SlideShare a Scribd company logo
1 of 45
Think beyond. Go beyond.
Securing 3-mode Mobile Banking
Jay McLaughlin, CISSP
SVP, Chief Security Officer
Q2ebanking
Agenda
•  Impact: Consumerization of Technology
•  Understanding the Threat Landscape
•  Securing the Channel
•  Evolving Security within this Space
•  Summary & QA
Mobile Waves
•  300,000
•  1.2 billion
•  8 trillion
•  35 billion
•  1 billion
•  apps developed in 3 years
•  mobile web users
•  SMS messages sent last year
•  value of apps downloaded
•  Est mobile banking customers*
*Source: Juniper Research, Mar 2013
Consumerization of Technology
•  Growing tendency for new information
technology to emerge first in the consumer
market and then spread into business and
government organizations
•  Consumer markets as the primary driver of
information technology innovation
•  One of the most difficult issues facing
mobile banking today is providing access
to the multiplicity of devices that customers
use.
–  This list of devices has only grown longer and more
complex with the addition of tablets
Growing Impact
People camped outside of Apple’s stores to purchased
the iPhone & iPad!
When was the last time a customer camped outside of
your branch with excitement?
5
Source: Chetan Sharma Consulting, 2012 www.chetansharma.com
Putting Global Mobile in Context
Mobile Phones Outnumber Credit Cards
Apps On The Rise
The Common Language: SMS
•  Providing a text channel should be a high priority
•  Text message banking offers compelling advantages
–  Encourages consumers to avoid more costly in‐branch
and phone interactions, while at the same time boosting
consumer satisfaction through increased convenience.
Providing a text channel is necessary to raise mobile
banking
–  And, unlike browser and app banking channels, text
message banking does not require costly development
across multiple platforms.
–  Adoption across all levels of
mobile device ownership
Critical Barrier to Adoption
•  Awareness [about mobile banking] is limited
to slightly more than half of all smartphone
owners with a bank account
•  Concerns about the security of mobile
banking and mobile payment technologies
remain one of the primary impediments to
further adoption
–  *Security concerns are cited as the top barrier to
both online and mobile banking
(*Source: Javelin Research “Mobile Banking Financial Institution Scorecard, Nov 2012)
Think beyond. Go beyond.
Understanding the Threats
•  As the technology changes, the attack surface will change
•  Fraudsters have all the tools they need to effectively turn
mobile malware into the biggest customer security problem
we've ever seen.
–  Important factor is lacking - customer adoption. Number of users who bank
online from their mobile devices is still relatively low in comparison.
–  Additionally, transactions types are limited or not yet enabled for mobile devices.
Since online fraud is mostly a big numbers game, attacking mobile bankers is
not yet an effective fraud operation.
•  Security vendor Trusteer has predicted that within 12 to 24
months over 1 in 20 (5.6%) of all Android and iOS devices
ARE LIKELY to be infected by mobile malware
Incoming!!! Mobile!!!
Mobile: Current Threat Landscape
•  App Stores
–  AppStore, GooglePlay, BlackberryWorld, WindowsPhone store
•  Mobile malware (Trojans, downloaders, etc.)
•  Insecure device security (rooting, jail breaking, etc.)
•  Insecure applications
–  Ex. third-party APIs, insecure data storage, information disclosure
•  User exploitation
•  Failure to recognize the power of mobile devices
Remember 1993? …10 years later…
Mobile Malware
•  Researchers identify
first instance of
mobile malware in
2004
•  More than 80 infected
apps have been
removed from Google
Play since 2011
•  Android malware has
infected more than
250,000 users
ex. Gozi
Mobile Malware Dangers
•  Mobile malware component that ZeuS entices users
to load and run in their mobile devices. 
•  ZitMO (aka “ZeuS-in-the-Mobile”) / CitMO (Carberg)
Mobile Malware
http://www.infosecurity-magazine.com/view/29705/-zeus-malware-
throws-36-million-lightning-bolt-across-europe
Malware Vectors
•  Malicious apps in App Store
•  Vulnerabilities in software leveraged during
normal user behavior (exploits)
•  Malicious e-mail or attachment (“spear
phishing”)
•  Malicious web content (“drive by download”)
•  Fewer vectors – absence of Flash Java
Malicious Apps
Security Models: iOS vs. Android
•  iOS
–  Mandatory code signing by Apple
–  Individual apps are sandboxed using mandatory
access control (MAC) security
–  Uses ASLR on sysbin and some apps
–  Single app store to control publishing
•  Android
–  Can load new code at runtime
–  Sandbox is flawed allowing an app to exploit the kernel
–  Apps can have any permissions, require approval
