SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
#ACAD-­‐CSIRT	
  
Mobile Security, Mobile
Malware & Countermeasure
IGN Mantra, Chairman
Email: mantra@acad-csirt.or.id, URL: acad-csirt.or.id
Honeynet Seminar 2013
#ACAD-­‐CSIRT	
  
MOBILE TRENDS
#ACAD-­‐CSIRT	
  
Why the mobile phone BOOM
#ACAD-­‐CSIRT	
  
The complex picture of the mobile phone market
But mobile phone market share doesn’t tell the full story
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Smartphones reached 30% market share in 2011
483M units shipped worldwide
Smartphone shipments as a % of total handset shipments
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Smartphone sales vary greatly by region Q2 2011
are the majority of handset sales in North America (63%) and Europe (51%)
Market share
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Android became dominant smartphone OS
Samsung and HTC benefited the most from Android success (Q4 2011)
Smartphone market share by OEM and platform (H2 2011)
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Android turned the tables on handset makers
Samsung and HTC benefited, Nokia, Motorola, Sony were challenged
Beneficiaries:
fast-moving challengers
Efficient cost structure plus ability to differentiate
in software, hardware or both
low cost assemblers
Cost structure optimised for razor-thin margins
Android is a long-term opportunity for global reach
Under pressure:
old guard OEMs
Cost structure requiring high-margins
Commoditising effect of Android makes high-
margins unattainable for OEM without own
ecosystem or meaningful differentiation
No Name source: VisionMobile
#ACAD-­‐CSIRT	
  
MOBILE MALWARE
#ACAD-­‐CSIRT	
  
10 Malware Types 2013
source : boston.com
Droid
KungFu
Geinimi
Plankton Droid
Dream
Android.
Pjapps
Ikee
Zitmo
Hong
TouTou
Timifonica
SymbOS.
Skull
#ACAD-­‐CSIRT	
  
Mobile Malware Statistic 2013
Source : Kaspersky Lab
#ACAD-­‐CSIRT	
  
Mobile Malware
Malware is software with
malicious purpose. It may be
designed to disable your phone,
remotely control your phone, or
steal valueable your information.
Mobile malware uses the same
techniques as a PC malware to
infect mobile devices.
app
pc
#ACAD-­‐CSIRT	
  
The Growth
#ACAD-­‐CSIRT	
  
Malware Samples Library
Source : http://rogunix.com/docs/Android/Malware/
#ACAD-­‐CSIRT	
  
The Real Dangers of Mobile Malware
Bank account
password are
stolen.
Private information
is captured.
Phone data is
deleted.
Device is “bricked”
and need replacing
The phone is
forced to send the
sms premium
numbers. (sedot
pulsa).
Malware infected
devices can be used
by botnet owners to
launch attacks on
digital targets.
#ACAD-­‐CSIRT	
  
How they get you
PHISING
A fake version of real site
gathers your log-in ad other
private informations
SPYWARE
Silently collects information
from users and sends it to
eavesdroppers
EXPLOITING
Some malware will exploit
mobile platform vulnerabilities to
gain control of the device
WORM
A program tha replicates itself
spreading throughout a network
MAN IN THE MIDDLE
The attackers becomes a
middle man in a communication
stream and logs all information
relayed between the
communicating parties
DIRECT ATTACK
Comes from files or viruses sent
right to your cell phone.
#ACAD-­‐CSIRT	
  
PROTECT MOBILE DEVICE
#ACAD-­‐CSIRT	
  
Mobile Malware & Awareness
Of users say that they
are unaware of
security software for
smartphones
Of mobile users bank
from a phone, yet most
don’t have security
measures in place
53%
24%
#ACAD-­‐CSIRT	
  
What should You Do and Don’t
DO
•  Make sure the OS and sowftware are
up to date at all times
•  Download apps from reputable sites
and closely review app permission
requests.
•  Make sure to check the feedback
from other users before installing the
program from an app store
•  User strong password
•  User personal firewall
•  Turn off bluetooth and other
connections when not in use
•  Install a mobile security application.
DON’T
•  Download apps from third
party app repositories
•  Jailbreak your phone
•  Leave your “wifi ad hoc
mode on”
•  Accessing banking or
shopping sites over a public
WIFI connection
•  Leave your mobile device
unattended in public places.
#ACAD-­‐CSIRT	
  
