Dark Clouds and Rainy Days, the Bad Side of Cloud Computing

David Rogers
David RogersDirector at Copper Horse Solutions Ltd
David Rogers, Copper Horse Solutions Ltd.
DARK CLOUDS AND RAINY DAYS, THE BAD SIDE
OF CLOUD COMPUTING
CLOUD MOBILITY, 21ST SEPTEMBER 2011, AMSTERDAM


  Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
ABOUT ME
   12 years in the mobile industry
   Hardware and software background
   Head of Product Security at Panasonic Mobile
        Worked with industry and government on IMEI and
         SIMlock security
        Pioneered some early work in mobile phone forensics
        Brought industry together on security information sharing
   Director of External Relations at OMTP
        Programme Manager for advanced hardware security
         tasks
        Chair of Incident Handling task
   Head of Security and Chair of Security Group at WAC
   Owner and Director at Copper Horse Solutions
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
ABOUT COPPER HORSE SOLUTIONS LTD

   Established in 2011
   Software and security company
        Focused on the mobile phone industry
   Services:
        Mobile phone security consultancy
        Industry expertise
        Standards representation
        Mobile application development
   http://www.copperhorsesolutions.com

    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
WHAT I WILL TALK ABOUT

   Dark Clouds and Rainy Days – the dark side
    of cloud computing
      Thin air – issues around device theft and
       tampering
      Condensation – how much data is left on the
       device?
      The problem with web apps

      Slurping data, not coffee – insecure networks

      How much do you trust your cloud provider?


    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
THIN AIR – ISSUES AROUND DEVICE
                          THEFT AND TAMPERING




Copyright © 2011 Copper Horse Solutions Limited. All rights reserved   Image: 416style
DEVICES – LOST AND STOLEN
   Large numbers of devices are lost or stolen on a daily basis
        iphone prototypes – 2 left in bars
   UK – National Mobile Phone Crime Unit
   IMEI blocking
        Window between theft and blocking
        Same problem with lock and wipe services
   NMPR – National Mobile Property Register
        Allows stolen / lost items to be returned to right owner
        www.immobilise.com
   EIRs and the CEIR
        Lots of stolen phones are exported but not blocked
   Users do not protect access to their devices
        Barrier to usability
        Most cloud services have authentication tokens – non-password access (see also faceniff)
        Need to be told the basics: http://www.carphonewarehouse.com/security
   Smartphone hacking is a major target right now
        Hardware (SIMlock and IMEI) hacking has been going on for years
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
CONDENSATION – HOW MUCH DATA IS
                 LEFT ON THE DEVICE?




Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
DATA RESIDUE ISSUES
   Devices move around:
        Phone recycling companies
        Phones left in drawers / thrown in bins
        Phones passed onto another employee
        Service returns and refurbishment issues
               Repeated attacks on celebrities
               Repeated mistakes in data clearing
   Lots of “cloud” access data available
        Browser data cache / local storage
        Credentials for network APIs and services stored on device
         (not in secure hardware)
        Users storing passwords insecurely on local machines
        Apps / browsers providing “no-login” functionality
   Note: These are all still issues in the non „cloud‟ world!!
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
THE PROBLEM WITH WEB APPLICATIONS




Copyright © 2011 Copper Horse Solutions Limited. All rights reserved   Image: Clearly Ambiguous
THE PROBLEM WITH WEBAPPS
   Trust issues – e.g. Chrome application permissions issue / lack or
    proper triage with Android and Chrome apps.
   Everyone is jumping on HTML5 but there will be hidden security issues
   Ultimately there needs to be some form of local usage
        HTML5 Cache, offline mechanisms still immature
        No access to trusted hardware on device
   Everything is transferred over a network
        Even if you don‟t want it to be
   Existing protection is weak
        Web foundations are not secure (see later)
        No such thing as a “secure web runtime”
   In-app billing and other network APIs offer great fraud / attack potential
        Targets will be identity and payment
   Future: Device APIs & M2M
        How to sync data without compromising users
        How to control access
        Public safety aspects – web for safety critical applications?!
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
RELIANCE ON CONNECTIVITY
   Network access is not ubiquitous
        Extremely poor wireless connections in rural areas (even in
         developed countries)
   There is always an „offline‟ scenario for users, but few
    technical solutions for offline web




