SlideShare ist ein Scribd-Unternehmen logo
1 von 46
The App Does THAT?! Mobile Application Security Risk & Mitigation
Agenda Background Attacker Motivation Malicious Mobile Applications In The Wild Mobile Security Mechanisms Potential Effects of Behaviors Detecting Malicious Mobile Applications Mitigation
Background
Presenter Background Currently Sr. Security Researcher, Veracode, Inc. Previously Security Consultant - Symantec Security Consultant - @Stake Incident Response and Forensics Handler Wishes He Was Infinitely rich Able to leap tall buildings in a single bound Smarter than the average bear
Malicious Mobile Applications Often includes modifications to legitimate programs designed to compromise the device or device data Often inserted by those who have legitimate access to source code or distribution binaries May be intentional or inadvertent Not specific to any particular programming language Not specific to any particular mobile Operating System
Attacker Motivation
Attacker Motivation Practical method of compromise for many systems Let the users install your backdoor on systems you have no access to Looks like legitimate software so may bypass mobile AV Retrieve and manipulate valuable private data  Looks like legitimate application traffic so little risk of detection For high value targets such as financial services and government it becomes cost effective and more reliable High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture. They may seek to implant vulnerability for later exploitation Think “Aurora” for Mobile Devices
Back To The Future
Back To The Future IS THIS 1999?!
Malicious Mobile Applications In The Wild
FlexiSpy http://www.flexispy.com $149 - $350 PER YEAR depending on features Features Remote Listening C&C Over SMS SMS and Email Logging Call History Logging Location Tracking Call Interception GPS Tracking Symbian, Blackberry, Windows Mobile Supported
FlexiSpy Web Site Quotes “Download FlexiSPYspyphone software directly onto a mobile phone and receive copies of SMS, Call Logs, Emails, Locations and listen to conversations within minutes of purchase. “ “Catch cheating wives or cheating husbands, stop employee espionage, protect children, make automatic backups, bug meetings rooms etc.” “F Secure seem to think that its ok for them to interfere with legitimate, legal and accountable software. Who appointed them judge, jury and executioner anyway, and why wont they answer our emails, so we have to ask who is the real malware? Here is how to remove FSecure malware from your device. Please don't believe the fsecure fear mongers who simply wish you to buy their products.”
Mobile Spy http://www.mobile-spy.com $49.97 PER QUARTER or $99.97 PER YEAR Features SMS Logging Call Logging GPS Logging Web URL Logging BlackBerry, iPhone (Jailbroken Only), Android, Windows Mobile or Symbian
Mobile Spy Web Site Quotes “This high-tech spy software will allow you to see exactly what they do while you are away. Are your kids texting while driving or using the phone in all hours of the night? Are your employees sending company secrets? Do they erase their phone logs?” “Our software is not for use on a phone you do not own or have proper permission to monitor from the user or owner. You must always follow all applicable laws and regulations in your region.” “Purchased by more than 30,000 customers in over 150 countries”
Etisalat (SS8) Cell carrier in United Arab Emirates (UAE) Pushed via SMS as “software patch” for Blackberry smartphones Upgrade urged to “enhance performance” of Blackberry service Blackberry PIN messaging as C&C Sets FLAG_HIDDEN bit to true Interception of outbound email / SMS only Discovered due to flooded listener server cause retries that drained batteries of affected devices Accidentally released the .jar as well as the .cod (ooopsie?!)
Storm8 Phone Number Farming iMobsters and Vampires Live  (and others) “Storm8 has written the software for all its games in such a way that it automatically accesses, collects, and transmits the wireless telephone number of each iPhone user who downloads any Storm8 game," the suit alleges. " ... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed." “Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.” These were available via the iTunes App Store! http://www.boingboing.net/2009/11/05/iphone-game-dev-accu.html
Symbian Sexy Space Poses as legitimate server ACSServer.exe  Calls itself 'Sexy Space‘ Steals phone and network information Exfiltrates data via hacker owned web site connection Can SPAM contact list members Basically a “botnet” for mobile phones Signing process Anti-virus scan using F-Secure Approx 43% proactive detection rate (PCWorld) Random selection of inbound manually assessed Symbian signed this binary as safe! http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm
SymbianMergoSMS The worm spreads as self-signed (untrusted) SIS installers  Installer contains sub-SIS installers some of them signed by Symbian. Spreads by sending text messages  Contain variable messages in Chinese and a link to a website Going to link results in worm download On phone reboot malware runs, downloads worm payload, completing infection The worm was spread on Chinese file sharing web sites Originally spread as games, themes, etc. for Symbian Series60 3rd & 5th edition phones. http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml
09Droid – Banking Applications Attack Droid app that masquerades as any number of different target banking applications Target banks included Royal Bank of Canada Chase BB&T SunTrust Over 50 total financial institutions were affected May steal and exfiltrate banking credentials Approved and downloaded from Google’s Android Marketplace! http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps-market  http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953  http://www.f-secure.com/weblog/archives/00001852.html
3D Anti-Terrorist  / PDA Poker Art / Codec Pack WM1.0 Games available on legitimate application download sites Originally written by Chinese company Huike Repackaged in Russia by unknown authors to include malware Calls premium rate 800 numbers Three days idle before first dial Idles one month between subsequent outbound dialing Distributed via common Windows Mobile shareware sites http://www.eweek.com/c/a/Security/Malware-Hidden-in-Windows-Mobile-Applications-424076/
Mobile Security Mechanisms
Common Mobile Security Mechanisms ,[object Object]
Applied at the corporate IT level
Can’t be modified by a lower level security mechanism
Applicationlevel security policies
May be pushed down from corporate policy
Otherwise applied at handset itself
Restricts access to specific resources,[object Object]
Implemented at the handset itself
Fails due to the same reasons PC antivirus is failing today
Applicationmarket place security screening
Applied by the marketplace owner
Currently opaque and ill defined
Misplaced trust already acquired,[object Object]
Blackberry IT Policies Requires connection to Blackberry Enterprise Server (BES) Supersedes lower levels of security restrictions Can prevent devices from downloading third-party applications over wireless Prevent installation of specific third-party applications Control permissions of third party applications Allow Internal Connections Allow Third-Party Apps to Use Serial Port Allow External Connections MOSTLY “Default Allow All” policy for BES and non-BES devices
Blackberry Application Policies Can be controlled at the BES If no BES present, controls are set on the handheld itself Can only be MORE restrictive than the IT policy, never less Control individual resource access per application Control individual connection access per application MOSTLY “Default Allow All” policy for BES and non-BES devices
V4.7.0.148  Default 3rd Party Application Permissions
V5.0.0.328 Default 3rd Party Application Permissions
V5.0.0.328 Trusted 3rd Party Application Permissions
Potential Effects and Behaviors
Installation Methods Accessing a web site using the mobile browser and choosing to download the application over the network (OTA Installation) Running the application loader tool on the desktop system and choosing to download the application onto the device using a physical connection to the computer  Using enterprise management solutions to push the application to the entire user community Get it into the global application marketplace and let the user choose to install it for you!
Logging and Dumping

