F-Secure: Mobile malware monetization

  • 1,259 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,259
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
0
Comments
0
Likes
3

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Mobile Malware Monetization Protecting the irreplaceable | f-secure.com
  • 2. September © F-Secure / Confidential 2 28, 2010
  • 3. September © F-Secure / Confidential 5 28, 2010
  • 4. Smartphone market shares in 2009 Others Windows Mobile 4% 7% Apple 14% iOS Microsoft 7% Symbian 15 % 40 % Symbian BlackBerry Android Android 16 % RIM1 iOS BlackBerry 9% Windows Mobile 18 % Others Data source: Canalys
  • 5. vs vs • Nokia: invisible • Apple: very visible • Nokia predicted to sell 107 Million smartphones in 2010 • Apple predicted to sell 41 Million smartphones in 2010 • Android in total predicted to sell 47 Million smartphones in 2010
  • 6. Mobile Security - Where are we today? • First mobile malware found in 2004 • Now: 517 viruses, worms and trojans for mobile platforms • Targeting the most common platforms • No exploit-based malware, yet • Real problems elsewhere • Lost, broken or stolen phones • So: A success story!
  • 7. Problems will stay on Windows until mobile malware authors get this • 28 September, 2010 PC provides existing infra for monetization •Information is easily available •Ready made exploit kits •Existing proven models to make money •There is plenty from where mobile malware authors can learn from
  • 8. It’s All About Money • There are already serious attempts to make money with mobile malware • So far guys doing this are amateurs • That’s going to change when some of them strike gold • Monetization methods we have seen so far • Premium SMS messages • Premium voice calls • Subscription scams • Banking attacks • Ransomware • Fake applications 15 September 28, 2010
  • 9. Premium SMS senders • Premium SMS sending trojans are the most common mobile malware • Typically these trojans are either minimal applications with simple social engineering UI, or trojanized versions of clean apps or games • As premium SMS works only in one country, these trojans are highly localized • Most have that we know of operate in Russia • Typically trojans are spread with rudimentary social engineering • As ICQ messages with download/install link • Vkontakte (Russian equivalent of facebook) • SEO spam • SMS spam 16 September 28, 2010
  • 10. Fakeplayer SMS trojan • Fakeplayer.A and .B are android trojans that pretend to be media player application • On installation Android will ask for permissions that include sending SMS messages • Unfortunately just about every Android app asks for a ton of permissions so user will see anything out of place • When application is run it displays Russian text which translates as "Wait, sought access to video library..“ • Fakeplayer.B has been spread with SEO techniques targeting on porn related searches [1] 17 September 28, 2010
  • 11. Premium Rate Call Trojans • Premium rate SMS numbers work only in one country, which limits victims • What malware authors want is international monetizing methods • Too bad, there is one already available, and is being used by some authors • “International premium” rate numbers work from anywhere in the world • They work by user registering a number from premium rate operators • After this all calls to this number are treated as international billing from which the owner of the number will get a cut from a phone call • What actually happens that call is routed locally, but charge is international level • Unlike premium SMS messages or other services, there is no way to block this unless user blocks international phone calls • Of course the billing operators are not at fault, from their point of view malware authors are abusing their services 18 September 28, 2010
  • 12. "Short Stopping" / "Long Lining" Nevada – Somalia: $2.55 / minute Nevada – Florida: $0.03 / minute Call Terminations
  • 13. The numbers • +882346077 Antarctica • +17675033611 Dominican republic • +88213213214 EMSAT satellite prefix • +25240221601 Somalia • +2392283261 São Tomé and Príncipe • +881842011123 Globalstar satellite prefix
  • 14. User Is Helpless Against “International” Numbers • How do you figure out how much such a number costs you? • How do you figure out who owns the number? • Where do you complain to? • How do you get such a number shut down? • How you can block these numbers without preventing international calls?