    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved   Image: John Leach
SLURPING DATA, NOT COFFEE –
                                 INSECURE NETWORKS




Copyright © 2011 Copper Horse Solutions Limited. All rights reserved   Image: Thomas Dwyer (on a break from flickr)
SLURPING DATA, NOT COFFEE
   Incidents in internet cafes and airports, libraries
        Very widespread
        Expensive roaming costs push users onto WiFi
   Fake WiFi Networks
        Low hanging fruit
        Temptation, temptation – open and free!
   Recent attack demonstration of stealing data while
    charging phone at a charge booth
   Femtocells
        Recent hacker interest in femtocells (base stations in
         people‟s houses)
        Can capture and break traffic
        What about metrocells?
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
FACENIFF AND FIRESHEEP
                                        MITM attack captures authentication
                                         cookies
                                        Even on encrypted WiFi networks
                                               Traffic is routed through attack device
                                        Techniques available for years – made
                                         much easier by these kind of tools
                                        Companies still not using SSL
                                               Mobile version of facebook page has to be
                                                manually set as https by the user – most users
                                                cannot do this
                                        Many phone applications send data in the
                                         clear
                                               Google and Facebook have both been guilty of
                                                this

 Copyright © 2011 Copper Horse Solutions Limited. All rights reserved      Image: http://www.geekword.net
HIDDEN NEAR A CAFÉ IN YOUR AREA…




                                                                        Image: http://cheezburger.com/View/1608846080
 Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
HOW MUCH DO YOU TRUST YOUR CLOUD
                       PROVIDER?




 Copyright © 2011 Copper Horse Solutions Limited. All rights reserved   Image: Caza_No_7
TRUST IN CLOUD PROVIDERS (1)

   Poor security techniques employed
      Phone  hacking scandal
      No user notification of accesses from other
       machines / times
      Previous data issues – e.g. T-Mobile, Paris Hilton
       etc.
      Password reminders have compromised online
       email accounts e.g. Sarah Palin
      Facebook dragged into providing privacy
       protection for users
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
TRUST IN CLOUD PROVIDERS (2)
   Who do your cloud provider trust?
      Who are their suppliers?
      What technology are they using?
      RSA –targeted cyber attack
             SecurID             keys being replaced in many organisations
        Diginotar – Fake (genuine) SSL certificates
             Compromised                     Google Docs, Gmail and lots of other
              services
             Shows how fragile the whole foundations of the „secure‟
              web are
        19th September (Monday) – BEAST attack against
         SSL
             Can         decrypt PayPal cookies

    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
VIRTUALISATION
 Platform agnostic dream
 Does virtualisation on mobile handsets really
  bring extra security?
      It offers a solution to companies wanting to own
       parts of a device e.g. for corporate policy
       management
      It brings new (unknown) security risks
             Immature                 products on mobile
      Mobilemarket is still very fragmented
      Same issues if the device is lost or stolen

    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
TECHNICAL OUTAGES
         “for a currently unknown reason, the update
         did not work correctly”
         Microsoft response to DNS issue, September 2011



   Unforeseen technical outages:
        Google: Googledocs down for hours
        Microsoft: DNS issue during maintenance




                                                                           http://cloudtechsite.com/blogposts/microsoft-and-google-suffer-
                                                                           from-recent-cloud-interruptions.html
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
TARGETED HACKTIVISM
   Attacks on Amazon by Anonymous – unrelated to most users‟
    services
        DDoS attack failed – Amazon were servers capable of the demand
        Companies like Mastercard did not fare as well
        collateral damage issue
        Conversely – Amazon‟s EC2 cloud capability was used against Sony
   Lulzsec
        Simplistic but devastating attacks
        Difficult to track down
   What groups come next?

