SlideShare a Scribd company logo
1 of 30
MALWARES HISTORY
O Smart-phone worms, viruses, Trojan horses
appeared
O Cabir, June 14, 2004 (worm)
O Duts, July 17, 2004 (virus)
O Mosquito dialer, August 6, 2004 (trojan
horse)
O The source code of the Cabir has been
posted online by a Brazilian Programmer
O Various attacks to telecom infrastructures
and users become realityG
A
R
V
I
T
IOS/ANDROID MALWARE
O iOS malware: very little
O Juniper Networks: Major increase in Android
malware from 2010 to 2011
O Android malware growth keeps increasing ($$$)
O Main categories:
O Trojans
O Monitoring apps/spyware
O Adware
O Botnets
O We’ll look at notable malware examples
G
A
R
V
I
T
IOS MALWARE
O Malware, “fake apps” have hit iOS too
O iKee, first iPhone virus, “rickrolled” jailbroken
iDevices [25]
O Example “fake/similar” apps:
O Temple Run: Temple Climb, Temple Rush, Cave Run
O Angry Birds: Angry Zombie Birds, Shoot Angry Birds
O Not to mention “walkthroughs,” “reference” apps, etc.
O Google Play banned such apps…
O iOS, Android hit with “Find and Call” app
O SMS spammed contacts from central server
O Removed from App Store, Google Play
G
A
R
V
I
T
ANDROID: DROIDDREAM
• Infected 58 apps on Android
Market, March 2011
• 260,000 downloads in 4 days
• How it worked:
– Rooted phone via Android
Debug Bridge (adb)
vulnerability
– Sent premium-rate SMS
messages at night ($$$)
• Google removed apps 4 days
after release, banned 3
developers from Market
• More malware found since
G
A
R
V
I
T
ANDROID:FAKE ANGRY BIRDS
O Bot, Trojan
O Masquerades as game
O Roots Android 2.3
devices using
“Gingerbreak” exploit
O Device joins botnet
G
A
R
V
I
T
PLANKTON
O Plankton is sophisticated malware that can be
classified as a spyware due to the fact that its
main purpose is to collect private information
from the device and send it to a remote server.
O In some versions, Plankton includes the
functionality to download a payload that can be
loaded dynamically in runtime, adding new
functionalities in real time and making it harder
to detect, evading traditional static signatures.
G
A
R
V
I
T
O Plankton structure. O Plankton storing object
information about the
infected device.
G
A
R
V
I
T
ANDROID: SMS WORM
O Students of information security classes wrote
SMS worms, loggers on Android
O Worm spreads to all contacts via social engineering,
sideloading, etc.
O Logger stored/forwarded all received SMS
messages
O Only needed SEND_SMS, RECEIVE_SMS,
READ_SMS permissions
O Can send 100 SMS messages/hour
O One group put SMS logger on Google Play
G
A
R
V
I
T
POSSIBLE SMART-PHONE
ATTACKS
 DoS to base stations
 DDoS to call centers and switches
 Remote wiretapping
 Phone blocking
 SMS spamming
 Identity theft and spoofing
 Physical attack
 National Crisis
G
A
R
V
I
T
SPYWARE
O There are a number of apps that are the
equivalent to commercial keyloggers found
on PCs.
O Threats which have used these spying
techniques are NickySpy, Spitmo,
GGTracker and GoldenEagle. NickySpy is
interesting in that it utilizes the
MediaRecorder() class to turn on the
microphone and discretely record and save
conversations to the SDCard.
G
A
R
V
I
T
SPYWARE EXAMPLE
G
A
R
V
I
T
ATTACK VECTORS
G
A
R
V
I
T
ATTACK ANALYSIS
O Low-level attacks
O Stack implementations
O Malware as payload
O PC → Phone via USB
O High-level attacks
O Installing apps
O Physical accessG
A
R
V
I
T
LOW-LEVEL ATTACKS
O Advantage: unattended infection
O Disadvantage: efforts for the malware
developer:
 Malware developed in two stages
O Stage 1: Develop functionality (high-level, C) and
the machine code to be injected into buffer
(time consumption fixed, 13 weeks, fulltime)
O Stage 2: Find an application with buffer-
overflow vulnerability (time consumption variable)G
A
R
V
I
T
HIGH-LEVEL ATTACKS
O Advantage: malware developer can focus on
functionality (use high-level API)
O Disadvantage:
O Manual installation by the user, grant requested
access rights
O But: User will assume apps from the official
store are safe
O Costs incurred to publish app in official store
