F-Secure Confidential
  • 35.
  • 36.
  • 37. First Mobile Ransomware • SSH default password in unlocked iPhones was also used for first attempt at ransomware • A Dutch teenager used the hole to break into number of vulnerable phones and changed lock icon to display ransom message [3] • Site displayed at ransom message asked $4.95 for cleanup instructions • So far we not seen other phone ransom attempts • However we have met PC ransomware that uses SMS messages as payment message for unlock code 37 September 28, 2010
  • 38. Fake Applications • Fake applications are not malware • They are apps that have no functionality but are sold for low enough amount that people don’t bother to complain • Fake banking applications claim to provide mobile banking for given bank • When executed they launch that banks own site in browser • However they could have been easily used for phishing or banker trojan attack • People actually bought these and tried to use them for banking • Scary .
  • 39. Banks targeted by "09droid" Abbey Bank LloydsTSB Alaska USA FCU M&I Alliance & Leicester (v. 1.1) Mechanics Bank v.1.1 MFFCU v.1.1 Bank Atlantic Midwest Bank of America Nationwide (v. 1.1) Bank of Queensland NatWest (v. 1.1) Barclaycard (v. 1.1) Navy Federal Credit Union (v. 1.1) Barclays Bank (v. 1.2) PNC Royal Bank of Canada BB&T RBS v.1.1 Chase SunTrust City Bank Texas TD Bank v.1.1 Commerce Bank US Bank v.1.2 Compass Bank USAA v.1.1 Valley Credit Union Deutsche Bank Wachovia Corp (v. 1.2) Fifty Third Bank v.1.1 Wells Fargo (v. 1.1) First Republic Bank v.1.1 Great Florida Bank
  • 40. What’s Going To Happen Next? • Now as some malware authors have made money, blood is in the water • Most likely authors are going to switch from premium SMS to premium calls • Next question is that how bad this is going to get • PC malware explosion started in 2004 when first malware got profit • It is very likely that we are going to see a lot more activity in mobile front • Already now in 2010 most of the mobile malware is profit motivated • And we are going to see a lot more of it 40 September 28, 2010
  • 41.
  • 42. Sources • [1] http://www.securelist.com/en/blog/2286/Android_SMS_Trojan_Now_Being_Delivered_via_SEO_Techniques • [2] http://www.f-secure.com/v-descs/worm_iphoneos_ikee_b.shtml • [3] http://www.zdnet.com/blog/security/ihacked-jailbroken-iphones-compromised-5-ransom-demanded/4805 42 September 28, 2010 © F-Secure Confidential