cellphone virus and security

2,109 views
2,005 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,109
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
215
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

cellphone virus and security

  1. 1. CELLPHONE VIRUS AND SECURITY By R.Sindu Sree
  2. 2. INTRODUCTION
  3. 3. Smart Phone Growth <ul><li>The day when everyone has a PC in their pocket has arrived – </li></ul><ul><li>Three things driving growth – </li></ul><ul><ul><li>Increasing amount of time we spend online </li></ul></ul><ul><ul><li>Instant gratification </li></ul></ul><ul><ul><li>Lifestyle patterns and social networking </li></ul></ul>
  4. 4. Smart Phones ‘R Pocket Computers <ul><li>Most commonly used phones, as defined by operating system (OS) – </li></ul><ul><ul><li>Android (Android OS) </li></ul></ul><ul><ul><li>BlackBerry (RIM OS) </li></ul></ul><ul><ul><li>iPhones / iPod touch (iPhone OS) </li></ul></ul><ul><ul><li>PalmPre (WebOS) </li></ul></ul><ul><ul><li>Windows Mobile (WinMobile OS) </li></ul></ul>
  5. 5. Current threats by mobile malware <ul><li>For financial gain / loss </li></ul><ul><ul><ul><li>Unnecessary calls / SMS / MMS </li></ul></ul></ul><ul><ul><ul><li>Send and sell private information </li></ul></ul></ul><ul><li>Cause phones to work slowly or crash </li></ul><ul><li>Wipe out contact books and other information on the phone </li></ul><ul><li>Install “false” applications </li></ul>
  6. 6. Internet, Bluetooth, and MMS <ul><li>In all of these transfer methods, the user has to agree at least once to run the infected file </li></ul><ul><li>But smart phone virus writters get you to open and install their product the same way computer virus writers do: </li></ul><ul><ul><li>The virus is typically disguised as a game, security patch or other desirable application </li></ul></ul>
  7. 7. Viruses and Smart Phones <ul><ul><li>How smart phone viruses spread – </li></ul></ul><ul><ul><li>Internet downloads </li></ul></ul><ul><ul><li>Bluetooth </li></ul></ul><ul><ul><li>Multimedia Messaging System (MMS) </li></ul></ul><ul><li>Only smart phones susceptible to viruses </li></ul><ul><ul><li>Phones that can only make and receive calls are not at risk </li></ul></ul>
  8. 8. HISTORY <ul><ul><li>iPhone SMS attack first took place in July 2009 </li></ul></ul><ul><li>We trust smart phones & think they are safe </li></ul><ul><ul><li>We have the mistaken sense they are immune to security threats </li></ul></ul><ul><li>Smart phones typically lack security features, like antivirus, found on other computers </li></ul>
  9. 9. Smart Phones Difficult to Protect <ul><li>Easily stolen: theft is single largest problem </li></ul><ul><li>Protection options not well known </li></ul><ul><li>Eavesdropping options are available </li></ul><ul><li>More types of smart phones = complications </li></ul>
  10. 10. Differences with PC <ul><li>Although similar OSes are being used, differences exist: </li></ul><ul><ul><li>Mobiles are always “connected” and switched on </li></ul></ul><ul><ul><li>“ Environment” keeps changing Several variants of phones exist </li></ul></ul><ul><ul><ul><li>A malware for one type of phone may not necessarily be able to infect other </li></ul></ul></ul><ul><ul><li>Mobile malware not yet causing critical harm </li></ul></ul><ul><ul><ul><li>At most </li></ul></ul></ul><ul><ul><ul><ul><li>they increase the user's billing, or </li></ul></ul></ul></ul><ul><ul><ul><ul><li>cause the mobile phone to stop working. </li></ul></ul></ul></ul>
  11. 11. Classification of Mobile Worms and Viruses
  12. 12. Classification <ul><li>Behaviour </li></ul><ul><ul><li>Virus </li></ul></ul><ul><ul><li>Worm </li></ul></ul><ul><ul><li>Trojan </li></ul></ul><ul><li>Environment </li></ul><ul><ul><li>Operating System </li></ul></ul><ul><ul><li>Vulnerable Application </li></ul></ul>
  13. 13. Classification (examples) 31 st October 2006 Mobile Worms and Viruses Source: Kaspersky Labs
  14. 14. Case Studies
  15. 15. Case Study – CABIR <ul><li>First mobile worm </li></ul><ul><li>Spread vector – Bluetooth </li></ul><ul><li>Infected file – caribe.sis </li></ul><ul><li>15 new variants exist </li></ul>
  16. 16. Case Study - ComWar <ul><li>Second landmark in mobile worms </li></ul><ul><li>Spread vector - Bluetooth and MMS </li></ul><ul><li>Large spread area due to MMS </li></ul><ul><li>Not as proof of concept – Intention to harm by charging the mobile user </li></ul><ul><li>Multiple variants detected </li></ul>