Weitere Àhnliche Inhalte

Was ist angesagt?

Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
Tyler Shields
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek
 
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐčSECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
SECON
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
STO STRATEGY
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
CODE BLUE
 

Was ist angesagt? (20)

Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐčSECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
SECON'2017, Đ§Đ”ĐŒŃ‘Ń€ĐșĐžĐœ мроĐč, Đ‘Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚ŃŒ ĐŽĐ°ĐœĐœŃ‹Ń… ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 

Andere mochten auch

Prop agenda saneam
Prop agenda saneamProp agenda saneam
Prop agenda saneam
Vilanculo
 
Doc1
Doc1Doc1
Doc1
nongja20
 
HEHD 801 Final Exam Reflections
HEHD 801 Final Exam ReflectionsHEHD 801 Final Exam Reflections
HEHD 801 Final Exam Reflections
SaMaria Hughes
 
Qué es la netiqueta
Qué es la netiquetaQué es la netiqueta
Qué es la netiqueta
Logan RM
 
Speerpunten voor de toekomst vrijwillige inzet
Speerpunten voor de toekomst vrijwillige inzetSpeerpunten voor de toekomst vrijwillige inzet
Speerpunten voor de toekomst vrijwillige inzet
svwo/Arcon
 
Chris REU poster_draft
Chris REU poster_draftChris REU poster_draft
Chris REU poster_draft
christian olsen
 
Los seres vivos pancho y mili
Los seres vivos   pancho y miliLos seres vivos   pancho y mili
Los seres vivos pancho y mili
Claudia Poza
 
CILT Presentation
CILT PresentationCILT Presentation
CILT Presentation
CILT Egypt
 
Los seres vivos y sus relaciones terminado charo fortuna
Los seres vivos y sus relaciones terminado charo fortunaLos seres vivos y sus relaciones terminado charo fortuna
Los seres vivos y sus relaciones terminado charo fortuna
Claudia Poza
 