   F-Secure‟s Mikko Hypponen has called for an international Police
    Force: http://betanews.com/2011/09/12/we-need-an-international-
    police-force-to-fight-cybercrime/
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
TARGETED HACKTIVISM (2)
   Anonymous is the direction of hacktivist attacks for various
    ideals
   Decentralised, no „head‟
        #opfacebook
        5th November 2011
        Published rationale is
         Facebook privacy policy




    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
TRUST IN CLOUD PROVIDERS (2)
   At what point in the future does a cloud provider
    decide to sneak a look at the data it is storing?
   What is the EULA?
   What country is your data being held in?
        What are the data protection and privacy laws?
        Have you got customer data within your business data?
        What happens when something goes wrong?
   Business continuity
        Despite operating agreements, what if a natural disaster
         happens?
             Might not be the data centre that is affected
             Cable theft is a huge issue
        What about conflict and war?
    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
WHAT THEN?




                                  Image: https://tooze.wordpress.com/tag/singtel/

 Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
THE SILVER LINING?
   Not quite silver yet:
        Cloud services do provide a lot of
         good, but are not a panacea!
        Primary business driver for cloud
         is cost. Security is a secondary
         concern
   But:
        Many attacks in the “offline”
         world can / have been much
         worse
        Cloud providers and companies
         are recognising issues
        Users are not accepting bad
         security / privacy
        Not everything will live in the
         cloud
                                                                           Image: Nick Coombe

    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
THANKS FOR LISTENING!

   Any questions?

   Contact me:
    david.rogers@copperhorses.com


   Twitter:
                     @drogersuk


   Blog:
      http://blog.mobilephonesecurity.org



    Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
1 of 26

Recommended

Designing Secure Mobile Apps by
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
3.3K views32 slides
Cyberoam: il futuro della network security! by
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
460 views35 slides
Enterprise Mobile Security by
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile SecurityHP Enterprise Security
566 views12 slides
Privacy Presentation by
Privacy PresentationPrivacy Presentation
Privacy PresentationKierraHicks
25 views9 slides
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM by
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
581 views20 slides
The Next Disruptive Technology by
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive TechnologyRachelMullett
176 views9 slides

More Related Content

What's hot

Technology update by
Technology updateTechnology update
Technology updatejumus jumbuck
235 views12 slides
NETC 2012_Mobile Security for Smartphones and Tablets (pptx) by
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
1.2K views77 slides
Atm Communication Online Meeting by
Atm Communication Online MeetingAtm Communication Online Meeting
Atm Communication Online Meetingmazlilah subadi
100 views12 slides
I Brought My Own Device. Now What? by
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
134 views2 slides
Aerohive whitepaper-byod-and-beyond by
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
339 views13 slides
Demystifying the Mobile Container - PART I by
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IRelayware
1.1K views25 slides

What's hot(20)

NETC 2012_Mobile Security for Smartphones and Tablets (pptx) by Vince Verbeke
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke1.2K views
Atm Communication Online Meeting by mazlilah subadi
Atm Communication Online MeetingAtm Communication Online Meeting
Atm Communication Online Meeting
mazlilah subadi100 views
I Brought My Own Device. Now What? by Array Networks
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
Array Networks134 views
Aerohive whitepaper-byod-and-beyond by J
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
J 339 views
Demystifying the Mobile Container - PART I by Relayware
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART I
Relayware1.1K views
Demystifying the Mobile Container - PART 2 by Relayware
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Relayware1.6K views
Juniper Provision - 13martie2012 by Agora Group
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
Agora Group498 views
2011 IBM Collaboration Solutions Directions and Strategy by Anna O'Neal
2011 IBM Collaboration Solutions Directions and Strategy2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and Strategy
Anna O'Neal849 views
2011 IBM Collaboration Solutions Directions and Strategy by Anna O'Neal
2011 IBM Collaboration Solutions Directions and Strategy2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and Strategy
Anna O'Neal828 views
The Big Flip: Mobile Apps in Financial Services by Relayware
The Big Flip: Mobile Apps in Financial ServicesThe Big Flip: Mobile Apps in Financial Services
The Big Flip: Mobile Apps in Financial Services
Relayware1.4K views
Wp byod by J
Wp byodWp byod
Wp byod
J 382 views
Video communications industry history by Paul Richards
Video communications industry historyVideo communications industry history
Video communications industry history
Paul Richards108.7K views
Mobile Security - 2015 Wrap-up and 2016 Predictions by Skycure
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure710 views
Make Mobilization Work - Properly Implementing Mobile Security by Michael Davis
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
Michael Davis1.1K views