O But: Costs usually low compared to earnings (even
with Apple's app-store fee of $99)
G
A
R
V
I
T
DOS TO BASE STATIONS
 Compromised
smart-phones use
up radio resource
at a base station
 Even a handful of
zombies can
increase call
blocking rate
(0.01% required)
dramatically or
put the system
out of serviceSmart-phone zombies
G
A
R
V
I
T
N
B
C
A
PLMN: Public land mobile network PSTN: Public switched telephone network
PLMN PSTN Call Center
DDOS TO CALL CENTERS AND
SWITCHES
G
A
R
V
I
T
GSM
User A
Internet
User B
WLAN
GSM
Voice
stream
voice packet
wiretapper
PSTN
REMOTE WIRETAPPING
G
A
R
V
I
T
IOS DATA PROTECTION
MEASURES
O Each iDevice has hardware-accelerated
crypto operations (AES-256)
O Effaceable Storage: securely removes
crypto keys from flash memory
O “Erase all content and settings” wipes user data
using Effaceable Storage (locally or remotely)
O Interact with mobile device management
(MDM), Exchange ActiveSync servers
O Developers can use APIs for secure file,
database storage
O Passcodes:
O Admins can require numeric, alphanumeric, etc.
O Wipe device after 10 failed login attempts.
G
A
R
V
I
T
ANDROID ARCHITECTURE
G
A
R
V
I
T
ANDROID SECURITY (1)
• Android built on Linux kernel, which provides
– User permissions model
– Process isolation
• Each app is assigned unique user/group IDs,
run as a separate process ⇒ app sandbox
• System partition mounted read-only
• Android 3.0+ enables filesystem encryption
using Linux dmcrypt (AES-128)
• Device admins can require passwords with
specific criteria, remote wipe devices, etc.
G
A
R
V
I
T
ANDROID SECURITY (2)
O Android device
administration (3.0+):
O Remote wipe
O Require strong
password
O Full device encryption
O Disable camera
G
A
R
V
I
T
ANDROID SECURITY (3)
• Other protection mechanisms:
– Android 1.5+: stack buffer, integer overflow
protection; double free, chunk consolidation attack
prevention
– Android 2.3+: format string protection, NX, null
pointer dereference mitigation
– Android 4.0+: ASLR implemented
– Android 4.1+: ASLR strengthened, plug kernel leaks
• Capability-based permissions mechanism:
– Many APIs are not invoked without permission, e.g.,
camera, GPS, wireless, etc.
– Every app must declare the permissions it needs
– Users need to allow these permissions when installing
app
G
A
R
V
I
T
ANDROID SECURITY (4)
O All Android apps need
to be signed: by the
developer, not Google
O Google Play app store
less regulated
O Apps available rapidly
after publishing
O Bouncer service scans
for malware in store
Google Play permissions interface
G
A
R
V
I
T
PREVENTION OF
INFECTION I
O Operator of the app-store : introduction of
static and dynamic analyses to reduce chance of
malware being published
O Programmer of OS : tighter default values for
security framework
O Network provider : collaborate with AV
specialists to minimize infection over provider
controlled channels (SMS, MMS, 3G internet)G
A
R
V
I
T
PREVENTION OF
INFECTION II
O User:
O Use anti-virus software
O Disable BlueTooth (avoid proximity malware)
O Use locking mechanisms (prevent 3rd party
infecting the phone physically)
O Society:
O Advertise the threat of malware to mobile
phones.
O Apply knowledge from the PC world to the mobile
phone.
G
A
R
V
I
T
 Feature reduction
 E.g., turn off bluetooth when not
active
 OS hardening
 E.g., always display caller number
when making a phone call
 Lighting up LCD display when dialing
 Hardware hardening
 SIM card to authenticate OS and
applications
SMART-PHONE HARDENING
G
A
R
V
I
T
 Internet side protection
 NIDS, Firewalls, Patching, Shielding, …
 Base station performs shielding for users
• Make seamless handoff challenging
• Difficult to change deployed 802.11 APs
 Telecom side protection
 Abnormal behavior detection
 Reactions (Rate limiting, Call filtering, Blacklist)
 Advantage to take: Behavior of telecom users is
highly predictable and most of the reaction
building blocks already exist
 Smart-phone side protection
 Cooperation among the three parties
DEFENSES
G
A
R
V
I
T
G
A
R
V
I
T

