Anatomy of a Targeted Attack against Mobile Device Management (MDM)

914 views

Published on

In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDM’s memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem.

Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks
Recognise the shortcoming of MDM as a wholesome security solution
Enhance mobile attack mitigation techniques through mobile activity visibility

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
914
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
36
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Anatomy of a Targeted Attack against Mobile Device Management (MDM)

  1. 1. Anatomy of a Targeted Attack against Mobile Device Management (MDM)
  2. 2. MDM: Penetration in the Market Gartner, Inc. October 2012
  3. 3. TARGETED MOBILE THREATS
  4. 4. Mobile Remote Access Trojans (aka Spyphones)
  5. 5. Recent High-Profiled Examples
  6. 6. Commercial mRATS
  7. 7. Survey: Cellular Network 2M Subscribers Sampling: 250K October 2012: 1 / 1000devices
  8. 8. Survey: Cellular Network 2M Subscribers Sampling: 250K
  9. 9. BYPASSING MOBILE DEVICE MANAGEMENT (MDM) SOLUTIONS
  10. 10. MDMs and Secure Containers   
  11. 11. Demo Let’s Test These Assumptions…
  12. 12. Overview
  13. 13. Step 1: Infect the device / Android
  14. 14. Step 1: Infect the device / iOS
  15. 15. Step 2: Install a Backdoor / Android: Rooting
  16. 16. Step 2: Install a Backdoor / iOS: Jailbreaking
  17. 17. Step 3: Bypass Containerization
  18. 18. Step 3: Bypass Containerization
  19. 19. Step 3: Bypass Containerization
  20. 20. Step 3: Bypass Containerization
  21. 21. MITIGATION TECHNIQUES
  22. 22. MDM    
  23. 23. Mitigation Steps (1)
  24. 24. Mitigation Steps (2)
  25. 25. Mitigation Steps (3)
  26. 26. March 26 2013 → Android Trojan Found in Targeted Attack A combination of e-mail hacking, "spear phishing," and a Trojan built specifically for Android smartphones to spy on Tibetan activists Inside of Mobile Targeted Attack C&C Server View the software installed on the phone to facilitate customer software hijacking / tool to get software such as QQ, Email, MSN password
  27. 27. Thank You.

×