Mobile Malware in the Wild Acknowledgement: Hiromu Enoki.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
7 Effective Habits when using the Internet Philip O’Kane 1.
Breaking Trust On The Internet
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Randomizing Smartphone Malware Profiles against Statistical Mining.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
William Enck, Machigar Ongtang, and Patrick McDaniel.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Presentation By Deepak Katta
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
1 UCR Know thy enemy: what do attackers want? Slide credits: some slides adapted from Lorenzo Cavallaro and others.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Introduction to Mobile Malware
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
IT security By Tilly Gerlack.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Dr.Web Mobile OEM Co-branding and OEM license renewal protection.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
What they are and how to protect against them
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
CYBER SECURITY...
Network security threats
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 1 Fundamentals of IT
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Cybersecurity Simplified: Ransomware
Presentation transcript:

Mobile Malware in the Wild Acknowledgement: Hiromu Enoki

Introduction Mobile Malware is fairly recent – July 2004 – Cabir virus came out on Symbian – August 2010 – Fake Player on Android – July 2012 – Find and Call on iOS Evolving rapidly – Amusement – Credential Theft – SMS spam – Ransomware

Introduction Sensitive personal information on mobile device – E‐mail, contacts, passwords… Root exploits and Jailbraking – Exploits used by both users and adversaries Any easy way of defending against malwares? – Permissions? – OS features? – App reviews?

Related Work Extensive research done on PC malwares Feasibility and profitability of mobile malware has been researched since 2004 – spam, Identity theft, DDoS, wiretapping werepredicted Malware on other mobile platforms

Background – Application Markets Apple App Store – All applications are reviewed by human – iOS devices can only obtain apps through here, unless jailbreaked Google Play (Android Market) – Some applications may be reviewed – Does not restrict installing apps from other markets Symbian Ovi – Security automatically reviewed by program – Risky applications are reviewed by human – Can install apps from other markets

Methodology Analyzed information about 46 malwares that spread between Jan – June 2011 – 4 – iOS – 24 – Symbian – 18 – Android Information from anti‐virus companies and newssources Omitted spyware and grayware

Methodology Analyzed permissions of 11 Android malwares – Categorized and counted how many permissions they require – Attempted to determine malware from permission requests Researched on 6 Android devices of root exploits – Compared firmware release dates with root hack information on xda‐developers

Results

Novelty and Amusement Minor damage – Changing wallpapers, sending annoying SMS A preliminary type of malware – Expected to decrease in number

Selling User Information Personal information obtained via API calls – Location, contacts, history, IMEI Information can be sold for advertisement – $1.90 to $9.50 per user per month IMEI information can be used to spoof blacklisted phones

Stealing User Credentials Malwares can intercept SMS to circumvent two-factor authentication – Done in conjunction with phishing on desktops Keylogging and scanning documents for passwords Application sandboxing prevents most of these

Premium‐Rate Calls and SMS Premium‐rate calls and SMS directly benefits adversaries – Few dollars per minute or SMS 24 of the 46 malwares send these – Mostly on Android and Symbian iOS avoids this by always showing Confirmation for outgoing SMS messages

SMS Spam Distributing spam origin makes blocking harder Less noticeable when having unlimited SMS Phone numbers are more “reliable” than e‐mail Can be prevented by enforcing SMS to be sent from a designated confirmation window

Search Engine Optimization (SEO) Clicks on a certain link on a search query to increase visibility Phishing websites use this technique, along with desktop malware Can be prevented with affixing an application unique tag on the HTTP request – Privacy concerns?

Ransomware Kenzero – Japanese virus included in pornographic games distributed on the P2P network – Asked for Name, Address, Company Name for “registration” of software – Asked 5800 Yen (~$60) to delete information from website (Paper information is wrong) – About 661 out of 5510 infections actually paid (12%) Not many Ransom malwares on mobile yet….

Possible Future Malware Types Advertising Click Fraud Invasive Advertising (AirPush) In‐Application Billing Fraud Government spying E‐mail Spam DDoS NFC and Credit Cards

Android Malware Permissions 8 out of 11 malwares request to send SMS (73%) – Only 4% of non‐malicious apps ask for this READ_PHONE_STATE is used by 8/11 malwares – Only 33% for non‐malicious apps Malware asks on average 6.18 dangerous permissions – 3.46 for Non‐malicious apps

Root Exploits Rooting allows higher level of customization – Installing from unofficial markets – System Backups – Tethering – Uninstalling apps However, malwares can take advantage of root commands to obtain permissions

Root Exploits Root exploits available for 74% of device lifetime Malware authors do not need to investigate them, but the community does

Conclusion Mobile malware rapidly grew in number Profitability is the current trend for malwares Defense against mobile malware requires more research Human review are effective methods to prevent malware Rooting benefits both users and malware producers

References A survey of mobile malware in the wild Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner. in Proc. SPSM World’s First Android Virus, Nikkei ITPro, 6/351137/ 6/351137/ Bluetooth‐Worm:SymbOS/Cabir, F‐Secure Threat Description,

References Find and Call: Leak and Spam, Securelist, Kenzero: 40 times more successful than traditional spoofs, _ html AirPush : la publicité dans les notifications quiressemble à du malware, irpush‐la‐publicite‐dans‐les‐notifications‐qui‐resse mblea‐du‐malware