More Related Content

What's hot

Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578skowshik
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowNowSecure
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...TransUnion
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsshehab najjar
 
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Michael Thelander
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 

What's hot (20)

Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Persentasi Mas Win Tools
Persentasi Mas Win ToolsPersentasi Mas Win Tools
Persentasi Mas Win Tools
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
 
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 

Viewers also liked

Keylogger
KeyloggerKeylogger
Keyloggerfrank
 
His Story Mission Project Guide
His Story Mission Project GuideHis Story Mission Project Guide
His Story Mission Project Guidegeorge ditima
 
Eric Liddell
Eric LiddellEric Liddell
Eric Liddelljoon7choi
 
Comparative Study of the Seismic Response of Stone and Brick Masonry Buildings
Comparative Study of the Seismic Response of Stone and Brick Masonry BuildingsComparative Study of the Seismic Response of Stone and Brick Masonry Buildings
Comparative Study of the Seismic Response of Stone and Brick Masonry BuildingsNitin Kumar
 
SolarWinds Network Performance Monitor (Portuguese)
SolarWinds Network Performance Monitor (Portuguese)SolarWinds Network Performance Monitor (Portuguese)
SolarWinds Network Performance Monitor (Portuguese)SolarWinds
 
космос глазами детей
космос глазами детейкосмос глазами детей
космос глазами детейyumish13
 
How-to Monitor & Identify Website Issues
How-to Monitor & Identify Website IssuesHow-to Monitor & Identify Website Issues
How-to Monitor & Identify Website IssuesSolarWinds
 
Interim studio
Interim studioInterim studio
Interim studioJoshua Lee
 
Parte de la guitarra eléctrica
Parte de la guitarra eléctricaParte de la guitarra eléctrica
Parte de la guitarra eléctricaLutherapia
 
Lord Cricket Ground Mount Stand
Lord Cricket Ground Mount StandLord Cricket Ground Mount Stand
Lord Cricket Ground Mount StandJoshua Lee
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Prezentatsia open document
Prezentatsia open documentPrezentatsia open document
Prezentatsia open documentaviamed
 
Wip project 2(interior)
Wip project 2(interior)Wip project 2(interior)
Wip project 2(interior)Joshua Lee
 
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"Data Insight
 
Expense Management: Best Practices and Benchmarking for 2015
Expense Management: Best Practices and Benchmarking for 2015 Expense Management: Best Practices and Benchmarking for 2015
Expense Management: Best Practices and Benchmarking for 2015 Ashley Emery
 
Supplementary Proposal Form
Supplementary Proposal FormSupplementary Proposal Form
Supplementary Proposal FormDiyana Arus
 

Viewers also liked (20)

Keylogger
KeyloggerKeylogger
Keylogger
 
His Story Mission Project Guide
His Story Mission Project GuideHis Story Mission Project Guide
His Story Mission Project Guide
 
Eric Liddell
Eric LiddellEric Liddell
Eric Liddell
 
Comparative Study of the Seismic Response of Stone and Brick Masonry Buildings
Comparative Study of the Seismic Response of Stone and Brick Masonry BuildingsComparative Study of the Seismic Response of Stone and Brick Masonry Buildings
Comparative Study of the Seismic Response of Stone and Brick Masonry Buildings
 
ArmatureWorkSamples
ArmatureWorkSamplesArmatureWorkSamples
ArmatureWorkSamples
 
SolarWinds Network Performance Monitor (Portuguese)
SolarWinds Network Performance Monitor (Portuguese)SolarWinds Network Performance Monitor (Portuguese)
SolarWinds Network Performance Monitor (Portuguese)
 
космос глазами детей
космос глазами детейкосмос глазами детей
космос глазами детей
 
Sections
SectionsSections
Sections
 
How-to Monitor & Identify Website Issues
How-to Monitor & Identify Website IssuesHow-to Monitor & Identify Website Issues
How-to Monitor & Identify Website Issues
 
Interim studio
Interim studioInterim studio
Interim studio
 
prezi
preziprezi
prezi
 
Parte de la guitarra eléctrica
Parte de la guitarra eléctricaParte de la guitarra eléctrica
Parte de la guitarra eléctrica
 
Lord Cricket Ground Mount Stand
Lord Cricket Ground Mount StandLord Cricket Ground Mount Stand
Lord Cricket Ground Mount Stand
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Creating a culture of action
Creating a culture of action Creating a culture of action
Creating a culture of action
 
Prezentatsia open document
Prezentatsia open documentPrezentatsia open document
Prezentatsia open document
 
Wip project 2(interior)
Wip project 2(interior)Wip project 2(interior)
Wip project 2(interior)
 
