SlideShare a Scribd company logo
1 of 27
Download to read offline
1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Tommi Kallberg | Mobile Security Engineer, Nordics
LET’S HACK YOUR MOBILE
DEVICES. YES, WE CAN AND SO
DO THE OTHERS!
MAJOR
MOBILE
ATTACKS
2016 - 2018
Trident
(Pegasus)
Hummingbad Viking-
Horde
Dress
Code
Ghost
Push
Xiny
Gooligan
CopyCat
Banker
Bot
Janus
Expensive
Wall
Lights
Out
Judy
Spinner
Tizi
Simp
Locker
XSSER
mRAT
Banker
Pawn
Storm
Durak
SpyWallet Masque
Commercial
mRATS
Omni
RAT
Tablets with
pre-installed
Trojan on
Amazon
Koler
Android.
Titan.1
Shedun
Rootnik
Anubis
Spy
Wire
Lurker
JSDialer
Crypto
Locker
Recordable
Activator
Remote
admin Trojan
using Baidu
Cloud Push
service
Cowboy
Adventure
Porn
Clicker
Story
Saver
Android
Installer
Hijacking Bug
Loapi
Golduck
Gnat
Spy
Gazon Key
Raider XCode
Ghost
3©2018 Check Point Software Technologies Ltd.
“By 2019, mobile malware will
amount to one-third of total
malware.”
Gartner’s Market Guide for Mobile Threat Defense Solutions, 2017
OF ALL
ORGANIZATIONS
ARE INFECTED WITH
MOBILE MALWARE
Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices
100%
Averaged 35
jailbroken or
rooted devices
75% 89%
Experienced a
man-in-the-middle
attack over Wi-Fi
5©2018 Check Point Software Technologies Ltd.
6©2018 Check Point Software Technologies Ltd.
7©2018 Check Point Software Technologies Ltd.
VECTORS & ATTACKS
NetworkApps
Infected Apps
0-Day Malware
Vulnerable Apps
MitM
Malicious / Phishing URLs
SMS
Bluetooth
SS7
OS Vulnerabilities
Device Vulnerabilities
Device Configurations
Jailbreak/Root
OS Exploits
Device
Intercepting
Messages
DAMAGES
Account
Takeover
Privacy
Invasion
Eavesdropping
Contacts
Spear
Phishing
Executive
Tracking
Corporate
Espionage
Impersonating
on Meetings
SANDBLAST MOBILE IS THE LEADING
THREAT DEFENSE SOLUTION TO PREVENT
ADVANCED MOBILE CYBERATTACKS
©2016 Check Point Software Technologies Ltd. 10
ZERO-DAY MALWARE
MitM ATTACKS OVER Wi-Fi
SECURE BROWSING
SMS ATTACKS
DEVICE SETTINGS
BLUETOOTH
INFECTED APPS
OS EXPLOITS
©2016 Check Point Software Technologies Ltd. 11
HOW IT WORKSHOW IT WORKS
APP ANALYSIS
BEHAVIORAL RISK ENGINE
MACHINE LEARNING
ARTIFICIAL INTELLIGENCE
ON-DEVICE DETECTION REAL-TIME INTELLIGENCE,
MONITORING AND CONTROL
©2016 Check Point Software Technologies Ltd. 12
HOW IT WORKSHOW IT WORKS
ON-DEVICE DETECTION
APP ANALYSIS
BEHAVIORAL RISK ENGINE
MACHINE LEARNING
ARTIFICIAL INTELLIGENCE
ON-DEVICE DETECTION REAL-TIME INTELLIGENCE,
MONITORING AND CONTROL
[Internal Use] for Check Point employees​
Translates threat intelligence data from
100M gateways and end points
around the world into actionable security
protections
14©2018 Check Point Software Technologies Ltd.
How the Mobile World is Changing
90% of cyberattacks begin with
phishing2
Phishing
Extending corporate standards and
policies to mobile devices.
Corporate Browsing Policy
Security must prevent attacks without
dependency on UEM solutions
Prevention not Detection
Malicious apps and network attacks may
exfiltrate sensitive corporate data
Data Exfiltration
63% of all web traffic is from mobile
devices1
Malicious Websites
1
https://www.stonetemple.com/mobile-vs-desktop-usage-study/
2
Verizon 2018 Data Breach Investigations Report
©2016 Check Point Software Technologies Ltd. 15
Check Point has developed a new and unique mobile
security infrastructure, On-device Network
Protection, that allows businesses to stay ahead of
new and emerging fifth generation cyber threats.
SandBlast Mobile 3.0
©2016 Check Point Software Technologies Ltd. 16
What’s New in SandBlast Mobile 3.0
URL FilteringAnti-BotSafe Browsing Conditional
Access
Anti-Phishing
17©2018 Check Point Software Technologies Ltd.
Anti-Phishing
Any App
18©2018 Check Point Software Technologies Ltd.
Safe Browsing
Any Browser
19©2018 Check Point Software Technologies Ltd.
Conditional Access
CLOUD APPS
Prevents access to corporate cloud
apps from compromised devices
ON-PREMISE APPS
Prevents access to on-premises
apps from compromised devices
All independent of any UEM deployments
20©2018 Check Point Software Technologies Ltd.
Intercepting
text messages
Stealing
passwords
Taking
photos
Microphone
recordings
Stealing
contact lists
Stealing
email
Tracking
location
Breaking into
corporate network
The Rise of Mobile Bots
• No management product
automatically removes malware
• Relying on users leaves too much
to chance
• Businesses block bots on
endpoints and gateways, but
not mobile devices
21©2018 Check Point Software Technologies Ltd.
Anti-Bot
PREVENTS COMMUNICATIONS
FROM MALICIOUS APPS
Blocks malicious apps from communicating
with the outside world and exfiltrating sensitive data
22©2018 Check Point Software Technologies Ltd.
URL Filtering
PREVENTS ACCESS TO
INAPPROPRIATE WEBSITES
Blocks access to websites deemed inappropriate
according to company policies
23©2018 Check Point Software Technologies Ltd.
Privacy
Zero Personally Identifiable Information
BYOD Compatible
User Friendly
24©2017 Check Point Software Technologies Ltd.
* Source: Miercom - June 2017 - MTD Industry assessment
BEST MALICIOUS APPS CATCH RATE
SBM is above market average for Quality of experience and detection*
FURTHER
READING
Gartner for Technical Professionals (requires separate license)
“Comparison of Mobile Threat Defense Solutions”
By Patrick Hevesi and Michael Isbitski
Link: https://www.gartner.com/doc/3882900/comparison-mobile-threat-defense-solutions
26©2018 Check Point Software Technologies Ltd.
QUESTIONS?
27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Thank You!