–  Many app stores (Google, Amazon, underground)
Security Around The Delivery of the App
•  Code Signing requires apps to be
downloaded from the App Store
•  Publishers’ real-world identities
are verified by Apple
•  Apps are reviewed by Apple before
they are available in App Store
•  Apple acts as an Anti-Virus for iOS
Year in Review: Mobile Threatscape
(*Source: F-Secure Mobile Threat Report Q4 2012)
Jail breaking Devices
•  sn0wbreeze, redsn0w, acidsn0w,
jailbreakme, greenpoison
•  Why? for functionality, more apps
•  “Jailbreaking” or “rooting destroys
the security model
•  Jailbreaking techniques leave the
device with a standard root
password that may grant admin-
level access 
•  Convenience at the sake of security
Physical Attacks
•  Latest proof of concept device attack
– If physical access is ever gained, GAMEOVER.
Source: BBC News, June 2013 http://www.bbc.co.uk/news/technology-22764815
QR Codes
•  QR codes surfacing
containing malicious
links
•  First case confirmed by
Kaspersky Labs last year
- mobile malware used to
send premium SMS
messages
http://siliconangle.com/blog/
2011/10/21/infected-qr-malware-
surfaces-on-smartphones-apps/
Can you spot which one is EVIL?
Think beyond. Go beyond.
Securing the Channel
Emerging Target
•  Fraudsters target the largest bang
for their buck
– Currently represents online channel
•  Perception is not necessarily
Reality
– but expect the mobile channel to
present itself as a larger target as
adoption increases
Mobile Security
•  Mobile banking presents a set of security
risks [significantly] different than those for
non-mobile online banking…NOT REALLY
•  User authentication, transaction
authorization, and data security in the
mobile channel must be dealt with
– Is it different than securing other channels?
Device Security
•  It is hard to design a security model which
protects against programs a user
downloads and wants to run
•  It is typically not the job of the OS to
prevent you from running the programs
you choose to run
•  Anti-Virus is designed to help decide
which programs are okay to run and which
are not
•  Defense-in-depth
Ø  “deep” or “elastic”
•  Derived from a military strategy;
requires that a defender deploy
resources at and well behind the
front line
•  Reliance on any single control or
mitigating factor is not sufficient
•  Prevents shortfalls in any single
defense control
Building a Layered Security Model
Consumer Focus Group: Computer Security
Mobile Authentication
•  Extend online security models
– provides comprehensive, multi-layered security
features for both you and your end users
– FFIEC Guidance called out the mobile channel
•  Out-of-band multi-factor authentication (MFA)
•  Leveraging temporary access codes (TACs)
•  Delivery via phone call, SMS, email
•  Device registration using HTML5 cookies
Out-of-Band 2F Will Replace Passwords
Out-of-band two factor authentication is becoming more popular
across consumer technologies replacing passwords
It’s More Mainstream than you Realize
Mobile Transaction Authorization
•  Out-of-Band Transaction approval
Direct from FFIEC’s June 2011 Guidance
“Out-of-band authentication means that a
transaction that is initiated via one delivery
channel [e.g.. online] must be re-
authenticated or verified via an
independent delivery channel [e.g..
telephone] in order for the transaction to be
completed”
Leverage Alerts
•  Users must play a part and participate in fighting fraud
•  Real-time alerts delivered to a victim are timely and provide
the opportunity to alert the financial institution of activity
•  Transactional Alerting
Ø  Ex: creation, authorization
•  Changes to profile settings
•  Security Event Alerts
Ø  Ex: pwd changes, failed logon attempts
Behavioral & Machine Learning Models
Login
Behavior
Time of Login
Location of
Login
Transaction
Behavior
Transaction
Behavioral
Models
Dom/Intl Wire,
ACH, Payroll,
Ext Transfer,
Transaction
Policies
Recipient
Monitoring
Modifications
to templates
Endpoint
Interrogation
User Agent
Device ID
Recognized
Devices
Score
Yes or No
Suspect or Normal
Secure Development & Testing
•  Develop with security at the foundation
– Follow best practices, SDLC, etc.
•  Intentionally limit app caching
– Can perform app cache clearing during init
•  HTML5 rendering performed client side
– BLOB sent from server to client
– Limits injection, XSS, other attacks
Think beyond. Go beyond.
Closing Remarks
“The future
ain’t what it
used to be.”
-  Lawrence “Yogi” Berra
New York Yankees, 1946-1964
The Future
Get Out in Front
•  Ad-hoc approaches result in
reactive decisions
•  Disruptive changes present
opportunities
Q & A
Declare var $response!
!
if [?] >= ‘1’!
!
!then!
!
! !$response = ‘answer’!
!
!else !
!
! !$response = ‘thankyou’!
!
end if;!
linkedin.com/in/mclaughlinjay	