References
•  A window into Mobile device security
–  http://www.symantec.com/content/en/us/about/media/pdfs/
symc_mobile_device_security_june2011.pdf
•  http://www.continuitycentral.com/feature0919.html
•  http://www.usatoday.com/tech/news/story/2012-03-22/
lost-phones/53707448/1]
•  US-CERT Resource: Paul Ruggiero and Jon Foote,
“Cyber Threats to Mobile Phones”, http://www.us-
cert.gov/reading_room/
cyber_threats_to_mobile_phones.pdf)
•  Top 10 android Security Riskshttp://
www.esecurityplanet.com/views/article.php/3928646/
Top-10-Android-Security-Risks.htm
#ACAD-­‐CSIRT	
  
TERIMA KASIH
IGN MANTRA
Email : incident@acad-csirt.or.id, info@acad-csirt.or.id

Weitere ähnliche Inhalte

Was ist angesagt?

BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
Purna Bhat
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Mobile security
Mobile securityMobile security
Mobile security
home
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Mobilecomputings07
Mobilecomputings07Mobilecomputings07
Mobilecomputings07
Mayank Vora
 

Was ist angesagt? (19)

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
CS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad MobilstrategiCS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad Mobilstrategi
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Communication gadgets and technology
Communication gadgets and technologyCommunication gadgets and technology
Communication gadgets and technology
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobilecomputings07
Mobilecomputings07Mobilecomputings07
Mobilecomputings07
 
Wearables show march 2015
Wearables show   march 2015Wearables show   march 2015
Wearables show march 2015
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 

Andere mochten auch

Cisco Prime Security Manager
Cisco Prime Security ManagerCisco Prime Security Manager
Cisco Prime Security Manager
Cisco Russia
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Phil Agcaoili
 
Our Journey <3
Our Journey <3Our Journey <3
Our Journey <3
Denn Den
 

Andere mochten auch (20)

C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Cisco Prime Security Manager
Cisco Prime Security ManagerCisco Prime Security Manager
Cisco Prime Security Manager
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Analysts Probe Future of Client Architectures as HTML 5 and Client Virtualiza...
Analysts Probe Future of Client Architectures as HTML 5 and Client Virtualiza...Analysts Probe Future of Client Architectures as HTML 5 and Client Virtualiza...
Analysts Probe Future of Client Architectures as HTML 5 and Client Virtualiza...
 
Be The Excuse?
Be The Excuse?Be The Excuse?
Be The Excuse?
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Our Journey <3
Our Journey <3Our Journey <3
Our Journey <3
 
Iwan Sumantri - Cyber Threat Indonesia 2013
Iwan Sumantri - Cyber Threat Indonesia 2013Iwan Sumantri - Cyber Threat Indonesia 2013
Iwan Sumantri - Cyber Threat Indonesia 2013
 
Urbanismo janela-otero-deber
Urbanismo janela-otero-deberUrbanismo janela-otero-deber
Urbanismo janela-otero-deber
 
Ahmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident UpdatesAhmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident Updates
 
Cents-ible Cyber Monday
Cents-ible Cyber MondayCents-ible Cyber Monday
Cents-ible Cyber Monday
 
Giving back with GitHub - Putting the Open Source back in iOS
Giving back with GitHub - Putting the Open Source back in iOSGiving back with GitHub - Putting the Open Source back in iOS
Giving back with GitHub - Putting the Open Source back in iOS
 
Osorio antonhy 3 b
Osorio antonhy 3 bOsorio antonhy 3 b
Osorio antonhy 3 b
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Lukas - Ancaman E-Health Security
Lukas - Ancaman E-Health SecurityLukas - Ancaman E-Health Security
Lukas - Ancaman E-Health Security
 
Gildas Deograt - Effective Honeynet in High Grade Security Strategy
Gildas Deograt - Effective Honeynet in High Grade Security StrategyGildas Deograt - Effective Honeynet in High Grade Security Strategy
Gildas Deograt - Effective Honeynet in High Grade Security Strategy
 
Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter
 

Ähnlich wie I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure

Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
Ce hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platformsCe hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platforms
Mehrdad Jingoism
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
Ken Huang
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 

Ähnlich wie I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure (20)

Smartphone
SmartphoneSmartphone
Smartphone
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Ce hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platformsCe hv8 module 16 hacking mobile platforms
Ce hv8 module 16 hacking mobile platforms
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure

  • 1. #ACAD-­‐CSIRT   Mobile Security, Mobile Malware & Countermeasure IGN Mantra, Chairman Email: mantra@acad-csirt.or.id, URL: acad-csirt.or.id Honeynet Seminar 2013
  • 3. #ACAD-­‐CSIRT   Why the mobile phone BOOM
  • 4. #ACAD-­‐CSIRT   The complex picture of the mobile phone market But mobile phone market share doesn’t tell the full story Source: VisionMobile
  • 5. #ACAD-­‐CSIRT   Smartphones reached 30% market share in 2011 483M units shipped worldwide Smartphone shipments as a % of total handset shipments Source: VisionMobile
  • 6. #ACAD-­‐CSIRT   Smartphone sales vary greatly by region Q2 2011 are the majority of handset sales in North America (63%) and Europe (51%) Market share Source: VisionMobile
  • 7. #ACAD-­‐CSIRT   Android became dominant smartphone OS Samsung and HTC benefited the most from Android success (Q4 2011) Smartphone market share by OEM and platform (H2 2011) Source: VisionMobile
  • 8. #ACAD-­‐CSIRT   Android turned the tables on handset makers Samsung and HTC benefited, Nokia, Motorola, Sony were challenged Beneficiaries: fast-moving challengers Efficient cost structure plus ability to differentiate in software, hardware or both low cost assemblers Cost structure optimised for razor-thin margins Android is a long-term opportunity for global reach Under pressure: old guard OEMs Cost structure requiring high-margins Commoditising effect of Android makes high- margins unattainable for OEM without own ecosystem or meaningful differentiation No Name source: VisionMobile
  • 10. #ACAD-­‐CSIRT   10 Malware Types 2013 source : boston.com Droid KungFu Geinimi Plankton Droid Dream Android. Pjapps Ikee Zitmo Hong TouTou Timifonica SymbOS. Skull
  • 11. #ACAD-­‐CSIRT   Mobile Malware Statistic 2013 Source : Kaspersky Lab
  • 12. #ACAD-­‐CSIRT   Mobile Malware Malware is software with malicious purpose. It may be designed to disable your phone, remotely control your phone, or steal valueable your information. Mobile malware uses the same techniques as a PC malware to infect mobile devices. app pc
  • 14. #ACAD-­‐CSIRT   Malware Samples Library Source : http://rogunix.com/docs/Android/Malware/
  • 15. #ACAD-­‐CSIRT   The Real Dangers of Mobile Malware Bank account password are stolen. Private information is captured. Phone data is deleted. Device is “bricked” and need replacing The phone is forced to send the sms premium numbers. (sedot pulsa). Malware infected devices can be used by botnet owners to launch attacks on digital targets.
  • 16. #ACAD-­‐CSIRT   How they get you PHISING A fake version of real site gathers your log-in ad other private informations SPYWARE Silently collects information from users and sends it to eavesdroppers EXPLOITING Some malware will exploit mobile platform vulnerabilities to gain control of the device WORM A program tha replicates itself spreading throughout a network MAN IN THE MIDDLE The attackers becomes a middle man in a communication stream and logs all information relayed between the communicating parties DIRECT ATTACK Comes from files or viruses sent right to your cell phone.
  • 18. #ACAD-­‐CSIRT   Mobile Malware & Awareness Of users say that they are unaware of security software for smartphones Of mobile users bank from a phone, yet most don’t have security measures in place 53% 24%
  • 19. #ACAD-­‐CSIRT   What should You Do and Don’t DO •  Make sure the OS and sowftware are up to date at all times •  Download apps from reputable sites and closely review app permission requests. •  Make sure to check the feedback from other users before installing the program from an app store •  User strong password •  User personal firewall •  Turn off bluetooth and other connections when not in use •  Install a mobile security application. DON’T •  Download apps from third party app repositories •  Jailbreak your phone •  Leave your “wifi ad hoc mode on” •  Accessing banking or shopping sites over a public WIFI connection •  Leave your mobile device unattended in public places.
  • 20. #ACAD-­‐CSIRT   References •  A window into Mobile device security –  http://www.symantec.com/content/en/us/about/media/pdfs/ symc_mobile_device_security_june2011.pdf •  http://www.continuitycentral.com/feature0919.html •  http://www.usatoday.com/tech/news/story/2012-03-22/ lost-phones/53707448/1] •  US-CERT Resource: Paul Ruggiero and Jon Foote, “Cyber Threats to Mobile Phones”, http://www.us- cert.gov/reading_room/ cyber_threats_to_mobile_phones.pdf) •  Top 10 android Security Riskshttp:// www.esecurityplanet.com/views/article.php/3928646/ Top-10-Android-Security-Risks.htm
  • 21. #ACAD-­‐CSIRT   TERIMA KASIH IGN MANTRA Email : incident@acad-csirt.or.id, info@acad-csirt.or.id