Similar to Dark Clouds and Rainy Days, the Bad Side of Cloud Computing

2010: Mobile Security - WHYMCA Developer Conference by
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
4.1K views70 slides
The Consumerisation of Corporate IT by
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
457 views40 slides
Can You Steal From Me Now? Mobile and BYOD Security Risks by
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
987 views23 slides
The Future of Mobile Application Security by
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
1.3K views28 slides
La sécurité de l'emploi : protégez votre SI by
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
1.5K views50 slides
White Paper: Securing Nomadic Workforce by
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
422 views7 slides

Similar to Dark Clouds and Rainy Days, the Bad Side of Cloud Computing(20)

2010: Mobile Security - WHYMCA Developer Conference by Fabio Pietrosanti
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti4.1K views
The Consumerisation of Corporate IT by Peter Wood
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood457 views
Can You Steal From Me Now? Mobile and BYOD Security Risks by Michael Davis
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis987 views
The Future of Mobile Application Security by SecureAuth
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth1.3K views
La sécurité de l'emploi : protégez votre SI by Microsoft Ideas
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Microsoft Ideas1.5K views
White Paper: Securing Nomadic Workforce by Courtland Smith
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith422 views
Securing mobile devices_in_the_business_environment by K Singh
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
K Singh591 views
Countering Cybersecurity Risk in Today's IoT World by Brad Nicholas
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas936 views
Education webinar april 2012 by Infoblox
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
Infoblox1.9K views
ISACA CACS 2012 - Mobile Device Security and Privacy by Michael Davis
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis964 views
HIPAA Compliance in the Cloud by Online Tech
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
Online Tech385 views
Zabezpečení mobilních zařízení ve firemním prostředí by MarketingArrowECS_CZ
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
Mobile Payments: Protecting Apps and Data from Emerging Risks by IBM Security
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security1.4K views
Fortinet - Digital Government Cloud Security 2.pptx by ThanhBoHoaluaVn
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptx
ThanhBoHoaluaVn36 views
Безопасность данных мобильных приложений. Мифы и реальность. by Advanced monitoring
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
3 data leak possibilities that are easy to overlook by Peter Hewer
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
Peter Hewer27 views

Recently uploaded

Why and How CloudStack at weSystems - Stephan Bienek - weSystems by
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
111 views13 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
41 views9 slides
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
42 views13 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
74 views18 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
46 views35 slides
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
77 views29 slides

Recently uploaded(20)

Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue41 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue42 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue74 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE57 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray1080 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue77 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue82 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T by ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 views