jmclaughlin@q2ebanking.com	

Thank you

More Related Content

What's hot

Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 

What's hot (20)

Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 

Similar to Securing 3-Mode Mobile Banking

How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Mobile Security Strategies to Grow Your Business
Mobile Security Strategies to Grow Your BusinessMobile Security Strategies to Grow Your Business
Mobile Security Strategies to Grow Your BusinessEasy Solutions Inc
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceb coatesworth
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 

Similar to Securing 3-Mode Mobile Banking (20)

Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile Security Strategies to Grow Your Business
Mobile Security Strategies to Grow Your BusinessMobile Security Strategies to Grow Your Business
Mobile Security Strategies to Grow Your Business
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the device
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Securing 3-Mode Mobile Banking

  • 1. Think beyond. Go beyond. Securing 3-mode Mobile Banking Jay McLaughlin, CISSP SVP, Chief Security Officer Q2ebanking
  • 2. Agenda •  Impact: Consumerization of Technology •  Understanding the Threat Landscape •  Securing the Channel •  Evolving Security within this Space •  Summary & QA
  • 3. Mobile Waves •  300,000 •  1.2 billion •  8 trillion •  35 billion •  1 billion •  apps developed in 3 years •  mobile web users •  SMS messages sent last year •  value of apps downloaded •  Est mobile banking customers* *Source: Juniper Research, Mar 2013
  • 4. Consumerization of Technology •  Growing tendency for new information technology to emerge first in the consumer market and then spread into business and government organizations •  Consumer markets as the primary driver of information technology innovation •  One of the most difficult issues facing mobile banking today is providing access to the multiplicity of devices that customers use. –  This list of devices has only grown longer and more complex with the addition of tablets
  • 5. Growing Impact People camped outside of Apple’s stores to purchased the iPhone & iPad! When was the last time a customer camped outside of your branch with excitement? 5
  • 6. Source: Chetan Sharma Consulting, 2012 www.chetansharma.com Putting Global Mobile in Context
  • 7. Mobile Phones Outnumber Credit Cards
  • 8. Apps On The Rise
  • 9. The Common Language: SMS •  Providing a text channel should be a high priority •  Text message banking offers compelling advantages –  Encourages consumers to avoid more costly in‐branch and phone interactions, while at the same time boosting consumer satisfaction through increased convenience. Providing a text channel is necessary to raise mobile banking –  And, unlike browser and app banking channels, text message banking does not require costly development across multiple platforms. –  Adoption across all levels of mobile device ownership
  • 10. Critical Barrier to Adoption •  Awareness [about mobile banking] is limited to slightly more than half of all smartphone owners with a bank account •  Concerns about the security of mobile banking and mobile payment technologies remain one of the primary impediments to further adoption –  *Security concerns are cited as the top barrier to both online and mobile banking (*Source: Javelin Research “Mobile Banking Financial Institution Scorecard, Nov 2012)
  • 11. Think beyond. Go beyond. Understanding the Threats