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"
Презентация "Логистические услуги для интернет-магазинов. Основной доклад 2015"
 
Expense Management: Best Practices and Benchmarking for 2015
Expense Management: Best Practices and Benchmarking for 2015 Expense Management: Best Practices and Benchmarking for 2015
Expense Management: Best Practices and Benchmarking for 2015
 
Supplementary Proposal Form
Supplementary Proposal FormSupplementary Proposal Form
Supplementary Proposal Form
 

Similar to Mobile Malwares Analysis - Garvit Arya

10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityEY Belgium
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmasTech and Law Center
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 

Similar to Mobile Malwares Analysis - Garvit Arya (20)

10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile security
Mobile securityMobile security
Mobile security
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Ios vs android
Ios vs androidIos vs android
Ios vs android
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
HinDroid
HinDroidHinDroid
HinDroid
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Mbs w23
Mbs w23Mbs w23
Mbs w23
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (7)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

Mobile Malwares Analysis - Garvit Arya

  • 1.
  • 2. MALWARES HISTORY O Smart-phone worms, viruses, Trojan horses appeared O Cabir, June 14, 2004 (worm) O Duts, July 17, 2004 (virus) O Mosquito dialer, August 6, 2004 (trojan horse) O The source code of the Cabir has been posted online by a Brazilian Programmer O Various attacks to telecom infrastructures and users become realityG A R V I T
  • 3. IOS/ANDROID MALWARE O iOS malware: very little O Juniper Networks: Major increase in Android malware from 2010 to 2011 O Android malware growth keeps increasing ($$$) O Main categories: O Trojans O Monitoring apps/spyware O Adware O Botnets O We’ll look at notable malware examples G A R V I T
  • 4. IOS MALWARE O Malware, “fake apps” have hit iOS too O iKee, first iPhone virus, “rickrolled” jailbroken iDevices [25] O Example “fake/similar” apps: O Temple Run: Temple Climb, Temple Rush, Cave Run O Angry Birds: Angry Zombie Birds, Shoot Angry Birds O Not to mention “walkthroughs,” “reference” apps, etc. O Google Play banned such apps… O iOS, Android hit with “Find and Call” app O SMS spammed contacts from central server O Removed from App Store, Google Play G A R V I T
  • 5. ANDROID: DROIDDREAM • Infected 58 apps on Android Market, March 2011 • 260,000 downloads in 4 days • How it worked: – Rooted phone via Android Debug Bridge (adb) vulnerability – Sent premium-rate SMS messages at night ($$$) • Google removed apps 4 days after release, banned 3 developers from Market • More malware found since G A R V I T
  • 6. ANDROID:FAKE ANGRY BIRDS O Bot, Trojan O Masquerades as game O Roots Android 2.3 devices using “Gingerbreak” exploit O Device joins botnet G A R V I T
  • 7. PLANKTON O Plankton is sophisticated malware that can be classified as a spyware due to the fact that its main purpose is to collect private information from the device and send it to a remote server. O In some versions, Plankton includes the functionality to download a payload that can be loaded dynamically in runtime, adding new functionalities in real time and making it harder to detect, evading traditional static signatures. G A R V I T
  • 8. O Plankton structure. O Plankton storing object information about the infected device. G A R V I T
  • 9. ANDROID: SMS WORM O Students of information security classes wrote SMS worms, loggers on Android O Worm spreads to all contacts via social engineering, sideloading, etc. O Logger stored/forwarded all received SMS messages O Only needed SEND_SMS, RECEIVE_SMS, READ_SMS permissions O Can send 100 SMS messages/hour O One group put SMS logger on Google Play G A R V I T
  • 10. POSSIBLE SMART-PHONE ATTACKS  DoS to base stations  DDoS to call centers and switches  Remote wiretapping  Phone blocking  SMS spamming  Identity theft and spoofing  Physical attack  National Crisis G A R V I T
  • 11. SPYWARE O There are a number of apps that are the equivalent to commercial keyloggers found on PCs. O Threats which have used these spying techniques are NickySpy, Spitmo, GGTracker and GoldenEagle. NickySpy is interesting in that it utilizes the MediaRecorder() class to turn on the microphone and discretely record and save conversations to the SDCard. G A R V I T
  • 14. ATTACK ANALYSIS O Low-level attacks O Stack implementations O Malware as payload O PC → Phone via USB O High-level attacks O Installing apps O Physical accessG A R V I T