VĂ i bĂ­ quyĂȘt
VĂ i bĂ­ quyĂȘtVĂ i bĂ­ quyĂȘt
VĂ i bĂ­ quyĂȘt
Ha Hoa
 
Personal Philosophy
Personal PhilosophyPersonal Philosophy
Personal Philosophy
SaMaria Hughes
 

Andere mochten auch (20)

High sensitive blind stick
High sensitive blind stickHigh sensitive blind stick
High sensitive blind stick
 
Prop agenda saneam
Prop agenda saneamProp agenda saneam
Prop agenda saneam
 
CĂŽng ty sá»± kiện dịch vỄ cung cáș„p MC, BB, BG, ca sÄ©, diễn viĂȘn chuyĂȘn nghiệp n...
CĂŽng ty sá»± kiện dịch vỄ cung cáș„p MC, BB, BG, ca sÄ©, diễn viĂȘn chuyĂȘn nghiệp n...CĂŽng ty sá»± kiện dịch vỄ cung cáș„p MC, BB, BG, ca sÄ©, diễn viĂȘn chuyĂȘn nghiệp n...
CĂŽng ty sá»± kiện dịch vỄ cung cáș„p MC, BB, BG, ca sÄ©, diễn viĂȘn chuyĂȘn nghiệp n...
 
Doc1
Doc1Doc1
Doc1
 
HEHD 801 Final Exam Reflections
HEHD 801 Final Exam ReflectionsHEHD 801 Final Exam Reflections
HEHD 801 Final Exam Reflections
 
CV
CVCV
CV
 
Qué es la netiqueta
Qué es la netiquetaQué es la netiqueta
Qué es la netiqueta
 
Presentacion eventpadel
Presentacion eventpadelPresentacion eventpadel
Presentacion eventpadel
 
Speerpunten voor de toekomst vrijwillige inzet
Speerpunten voor de toekomst vrijwillige inzetSpeerpunten voor de toekomst vrijwillige inzet
Speerpunten voor de toekomst vrijwillige inzet
 
Excel certificate
Excel certificateExcel certificate
Excel certificate
 
A pérola
A pérolaA pérola
A pérola
 
Chris REU poster_draft
Chris REU poster_draftChris REU poster_draft
Chris REU poster_draft
 
Los seres vivos pancho y mili
Los seres vivos   pancho y miliLos seres vivos   pancho y mili
Los seres vivos pancho y mili
 
CILT Presentation
CILT PresentationCILT Presentation
CILT Presentation
 
Athlete Proposal
Athlete ProposalAthlete Proposal
Athlete Proposal
 
Los seres vivos y sus relaciones terminado charo fortuna
Los seres vivos y sus relaciones terminado charo fortunaLos seres vivos y sus relaciones terminado charo fortuna
Los seres vivos y sus relaciones terminado charo fortuna
 
Poultry: Contamination, Preservation and Spoilage
Poultry: Contamination, Preservation and SpoilagePoultry: Contamination, Preservation and Spoilage
Poultry: Contamination, Preservation and Spoilage
 
Upadek Drukowanego Newsweeka - M Olejnik
Upadek Drukowanego Newsweeka - M OlejnikUpadek Drukowanego Newsweeka - M Olejnik
Upadek Drukowanego Newsweeka - M Olejnik
 
VĂ i bĂ­ quyĂȘt
VĂ i bĂ­ quyĂȘtVĂ i bĂ­ quyĂȘt
VĂ i bĂ­ quyĂȘt
 
Personal Philosophy
Personal PhilosophyPersonal Philosophy
Personal Philosophy
 

Ähnlich wie IQT 2010 - The App Does That!?

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
Eric Zhuo
 

Ähnlich wie IQT 2010 - The App Does That!? (20)

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 

Mehr von Tyler Shields

United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Tyler Shields
 
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Tyler Shields
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Tyler Shields
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
Tyler Shields
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Tyler Shields
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
Tyler Shields
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Tyler Shields
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers View
Tyler Shields
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
Tyler Shields
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More Problems
Tyler Shields
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
Tyler Shields
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
Tyler Shields
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
Tyler Shields
 

Mehr von Tyler Shields (20)

The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Avoiding the Pandora Pitfall
Avoiding the Pandora PitfallAvoiding the Pandora Pitfall
Avoiding the Pandora Pitfall
 
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
 
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers View
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More Problems
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
 

KĂŒrzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂŒrzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

IQT 2010 - The App Does That!?