Dark Clouds and Rainy Days, the Bad Side of Cloud Computing

  • 1. David Rogers, Copper Horse Solutions Ltd. DARK CLOUDS AND RAINY DAYS, THE BAD SIDE OF CLOUD COMPUTING CLOUD MOBILITY, 21ST SEPTEMBER 2011, AMSTERDAM Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 2. ABOUT ME  12 years in the mobile industry  Hardware and software background  Head of Product Security at Panasonic Mobile  Worked with industry and government on IMEI and SIMlock security  Pioneered some early work in mobile phone forensics  Brought industry together on security information sharing  Director of External Relations at OMTP  Programme Manager for advanced hardware security tasks  Chair of Incident Handling task  Head of Security and Chair of Security Group at WAC  Owner and Director at Copper Horse Solutions Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 3. ABOUT COPPER HORSE SOLUTIONS LTD  Established in 2011  Software and security company  Focused on the mobile phone industry  Services:  Mobile phone security consultancy  Industry expertise  Standards representation  Mobile application development  http://www.copperhorsesolutions.com Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 4. WHAT I WILL TALK ABOUT  Dark Clouds and Rainy Days – the dark side of cloud computing  Thin air – issues around device theft and tampering  Condensation – how much data is left on the device?  The problem with web apps  Slurping data, not coffee – insecure networks  How much do you trust your cloud provider? Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 5. THIN AIR – ISSUES AROUND DEVICE THEFT AND TAMPERING Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: 416style
  • 6. DEVICES – LOST AND STOLEN  Large numbers of devices are lost or stolen on a daily basis  iphone prototypes – 2 left in bars  UK – National Mobile Phone Crime Unit  IMEI blocking  Window between theft and blocking  Same problem with lock and wipe services  NMPR – National Mobile Property Register  Allows stolen / lost items to be returned to right owner  www.immobilise.com  EIRs and the CEIR  Lots of stolen phones are exported but not blocked  Users do not protect access to their devices  Barrier to usability  Most cloud services have authentication tokens – non-password access (see also faceniff)  Need to be told the basics: http://www.carphonewarehouse.com/security  Smartphone hacking is a major target right now  Hardware (SIMlock and IMEI) hacking has been going on for years Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 7. CONDENSATION – HOW MUCH DATA IS LEFT ON THE DEVICE? Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 8. DATA RESIDUE ISSUES  Devices move around:  Phone recycling companies  Phones left in drawers / thrown in bins  Phones passed onto another employee  Service returns and refurbishment issues  Repeated attacks on celebrities  Repeated mistakes in data clearing  Lots of “cloud” access data available  Browser data cache / local storage  Credentials for network APIs and services stored on device (not in secure hardware)  Users storing passwords insecurely on local machines  Apps / browsers providing “no-login” functionality  Note: These are all still issues in the non „cloud‟ world!! Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 9. THE PROBLEM WITH WEB APPLICATIONS Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: Clearly Ambiguous
  • 10. THE PROBLEM WITH WEBAPPS  Trust issues – e.g. Chrome application permissions issue / lack or proper triage with Android and Chrome apps.  Everyone is jumping on HTML5 but there will be hidden security issues  Ultimately there needs to be some form of local usage  HTML5 Cache, offline mechanisms still immature  No access to trusted hardware on device  Everything is transferred over a network  Even if you don‟t want it to be  Existing protection is weak  Web foundations are not secure (see later)  No such thing as a “secure web runtime”  In-app billing and other network APIs offer great fraud / attack potential  Targets will be identity and payment  Future: Device APIs & M2M  How to sync data without compromising users  How to control access  Public safety aspects – web for safety critical applications?! Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 11. RELIANCE ON CONNECTIVITY  Network access is not ubiquitous  Extremely poor wireless connections in rural areas (even in developed countries)  There is always an „offline‟ scenario for users, but few technical solutions for offline web Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: John Leach
  • 12. SLURPING DATA, NOT COFFEE – INSECURE NETWORKS Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: Thomas Dwyer (on a break from flickr)