  17. 17. Case Study - CardTrap <ul><li>First cross-over mobile virus found </li></ul><ul><li>Can migrate from mobile to PC </li></ul><ul><li>Propogates as infected mobile application as well as Windows worm </li></ul><ul><li>2 variants found </li></ul>
  18. 18. Futuristic Threats
  19. 19. Futuristic Developments <ul><li>Location Tracking </li></ul><ul><li>Camera and Microphone Bug </li></ul><ul><li>Leaking Sensitive Information </li></ul>
  20. 20. Protective Measures
  21. 21. Securing against attacks <ul><li>System level security </li></ul><ul><ul><li>MOSES </li></ul></ul><ul><li>Network Level Security </li></ul><ul><ul><li>Proactive approach </li></ul></ul>
  22. 22. Basic Protection All Smart Phones <ul><li>Passcode </li></ul><ul><ul><li>Enable at least 4 digits but this also depends upon IT policies </li></ul></ul><ul><ul><li>Exceeding the number of allowed password attempts deletes all data </li></ul></ul><ul><ul><li>Auto-Lock </li></ul></ul><ul><ul><li>Locks the screen after a pre-set time period of non-use (consider 30 minutes or less) </li></ul></ul><ul><ul><li>Passcode-lock enhances auto-lock </li></ul></ul><ul><ul><li>By itself not exactly a security feature but combined with passcode protection, it’s essential security </li></ul></ul>
  23. 23. Eavesdropping <ul><li>Last year Karsten Nohl, a UVa PhD graduate, cracked the secret code used on 80% of the world’s phones </li></ul><ul><li>Mobile interception, as a result, is now within the reach of “any reasonable well-funded criminal organization” </li></ul><ul><li>You and I cannot fix this problem, but it’s not likely to affect us individually </li></ul>
  24. 24. Eavesdropping <ul><li>Anyone can install eavesdropping software on your smart phone, as long as they have access to your phone even for a few minutes </li></ul><ul><li>Subtle signs that could suggest someone is secretly tapping your cell phone – </li></ul><ul><ul><li>Cell phone battery is warm even when your phone has not been used </li></ul></ul><ul><ul><li>Cell phone lights up at unexpected times, including occasions when phone is not in use </li></ul></ul><ul><ul><li>Unexpected beep or click during phone conversation </li></ul></ul>
  25. 25. Jealous Husband Scenario <ul><li>Install SpyPhone, and send the report </li></ul><ul><li>Delete the report from sent emails, </li></ul><ul><ul><li>Delete SpyPhone </li></ul></ul>
  26. 26. Lock Down Bluetooth! <ul><li>Bluetooth is default-on </li></ul><ul><ul><li>Wastes your battery </li></ul></ul><ul><ul><li>Leaves you open to Bluetooth-based attacks – most common at this time </li></ul></ul>
  27. 27. Defense-in-Depth <ul><li>Get latest firmware and software your mobile device manufacturer provides </li></ul><ul><li>Maintain situational awareness when carrying any electronic device </li></ul><ul><li>Watch your mobile device as you go through airport security </li></ul><ul><ul><li>Known bad location for device theft </li></ul></ul><ul><ul><li>Save important transmissions until you can connect to a secure environment </li></ul></ul>
  28. 28. Secure an iPhone <ul><li>Auto-Lock locks the touch screen for a preset time period after not being used for one, two, three, four or five minutes. Turned on by default but can be disabled altogether </li></ul><ul><li>Password-protect the SIM card on a 3G </li></ul><ul><li>The Erase Data function lets you completely wipe your iPhone after 10 failed passcode attempts </li></ul>
  29. 29. Social Engineering Threats <ul><li>The best security in the world will not help you if – </li></ul><ul><ul><li>You click on an phishing email and give your personal information </li></ul></ul><ul><ul><li>You click on a SMS/text message that appears to come from your carrier </li></ul></ul><ul><ul><li>You respond to a vishing phone call* </li></ul></ul><ul><li>Never give information via email or by phone or on the web, unless you initiate the exchange </li></ul>
  30. 30. Threats to Smart Phones <ul><li>Attackers will exploit our social conditioning entering Personally Identifiable Information (PI/PII), while interacting with phone voice response to commit vishing and identity theft. 1 </li></ul><ul><li>We demand more and better availability from phone service than we would from an ISP, “so the threat of a DoS attack might compel carriers to pay out on a blackmail scam.” 1 </li></ul><ul><li>“ At this point, mobile device capability is far ahead of security … We’ll start to see the botnet problem infiltrate the mobile world in 2012.” 2 </li></ul>
  31. 31. Questions?

×