More Related Content

What's hot

Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by SymantecCheapest SSLs
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Wultra
 
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachIT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachFarook Al-Jibouri
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 

What's hot (20)

Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Mobile security
Mobile securityMobile security
Mobile security
 
Qr codes
Qr codesQr codes
Qr codes
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Antivirus weakness
Antivirus weaknessAntivirus weakness
Antivirus weakness
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application Security
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Daniel A
Daniel ADaniel A
Daniel A
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022
 
Intel: 巨變的漩渦
Intel: 巨變的漩渦Intel: 巨變的漩渦
Intel: 巨變的漩渦
 
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachIT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

Similar to Let's hack your mobile device. Yes we can. And many other do.

ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTCristian Garcia G.
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Greg Wartes, MCP
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryPaul Hobbs
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 

Similar to Let's hack your mobile device. Yes we can. And many other do. (20)

ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Generación V de ciberataques
Generación V de ciberataquesGeneración V de ciberataques
Generación V de ciberataques
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 

More from DATA SECURITY SOLUTIONS

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesDATA SECURITY SOLUTIONS
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudDATA SECURITY SOLUTIONS
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsDATA SECURITY SOLUTIONS
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricDATA SECURITY SOLUTIONS
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...DATA SECURITY SOLUTIONS
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementDATA SECURITY SOLUTIONS
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of ITDATA SECURITY SOLUTIONS
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data DATA SECURITY SOLUTIONS
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityDATA SECURITY SOLUTIONS
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economicsDATA SECURITY SOLUTIONS
 

More from DATA SECURITY SOLUTIONS (20)

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyes
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
 
Forensic tool development with rust
Forensic tool development with rustForensic tool development with rust
Forensic tool development with rust
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systems
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
 
When network security is not enough
When network security is not enoughWhen network security is not enough
When network security is not enough
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
Network is the Firewall
Network is the FirewallNetwork is the Firewall
Network is the Firewall
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 
Cyber crime as a startup
Cyber crime as a startupCyber crime as a startup
Cyber crime as a startup
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economics
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Let's hack your mobile device. Yes we can. And many other do.