  • 13. SLURPING DATA, NOT COFFEE  Incidents in internet cafes and airports, libraries  Very widespread  Expensive roaming costs push users onto WiFi  Fake WiFi Networks  Low hanging fruit  Temptation, temptation – open and free!  Recent attack demonstration of stealing data while charging phone at a charge booth  Femtocells  Recent hacker interest in femtocells (base stations in people‟s houses)  Can capture and break traffic  What about metrocells? Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 14. FACENIFF AND FIRESHEEP  MITM attack captures authentication cookies  Even on encrypted WiFi networks  Traffic is routed through attack device  Techniques available for years – made much easier by these kind of tools  Companies still not using SSL  Mobile version of facebook page has to be manually set as https by the user – most users cannot do this  Many phone applications send data in the clear  Google and Facebook have both been guilty of this Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: http://www.geekword.net
  • 15. HIDDEN NEAR A CAFÉ IN YOUR AREA… Image: http://cheezburger.com/View/1608846080 Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 16. HOW MUCH DO YOU TRUST YOUR CLOUD PROVIDER? Copyright © 2011 Copper Horse Solutions Limited. All rights reserved Image: Caza_No_7
  • 17. TRUST IN CLOUD PROVIDERS (1)  Poor security techniques employed  Phone hacking scandal  No user notification of accesses from other machines / times  Previous data issues – e.g. T-Mobile, Paris Hilton etc.  Password reminders have compromised online email accounts e.g. Sarah Palin  Facebook dragged into providing privacy protection for users Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 18. TRUST IN CLOUD PROVIDERS (2)  Who do your cloud provider trust?  Who are their suppliers?  What technology are they using?  RSA –targeted cyber attack  SecurID keys being replaced in many organisations  Diginotar – Fake (genuine) SSL certificates  Compromised Google Docs, Gmail and lots of other services  Shows how fragile the whole foundations of the „secure‟ web are  19th September (Monday) – BEAST attack against SSL  Can decrypt PayPal cookies Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 19. VIRTUALISATION  Platform agnostic dream  Does virtualisation on mobile handsets really bring extra security?  It offers a solution to companies wanting to own parts of a device e.g. for corporate policy management  It brings new (unknown) security risks  Immature products on mobile  Mobilemarket is still very fragmented  Same issues if the device is lost or stolen Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 20. TECHNICAL OUTAGES “for a currently unknown reason, the update did not work correctly” Microsoft response to DNS issue, September 2011  Unforeseen technical outages:  Google: Googledocs down for hours  Microsoft: DNS issue during maintenance http://cloudtechsite.com/blogposts/microsoft-and-google-suffer- from-recent-cloud-interruptions.html Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 21. TARGETED HACKTIVISM  Attacks on Amazon by Anonymous – unrelated to most users‟ services  DDoS attack failed – Amazon were servers capable of the demand  Companies like Mastercard did not fare as well  collateral damage issue  Conversely – Amazon‟s EC2 cloud capability was used against Sony  Lulzsec  Simplistic but devastating attacks  Difficult to track down  What groups come next?  F-Secure‟s Mikko Hypponen has called for an international Police Force: http://betanews.com/2011/09/12/we-need-an-international- police-force-to-fight-cybercrime/ Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 22. TARGETED HACKTIVISM (2)  Anonymous is the direction of hacktivist attacks for various ideals  Decentralised, no „head‟  #opfacebook  5th November 2011  Published rationale is Facebook privacy policy Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 23. TRUST IN CLOUD PROVIDERS (2)  At what point in the future does a cloud provider decide to sneak a look at the data it is storing?  What is the EULA?  What country is your data being held in?  What are the data protection and privacy laws?  Have you got customer data within your business data?  What happens when something goes wrong?  Business continuity  Despite operating agreements, what if a natural disaster happens?  Might not be the data centre that is affected  Cable theft is a huge issue  What about conflict and war? Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 24. WHAT THEN? Image: https://tooze.wordpress.com/tag/singtel/ Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 25. THE SILVER LINING?  Not quite silver yet:  Cloud services do provide a lot of good, but are not a panacea!  Primary business driver for cloud is cost. Security is a secondary concern  But:  Many attacks in the “offline” world can / have been much worse  Cloud providers and companies are recognising issues  Users are not accepting bad security / privacy  Not everything will live in the cloud Image: Nick Coombe Copyright © 2011 Copper Horse Solutions Limited. All rights reserved
  • 26. THANKS FOR LISTENING!  Any questions?  Contact me: david.rogers@copperhorses.com  Twitter: @drogersuk  Blog: http://blog.mobilephonesecurity.org Copyright © 2011 Copper Horse Solutions Limited. All rights reserved