  • 12. •  As the technology changes, the attack surface will change •  Fraudsters have all the tools they need to effectively turn mobile malware into the biggest customer security problem we've ever seen. –  Important factor is lacking - customer adoption. Number of users who bank online from their mobile devices is still relatively low in comparison. –  Additionally, transactions types are limited or not yet enabled for mobile devices. Since online fraud is mostly a big numbers game, attacking mobile bankers is not yet an effective fraud operation. •  Security vendor Trusteer has predicted that within 12 to 24 months over 1 in 20 (5.6%) of all Android and iOS devices ARE LIKELY to be infected by mobile malware Incoming!!! Mobile!!!
  • 13. Mobile: Current Threat Landscape •  App Stores –  AppStore, GooglePlay, BlackberryWorld, WindowsPhone store •  Mobile malware (Trojans, downloaders, etc.) •  Insecure device security (rooting, jail breaking, etc.) •  Insecure applications –  Ex. third-party APIs, insecure data storage, information disclosure •  User exploitation •  Failure to recognize the power of mobile devices
  • 14. Remember 1993? …10 years later…
  • 15. Mobile Malware •  Researchers identify first instance of mobile malware in 2004 •  More than 80 infected apps have been removed from Google Play since 2011 •  Android malware has infected more than 250,000 users ex. Gozi
  • 17. •  Mobile malware component that ZeuS entices users to load and run in their mobile devices. •  ZitMO (aka “ZeuS-in-the-Mobile”) / CitMO (Carberg) Mobile Malware http://www.infosecurity-magazine.com/view/29705/-zeus-malware- throws-36-million-lightning-bolt-across-europe
  • 18. Malware Vectors •  Malicious apps in App Store •  Vulnerabilities in software leveraged during normal user behavior (exploits) •  Malicious e-mail or attachment (“spear phishing”) •  Malicious web content (“drive by download”) •  Fewer vectors – absence of Flash Java
  • 20. Security Models: iOS vs. Android •  iOS –  Mandatory code signing by Apple –  Individual apps are sandboxed using mandatory access control (MAC) security –  Uses ASLR on sysbin and some apps –  Single app store to control publishing •  Android –  Can load new code at runtime –  Sandbox is flawed allowing an app to exploit the kernel –  Apps can have any permissions, require approval –  Many app stores (Google, Amazon, underground)
  • 21. Security Around The Delivery of the App •  Code Signing requires apps to be downloaded from the App Store •  Publishers’ real-world identities are verified by Apple •  Apps are reviewed by Apple before they are available in App Store •  Apple acts as an Anti-Virus for iOS
  • 22. Year in Review: Mobile Threatscape (*Source: F-Secure Mobile Threat Report Q4 2012)
  • 23. Jail breaking Devices •  sn0wbreeze, redsn0w, acidsn0w, jailbreakme, greenpoison •  Why? for functionality, more apps •  “Jailbreaking” or “rooting destroys the security model •  Jailbreaking techniques leave the device with a standard root password that may grant admin- level access •  Convenience at the sake of security
  • 24. Physical Attacks •  Latest proof of concept device attack – If physical access is ever gained, GAMEOVER. Source: BBC News, June 2013 http://www.bbc.co.uk/news/technology-22764815
  • 25.
  • 26. QR Codes •  QR codes surfacing containing malicious links •  First case confirmed by Kaspersky Labs last year - mobile malware used to send premium SMS messages http://siliconangle.com/blog/ 2011/10/21/infected-qr-malware- surfaces-on-smartphones-apps/
  • 27. Can you spot which one is EVIL?
  • 28. Think beyond. Go beyond. Securing the Channel