  • 15. Windows SMS and premium call trojans • Used to be popular with modems, two known modern cases • Using a GPRS USB dongle modem to send SMS messages • It would be trivial so send SMS messages or make calls using BT enabled phone paired with PC • Nokia PC suite offers easy interface for SMS sending and calls • Using telephony capabilities to milk more money from user might be next botnet standard feature
  • 16. Premium Rate Subscription Scams • Premium rate subscription scams work by getting victim subscribed to service without them noticing and then starting to bill for services • Typically these scams work by fooling victim in one time transaction • Victim thinks that he is ordering ringtone or joining a lottery • While he actually is subscribed to service that bills until terminated • Alternative method uses WAP push to make scam easier • User is sent WAP push link with some social engineering pretext • If user clicks the link, he will get typical mobile ad page • But on the same time server gets his MSIDN and subscribes the victim 32 September 28, 2010
  • 17. Premium Rate Service Scams As Facebook Spam • We used to see premium rate scams mostly in SMS • But now at least one operator affiliate is using facebook • Clicking link leads to premium rate ad page by wixawin.com • Wixawin displays prices and subscription information • But less honest players are soon to follow • Now that using FB spam is upfront and honest by itself 33 September 28, 2010
  • 18. Ikee.B First Attempt At Banking Trojan • Ikee.A iPhone worm was relatively harmless malware that only spread • However Ikee.B was created by different author for financial gain [2] • Upon infection Ikee.B contacted control server to download payload • Which modified /etc/hosts to point Dutch ING bank site to server in Japan • Compromized site is small flower shop in Japan • Dutch ING uses SMS TAN codes • So Ikee.B forwarded SMS messages containing TAN to HTTP server 34 September 28, 2010 © F-Secure Confidential
  • 19. First Mobile Ransomware • SSH default password in unlocked iPhones was also used for first attempt at ransomware • A Dutch teenager used the hole to break into number of vulnerable phones and changed lock icon to display ransom message [3] • Site displayed at ransom message asked $4.95 for cleanup instructions • So far we not seen other phone ransom attempts • However we have met PC ransomware that uses SMS messages as payment message for unlock code 37 September 28, 2010
  • 20. Fake Applications • Fake applications are not malware • They are apps that have no functionality but are sold for low enough amount that people don’t bother to complain • Fake banking applications claim to provide mobile banking for given bank • When executed they launch that banks own site in browser • However they could have been easily used for phishing or banker trojan attack • People actually bought these and tried to use them for banking • Scary .
  • 21. Banks targeted by "09droid" Abbey Bank LloydsTSB Alaska USA FCU M&I Alliance & Leicester (v. 1.1) Mechanics Bank v.1.1 MFFCU v.1.1 Bank Atlantic Midwest Bank of America Nationwide (v. 1.1) Bank of Queensland NatWest (v. 1.1) Barclaycard (v. 1.1) Navy Federal Credit Union (v. 1.1) Barclays Bank (v. 1.2) PNC Royal Bank of Canada BB&T RBS v.1.1 Chase SunTrust City Bank Texas TD Bank v.1.1 Commerce Bank US Bank v.1.2 Compass Bank USAA v.1.1 Valley Credit Union Deutsche Bank Wachovia Corp (v. 1.2) Fifty Third Bank v.1.1 Wells Fargo (v. 1.1) First Republic Bank v.1.1 Great Florida Bank
  • 22. What’s Going To Happen Next? • Now as some malware authors have made money, blood is in the water • Most likely authors are going to switch from premium SMS to premium calls • Next question is that how bad this is going to get • PC malware explosion started in 2004 when first malware got profit • It is very likely that we are going to see a lot more activity in mobile front • Already now in 2010 most of the mobile malware is profit motivated • And we are going to see a lot more of it 40 September 28, 2010
  • 23. Sources • [1] http://www.securelist.com/en/blog/2286/Android_SMS_Trojan_Now_Being_Delivered_via_SEO_Techniques • [2] http://www.f-secure.com/v-descs/worm_iphoneos_ikee_b.shtml • [3] http://www.zdnet.com/blog/security/ihacked-jailbroken-iphones-compromised-5-ransom-demanded/4805 42 September 28, 2010 © F-Secure Confidential