30
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO [email protected] twitter.com/ LacoonSecurity

A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO [email protected] twitter.com/LacoonSecurity

Embed Size (px)

Citation preview

Page 1: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

A Comprehensive Guide to Mobile Targeted Attacks(and What Can You Do About It)Ohad Bobrov, [email protected]

twitter.com/LacoonSecurity

Page 2: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

• The collapse of the perimeter

• Why mobile devices are targeted

• Mobile Remote Access Trojans (mRATs)

• Demo

• Infection vectors

• Detection, remediation, and building a secure BYOD / HYOD architecture

Agenda

Page 3: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

• Protecting organizations from mobile threats

• HQ SF, USA. R&D Israel

• Cutting edge mobile security research team

• Protecting tier-1 financial, manufacturing, legal and defense organizations

About Lacoon Mobile Security

Page 4: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

The Collapse Of The Corporate Perimeter

> 2011

Page 5: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

TARGETED MOBILE THREATS

Page 6: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Why To Hack Mobile Device?

Eavesdropping

Extracting contact lists, call &text logs

Tracking location

Infiltrating internal LANs

Snooping on corporate emails and application data

Page 7: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

The Mobile ThreatscapeB

usin

ess I

mp

act

Complexity

Consumer-oriented. Mass.Financially motivated, e.g.:Premium SMSFraudulent chargesBotnets

Targeted:PersonalOrganizationCyber espionage

Mobile Malware Apps

mRATs / Spyphones

Page 8: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

The Mobile Threatscape

mRATs / Spyphones

High End: Government / Military grade

Mid Range: Cybercrime toolkits

Low End: Commercial surveillance toolkits

Page 9: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

HIGH END:GOV / MIL mRATs

Page 10: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

FinSpy – Mobile

Extracted from: http://wikileaks.org/spyfiles/docs/gamma/291_remote-monitoring-and-infection-solutions-finspy-mobile.html

Page 11: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

MID: CYBERCRIME TOOLKITS

Page 12: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Recent High-Profiled Examples

Page 13: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

LOWER END:COMMERCIAL

SURVEILLANCE TOOLKITS

Page 14: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Commercial Mobile Surveillance Tool (Spyphone)

Page 15: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Commercial Mobile Surveillance Tools:A Comparison

Page 16: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Varying Costs, Similar Results

Capability FlexiSpy AndroRAT FinFisher

Real-time listening on to phone calls

+ + +

Surround recording + + +

Location tracking (GPS) + + +

Retrieval of text + + +

Retrieval of emails + + +

Invisible to the user + + +

SMS C&C fallback + + +

Infection vector Physical Repackage Exploit?

Cost $279 Free €287,000

Activation screen + - -

Page 17: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

STATISTICS

Page 18: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Data sample1 GB traffic sample of spyphone targeted traffic, collected over a 2-day period.

Collected from a channel serving ~650K subscribers

Traffic constrained to communications to selected malicious IP address

CommunicationsTraffic included both encrypted and non-encrypted content

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 19: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Survey: Cellular Network 2M Subscribers Sampling: 650K

Infection rates:

June 2013:

1 / 1000 devices

Page 20: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 21: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

DEMO

Page 22: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

INFECTION VECTORS

Page 23: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Infection Vectors - Android

Page 24: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Current SecurityStatus

Page 25: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Current Solutions – FAIL to Protect

Page 26: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Mitigation: Current Controls

Mobile Device Management (MDM)

Multi-Persona

Wrapper

Active Sync

NAC

Page 27: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Mitigation: Current Controls

Mobile Device Management (MDM)

Multi-Persona

Wrapper

Active Sync

NAC

Page 28: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Detection: Adding Behavior-based Risk

Malware Analysis

Threat Intelligence

Vulnerability Research

Application

Behavioral AnalysisDevice

Behavioral Analysis

Vulnerability

Assessment

Page 29: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Lacoon Solution

Page 30: A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO ohadl@lacoon.com twitter.com/LacoonSecurity

Thank You.

Ohad Bobrov , CTOLacoon Security Inc.

[email protected]

twitter.com/LacoonSecurity