  • 29. Emerging Target •  Fraudsters target the largest bang for their buck – Currently represents online channel •  Perception is not necessarily Reality – but expect the mobile channel to present itself as a larger target as adoption increases
  • 30. Mobile Security •  Mobile banking presents a set of security risks [significantly] different than those for non-mobile online banking…NOT REALLY •  User authentication, transaction authorization, and data security in the mobile channel must be dealt with – Is it different than securing other channels?
  • 31. Device Security •  It is hard to design a security model which protects against programs a user downloads and wants to run •  It is typically not the job of the OS to prevent you from running the programs you choose to run •  Anti-Virus is designed to help decide which programs are okay to run and which are not
  • 32. •  Defense-in-depth Ø  “deep” or “elastic” •  Derived from a military strategy; requires that a defender deploy resources at and well behind the front line •  Reliance on any single control or mitigating factor is not sufficient •  Prevents shortfalls in any single defense control Building a Layered Security Model
  • 33. Consumer Focus Group: Computer Security
  • 34. Mobile Authentication •  Extend online security models – provides comprehensive, multi-layered security features for both you and your end users – FFIEC Guidance called out the mobile channel •  Out-of-band multi-factor authentication (MFA) •  Leveraging temporary access codes (TACs) •  Delivery via phone call, SMS, email •  Device registration using HTML5 cookies
  • 35. Out-of-Band 2F Will Replace Passwords Out-of-band two factor authentication is becoming more popular across consumer technologies replacing passwords
  • 36. It’s More Mainstream than you Realize
  • 37. Mobile Transaction Authorization •  Out-of-Band Transaction approval Direct from FFIEC’s June 2011 Guidance “Out-of-band authentication means that a transaction that is initiated via one delivery channel [e.g.. online] must be re- authenticated or verified via an independent delivery channel [e.g.. telephone] in order for the transaction to be completed”
  • 38. Leverage Alerts •  Users must play a part and participate in fighting fraud •  Real-time alerts delivered to a victim are timely and provide the opportunity to alert the financial institution of activity •  Transactional Alerting Ø  Ex: creation, authorization •  Changes to profile settings •  Security Event Alerts Ø  Ex: pwd changes, failed logon attempts
  • 39. Behavioral & Machine Learning Models Login Behavior Time of Login Location of Login Transaction Behavior Transaction Behavioral Models Dom/Intl Wire, ACH, Payroll, Ext Transfer, Transaction Policies Recipient Monitoring Modifications to templates Endpoint Interrogation User Agent Device ID Recognized Devices Score Yes or No Suspect or Normal
  • 40. Secure Development & Testing •  Develop with security at the foundation – Follow best practices, SDLC, etc. •  Intentionally limit app caching – Can perform app cache clearing during init •  HTML5 rendering performed client side – BLOB sent from server to client – Limits injection, XSS, other attacks
  • 41. Think beyond. Go beyond. Closing Remarks
  • 42. “The future ain’t what it used to be.” -  Lawrence “Yogi” Berra New York Yankees, 1946-1964 The Future
  • 43. Get Out in Front •  Ad-hoc approaches result in reactive decisions •  Disruptive changes present opportunities
  • 44. Q & A Declare var $response! ! if [?] >= ‘1’! ! !then! ! ! !$response = ‘answer’! ! !else ! ! ! !$response = ‘thankyou’! ! end if;!