  • 15. LOW-LEVEL ATTACKS O Advantage: unattended infection O Disadvantage: efforts for the malware developer:  Malware developed in two stages O Stage 1: Develop functionality (high-level, C) and the machine code to be injected into buffer (time consumption fixed, 13 weeks, fulltime) O Stage 2: Find an application with buffer- overflow vulnerability (time consumption variable)G A R V I T
  • 16. HIGH-LEVEL ATTACKS O Advantage: malware developer can focus on functionality (use high-level API) O Disadvantage: O Manual installation by the user, grant requested access rights O But: User will assume apps from the official store are safe O Costs incurred to publish app in official store O But: Costs usually low compared to earnings (even with Apple's app-store fee of $99) G A R V I T
  • 17. DOS TO BASE STATIONS  Compromised smart-phones use up radio resource at a base station  Even a handful of zombies can increase call blocking rate (0.01% required) dramatically or put the system out of serviceSmart-phone zombies G A R V I T
  • 18. N B C A PLMN: Public land mobile network PSTN: Public switched telephone network PLMN PSTN Call Center DDOS TO CALL CENTERS AND SWITCHES G A R V I T
  • 19. GSM User A Internet User B WLAN GSM Voice stream voice packet wiretapper PSTN REMOTE WIRETAPPING G A R V I T
  • 20. IOS DATA PROTECTION MEASURES O Each iDevice has hardware-accelerated crypto operations (AES-256) O Effaceable Storage: securely removes crypto keys from flash memory O “Erase all content and settings” wipes user data using Effaceable Storage (locally or remotely) O Interact with mobile device management (MDM), Exchange ActiveSync servers O Developers can use APIs for secure file, database storage O Passcodes: O Admins can require numeric, alphanumeric, etc. O Wipe device after 10 failed login attempts. G A R V I T
  • 22. ANDROID SECURITY (1) • Android built on Linux kernel, which provides – User permissions model – Process isolation • Each app is assigned unique user/group IDs, run as a separate process ⇒ app sandbox • System partition mounted read-only • Android 3.0+ enables filesystem encryption using Linux dmcrypt (AES-128) • Device admins can require passwords with specific criteria, remote wipe devices, etc. G A R V I T
  • 23. ANDROID SECURITY (2) O Android device administration (3.0+): O Remote wipe O Require strong password O Full device encryption O Disable camera G A R V I T
  • 24. ANDROID SECURITY (3) • Other protection mechanisms: – Android 1.5+: stack buffer, integer overflow protection; double free, chunk consolidation attack prevention – Android 2.3+: format string protection, NX, null pointer dereference mitigation – Android 4.0+: ASLR implemented – Android 4.1+: ASLR strengthened, plug kernel leaks • Capability-based permissions mechanism: – Many APIs are not invoked without permission, e.g., camera, GPS, wireless, etc. – Every app must declare the permissions it needs – Users need to allow these permissions when installing app G A R V I T
  • 25. ANDROID SECURITY (4) O All Android apps need to be signed: by the developer, not Google O Google Play app store less regulated O Apps available rapidly after publishing O Bouncer service scans for malware in store Google Play permissions interface G A R V I T
  • 26. PREVENTION OF INFECTION I O Operator of the app-store : introduction of static and dynamic analyses to reduce chance of malware being published O Programmer of OS : tighter default values for security framework O Network provider : collaborate with AV specialists to minimize infection over provider controlled channels (SMS, MMS, 3G internet)G A R V I T
  • 27. PREVENTION OF INFECTION II O User: O Use anti-virus software O Disable BlueTooth (avoid proximity malware) O Use locking mechanisms (prevent 3rd party infecting the phone physically) O Society: O Advertise the threat of malware to mobile phones. O Apply knowledge from the PC world to the mobile phone. G A R V I T
  • 28.  Feature reduction  E.g., turn off bluetooth when not active  OS hardening  E.g., always display caller number when making a phone call  Lighting up LCD display when dialing  Hardware hardening  SIM card to authenticate OS and applications SMART-PHONE HARDENING G A R V I T
  • 29.  Internet side protection  NIDS, Firewalls, Patching, Shielding, …  Base station performs shielding for users • Make seamless handoff challenging • Difficult to change deployed 802.11 APs  Telecom side protection  Abnormal behavior detection  Reactions (Rate limiting, Call filtering, Blacklist)  Advantage to take: Behavior of telecom users is highly predictable and most of the reaction building blocks already exist  Smart-phone side protection  Cooperation among the three parties DEFENSES G A R V I T