  • 1. The App Does THAT?! Mobile Application Security Risk & Mitigation
  • 2. Agenda Background Attacker Motivation Malicious Mobile Applications In The Wild Mobile Security Mechanisms Potential Effects of Behaviors Detecting Malicious Mobile Applications Mitigation
  • 4. Presenter Background Currently Sr. Security Researcher, Veracode, Inc. Previously Security Consultant - Symantec Security Consultant - @Stake Incident Response and Forensics Handler Wishes He Was Infinitely rich Able to leap tall buildings in a single bound Smarter than the average bear
  • 5. Malicious Mobile Applications Often includes modifications to legitimate programs designed to compromise the device or device data Often inserted by those who have legitimate access to source code or distribution binaries May be intentional or inadvertent Not specific to any particular programming language Not specific to any particular mobile Operating System
  • 7. Attacker Motivation Practical method of compromise for many systems Let the users install your backdoor on systems you have no access to Looks like legitimate software so may bypass mobile AV Retrieve and manipulate valuable private data Looks like legitimate application traffic so little risk of detection For high value targets such as financial services and government it becomes cost effective and more reliable High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture. They may seek to implant vulnerability for later exploitation Think “Aurora” for Mobile Devices
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Back To The Future
  • 13. Back To The Future IS THIS 1999?!
  • 15. FlexiSpy http://www.flexispy.com $149 - $350 PER YEAR depending on features Features Remote Listening C&C Over SMS SMS and Email Logging Call History Logging Location Tracking Call Interception GPS Tracking Symbian, Blackberry, Windows Mobile Supported
  • 16. FlexiSpy Web Site Quotes “Download FlexiSPYspyphone software directly onto a mobile phone and receive copies of SMS, Call Logs, Emails, Locations and listen to conversations within minutes of purchase. “ “Catch cheating wives or cheating husbands, stop employee espionage, protect children, make automatic backups, bug meetings rooms etc.” “F Secure seem to think that its ok for them to interfere with legitimate, legal and accountable software. Who appointed them judge, jury and executioner anyway, and why wont they answer our emails, so we have to ask who is the real malware? Here is how to remove FSecure malware from your device. Please don't believe the fsecure fear mongers who simply wish you to buy their products.”
  • 17. Mobile Spy http://www.mobile-spy.com $49.97 PER QUARTER or $99.97 PER YEAR Features SMS Logging Call Logging GPS Logging Web URL Logging BlackBerry, iPhone (Jailbroken Only), Android, Windows Mobile or Symbian
  • 18. Mobile Spy Web Site Quotes “This high-tech spy software will allow you to see exactly what they do while you are away. Are your kids texting while driving or using the phone in all hours of the night? Are your employees sending company secrets? Do they erase their phone logs?” “Our software is not for use on a phone you do not own or have proper permission to monitor from the user or owner. You must always follow all applicable laws and regulations in your region.” “Purchased by more than 30,000 customers in over 150 countries”
  • 19. Etisalat (SS8) Cell carrier in United Arab Emirates (UAE) Pushed via SMS as “software patch” for Blackberry smartphones Upgrade urged to “enhance performance” of Blackberry service Blackberry PIN messaging as C&C Sets FLAG_HIDDEN bit to true Interception of outbound email / SMS only Discovered due to flooded listener server cause retries that drained batteries of affected devices Accidentally released the .jar as well as the .cod (ooopsie?!)
  • 20. Storm8 Phone Number Farming iMobsters and Vampires Live (and others) “Storm8 has written the software for all its games in such a way that it automatically accesses, collects, and transmits the wireless telephone number of each iPhone user who downloads any Storm8 game," the suit alleges. " ... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed." “Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.” These were available via the iTunes App Store! http://www.boingboing.net/2009/11/05/iphone-game-dev-accu.html
  • 21. Symbian Sexy Space Poses as legitimate server ACSServer.exe Calls itself 'Sexy Space‘ Steals phone and network information Exfiltrates data via hacker owned web site connection Can SPAM contact list members Basically a “botnet” for mobile phones Signing process Anti-virus scan using F-Secure Approx 43% proactive detection rate (PCWorld) Random selection of inbound manually assessed Symbian signed this binary as safe! http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm
  • 22. SymbianMergoSMS The worm spreads as self-signed (untrusted) SIS installers Installer contains sub-SIS installers some of them signed by Symbian. Spreads by sending text messages Contain variable messages in Chinese and a link to a website Going to link results in worm download On phone reboot malware runs, downloads worm payload, completing infection The worm was spread on Chinese file sharing web sites Originally spread as games, themes, etc. for Symbian Series60 3rd & 5th edition phones. http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml
  • 23. 09Droid – Banking Applications Attack Droid app that masquerades as any number of different target banking applications Target banks included Royal Bank of Canada Chase BB&T SunTrust Over 50 total financial institutions were affected May steal and exfiltrate banking credentials Approved and downloaded from Google’s Android Marketplace! http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps-market http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953 http://www.f-secure.com/weblog/archives/00001852.html
  • 24. 3D Anti-Terrorist / PDA Poker Art / Codec Pack WM1.0 Games available on legitimate application download sites Originally written by Chinese company Huike Repackaged in Russia by unknown authors to include malware Calls premium rate 800 numbers Three days idle before first dial Idles one month between subsequent outbound dialing Distributed via common Windows Mobile shareware sites http://www.eweek.com/c/a/Security/Malware-Hidden-in-Windows-Mobile-Applications-424076/
  • 26.
  • 27. Applied at the corporate IT level
  • 28. Can’t be modified by a lower level security mechanism
  • 30. May be pushed down from corporate policy
  • 31. Otherwise applied at handset itself
  • 32.
  • 33. Implemented at the handset itself
  • 34. Fails due to the same reasons PC antivirus is failing today
  • 36. Applied by the marketplace owner
  • 37. Currently opaque and ill defined
  • 38.
  • 39. Blackberry IT Policies Requires connection to Blackberry Enterprise Server (BES) Supersedes lower levels of security restrictions Can prevent devices from downloading third-party applications over wireless Prevent installation of specific third-party applications Control permissions of third party applications Allow Internal Connections Allow Third-Party Apps to Use Serial Port Allow External Connections MOSTLY “Default Allow All” policy for BES and non-BES devices
  • 40. Blackberry Application Policies Can be controlled at the BES If no BES present, controls are set on the handheld itself Can only be MORE restrictive than the IT policy, never less Control individual resource access per application Control individual connection access per application MOSTLY “Default Allow All” policy for BES and non-BES devices
  • 41. V4.7.0.148 Default 3rd Party Application Permissions
  • 42. V5.0.0.328 Default 3rd Party Application Permissions
  • 43. V5.0.0.328 Trusted 3rd Party Application Permissions
  • 45. Installation Methods Accessing a web site using the mobile browser and choosing to download the application over the network (OTA Installation) Running the application loader tool on the desktop system and choosing to download the application onto the device using a physical connection to the computer Using enterprise management solutions to push the application to the entire user community Get it into the global application marketplace and let the user choose to install it for you!
  • 48. Technical Methods Data Dumpers Listeners Exfiltration Methods Command and Control
  • 49. Command and Control Channels initCandC(int a) Initializes inbound SMS listener if passed a == 1 Kills spyware otherwise Listens for commands and acts accordingly
  • 51. Detecting Malicious Mobile Code Signature Based Detection This is how the current anti-virus world is failing Requires “known” signatures for detection Too reactive Resource Usage White Listing Require individual configuration and white listing of resources Make it fine grained enough to be effective Balancing act resulting in user complaints about ease of use
  • 52. Detecting Malicious Mobile Code Sandbox Based Execution Heuristics Run the application and detect malicious activity Requires execution in a sandbox and is reactive Can’t ensure complete execution Static Decompilation and Analysis Enumeration of sources of sensitive taint and exfiltration sinks Control/Data flow mapping for tracing sensitive taint from source to sink Compare findings against expected values
  • 53. Defense in Depth Do all of the above! Implement and enforce strong IT policies Implement and enforce additional application policies as required Implement a best of breed anti-virus solution If only for thoroughness of deployed options Utilize static decompilation and analysis of applications considered for deployment
  • 55. Conclusion We are currently trusting the vendor application store provider for the majority of our mobile device security Minimal methods of real time eradication or detection of spyware type activities exists When the do exist they are not configured correctly (or at all) No easy/automated way to confirm for ourselves what the applications are actually doing Automate the decompilation and static analysis of applications that are required for the ongoing functioning of your business

Hinweis der Redaktion

  1. Why is the mobile arena the future attack model?Units sold by operating system year over year.Mobile device (smartphone specifically) is growing rapidly over the last yearThe quantity of smartphones in use is increasing
  2. Units sold by market growth year over year.A few specific operating systems are crushing the competitionHomogenous environment is coming (1-2 winners, 3 at most)
  3. The race to win the app warThe marketplaces are trying to be the largest and have the most apps availableiPhone is clearly winning this raceIf there was a single target for spyware in the app store, iTunes would be itNeedle in a haystack
  4. Steep increase in the number of applications sold in the last year and a half. Significant growth rates that only demonstrate continued upticks