  • 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Tommi Kallberg | Mobile Security Engineer, Nordics LET’S HACK YOUR MOBILE DEVICES. YES, WE CAN AND SO DO THE OTHERS!
  • 2. MAJOR MOBILE ATTACKS 2016 - 2018 Trident (Pegasus) Hummingbad Viking- Horde Dress Code Ghost Push Xiny Gooligan CopyCat Banker Bot Janus Expensive Wall Lights Out Judy Spinner Tizi Simp Locker XSSER mRAT Banker Pawn Storm Durak SpyWallet Masque Commercial mRATS Omni RAT Tablets with pre-installed Trojan on Amazon Koler Android. Titan.1 Shedun Rootnik Anubis Spy Wire Lurker JSDialer Crypto Locker Recordable Activator Remote admin Trojan using Baidu Cloud Push service Cowboy Adventure Porn Clicker Story Saver Android Installer Hijacking Bug Loapi Golduck Gnat Spy Gazon Key Raider XCode Ghost
  • 3. 3©2018 Check Point Software Technologies Ltd. “By 2019, mobile malware will amount to one-third of total malware.” Gartner’s Market Guide for Mobile Threat Defense Solutions, 2017
  • 4. OF ALL ORGANIZATIONS ARE INFECTED WITH MOBILE MALWARE Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices 100% Averaged 35 jailbroken or rooted devices 75% 89% Experienced a man-in-the-middle attack over Wi-Fi
  • 5. 5©2018 Check Point Software Technologies Ltd.
  • 6. 6©2018 Check Point Software Technologies Ltd.
  • 7. 7©2018 Check Point Software Technologies Ltd. VECTORS & ATTACKS NetworkApps Infected Apps 0-Day Malware Vulnerable Apps MitM Malicious / Phishing URLs SMS Bluetooth SS7 OS Vulnerabilities Device Vulnerabilities Device Configurations Jailbreak/Root OS Exploits Device
  • 9. SANDBLAST MOBILE IS THE LEADING THREAT DEFENSE SOLUTION TO PREVENT ADVANCED MOBILE CYBERATTACKS
  • 10. ©2016 Check Point Software Technologies Ltd. 10 ZERO-DAY MALWARE MitM ATTACKS OVER Wi-Fi SECURE BROWSING SMS ATTACKS DEVICE SETTINGS BLUETOOTH INFECTED APPS OS EXPLOITS
  • 11. ©2016 Check Point Software Technologies Ltd. 11 HOW IT WORKSHOW IT WORKS APP ANALYSIS BEHAVIORAL RISK ENGINE MACHINE LEARNING ARTIFICIAL INTELLIGENCE ON-DEVICE DETECTION REAL-TIME INTELLIGENCE, MONITORING AND CONTROL
  • 12. ©2016 Check Point Software Technologies Ltd. 12 HOW IT WORKSHOW IT WORKS ON-DEVICE DETECTION APP ANALYSIS BEHAVIORAL RISK ENGINE MACHINE LEARNING ARTIFICIAL INTELLIGENCE ON-DEVICE DETECTION REAL-TIME INTELLIGENCE, MONITORING AND CONTROL
  • 13. [Internal Use] for Check Point employees​ Translates threat intelligence data from 100M gateways and end points around the world into actionable security protections
  • 14. 14©2018 Check Point Software Technologies Ltd. How the Mobile World is Changing 90% of cyberattacks begin with phishing2 Phishing Extending corporate standards and policies to mobile devices. Corporate Browsing Policy Security must prevent attacks without dependency on UEM solutions Prevention not Detection Malicious apps and network attacks may exfiltrate sensitive corporate data Data Exfiltration 63% of all web traffic is from mobile devices1 Malicious Websites 1 https://www.stonetemple.com/mobile-vs-desktop-usage-study/ 2 Verizon 2018 Data Breach Investigations Report
  • 15. ©2016 Check Point Software Technologies Ltd. 15 Check Point has developed a new and unique mobile security infrastructure, On-device Network Protection, that allows businesses to stay ahead of new and emerging fifth generation cyber threats. SandBlast Mobile 3.0
  • 16. ©2016 Check Point Software Technologies Ltd. 16 What’s New in SandBlast Mobile 3.0 URL FilteringAnti-BotSafe Browsing Conditional Access Anti-Phishing
  • 17. 17©2018 Check Point Software Technologies Ltd. Anti-Phishing Any App
  • 18. 18©2018 Check Point Software Technologies Ltd. Safe Browsing Any Browser
  • 19. 19©2018 Check Point Software Technologies Ltd. Conditional Access CLOUD APPS Prevents access to corporate cloud apps from compromised devices ON-PREMISE APPS Prevents access to on-premises apps from compromised devices All independent of any UEM deployments
  • 20. 20©2018 Check Point Software Technologies Ltd. Intercepting text messages Stealing passwords Taking photos Microphone recordings Stealing contact lists Stealing email Tracking location Breaking into corporate network The Rise of Mobile Bots • No management product automatically removes malware • Relying on users leaves too much to chance • Businesses block bots on endpoints and gateways, but not mobile devices
  • 21. 21©2018 Check Point Software Technologies Ltd. Anti-Bot PREVENTS COMMUNICATIONS FROM MALICIOUS APPS Blocks malicious apps from communicating with the outside world and exfiltrating sensitive data
  • 22. 22©2018 Check Point Software Technologies Ltd. URL Filtering PREVENTS ACCESS TO INAPPROPRIATE WEBSITES Blocks access to websites deemed inappropriate according to company policies
  • 23. 23©2018 Check Point Software Technologies Ltd. Privacy Zero Personally Identifiable Information BYOD Compatible User Friendly
  • 24. 24©2017 Check Point Software Technologies Ltd. * Source: Miercom - June 2017 - MTD Industry assessment BEST MALICIOUS APPS CATCH RATE SBM is above market average for Quality of experience and detection*
  • 25. FURTHER READING Gartner for Technical Professionals (requires separate license) “Comparison of Mobile Threat Defense Solutions” By Patrick Hevesi and Michael Isbitski Link: https://www.gartner.com/doc/3882900/comparison-mobile-threat-defense-solutions
  • 26. 26©2018 Check Point Software Technologies Ltd. QUESTIONS?
  • 27. 27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Thank You!