SlideShare a Scribd company logo
1 of 26
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id
Android Malware Operating System
Indonesian Coder Get The Code and Free The Soul/
ABOUT ME
M. Ali Syarief a.k.a jos_ali_joe
Security Analyst , Pentester , Malware Analyst  
OVERVIEW
THE EVOLUTION OF MOBILE MALWARE
2004
Percobaan Pertama
2005
MMS sebagai Media Penyebaran
2006
Malware sebagai Mesin Penghasil Uang
2007 – 2008
Periode Transisi
2009
Perkenalan Botnet Mobile
2010
Mobile Malware Era Industri
2011
Android, Android, dan Android!
2013-2017
Permainan Dimulai - Berbagai Metode Serangan Baru
Indonesia
Rank 5 (40.36% )
securelist.com
RISK TOOL
ADWARE
TROJAN-DROPPER
TROJAN -SMS
TROJAN-SPY
TROJAN-RANSOM
TROJAN-BANKER
TROJAN-DOWNLOADER
BACKDOOR
OTHER
43,32%
13,23%
11,33
%
11,10%
10,45%
4,26%
2,10%
1,48%
1,68%
0,93%
Malware
Malware
Bukan rahasia bahwa ponsel Android sangat rentan terjangkit malware.
Salah satu sebabnya adalah kebijakan Google yang diterapkan pada Play Store dalam menyeleksi aplikasi yang masuk.
INSTALL
APP
MALWA
RE
Ciri-Ciri Android Yang
Terkena Infeksi
Malware
Berdoalah Semoga
Smartphone Anda
Aman
 ID-Malware Summit 2017 -

More Related Content

Similar to ID-Malware Summit 2017 -

Cyber crime Bani Umar bintaro
Cyber crime   Bani Umar bintaroCyber crime   Bani Umar bintaro
Cyber crime Bani Umar bintaroKiki Noviandi
 
Cyber Crime di Indonesia
Cyber Crime di IndonesiaCyber Crime di Indonesia
Cyber Crime di IndonesiaPT Lion Air
 
Ahmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident UpdatesAhmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident UpdatesIndonesia Honeynet Chapter
 
Various way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - AbdullahVarious way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - Abdullahidsecconf
 
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9AzhyqaRereanticaMart
 
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologi
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologiPengantar Keamanan Teknologi Informasi fakultas sains dan teknologi
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologiirwansyafibonaci
 
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdf
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdfPloutus ATM Malware Ancaman bagi Industri Keuangan.pdf
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdfIQbal KHan
 

Similar to ID-Malware Summit 2017 - (8)

Cyber crime Bani Umar bintaro
Cyber crime   Bani Umar bintaroCyber crime   Bani Umar bintaro
Cyber crime Bani Umar bintaro
 
Cyber Crime di Indonesia
Cyber Crime di IndonesiaCyber Crime di Indonesia
Cyber Crime di Indonesia
 
Ahmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident UpdatesAhmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident Updates
 
Various way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - AbdullahVarious way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - Abdullah
 
Jul pustekom 316 upload
Jul  pustekom 316 uploadJul  pustekom 316 upload
Jul pustekom 316 upload
 
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9
Azhyqa rereantica martkliana 43217120150 quiz pertemuan 9
 
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologi
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologiPengantar Keamanan Teknologi Informasi fakultas sains dan teknologi
Pengantar Keamanan Teknologi Informasi fakultas sains dan teknologi
 
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdf
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdfPloutus ATM Malware Ancaman bagi Industri Keuangan.pdf
Ploutus ATM Malware Ancaman bagi Industri Keuangan.pdf
 

Recently uploaded

SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPAS
SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPASSK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPAS
SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPASsusilowati82
 
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptx
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptxMATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptx
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptxrandikaakbar11
 
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdfAndiCoc
 
Aksi Nyata Modul 1.3 Visi Guru penggerak
Aksi Nyata Modul 1.3 Visi Guru penggerakAksi Nyata Modul 1.3 Visi Guru penggerak
Aksi Nyata Modul 1.3 Visi Guru penggerakDianPermana63
 
Analisis Regresi Analisis Regresi dan Korelasi.ppt
Analisis Regresi Analisis Regresi dan Korelasi.pptAnalisis Regresi Analisis Regresi dan Korelasi.ppt
Analisis Regresi Analisis Regresi dan Korelasi.pptRahmaniaPamungkas2
 
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdfAndiCoc
 
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdfAndiCoc
 
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptx
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptxAksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptx
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptxAgusSuarno2
 
Materi Penggolongan Obat Undang-Undang Kesehatan
Materi Penggolongan Obat Undang-Undang KesehatanMateri Penggolongan Obat Undang-Undang Kesehatan
Materi Penggolongan Obat Undang-Undang KesehatanTitaniaUtami
 
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdfAndiCoc
 
prinsip dasar kepramukaan dan metode kepramukaan
prinsip dasar kepramukaan dan metode kepramukaanprinsip dasar kepramukaan dan metode kepramukaan
prinsip dasar kepramukaan dan metode kepramukaanaji guru
 
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdfMODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdfAndiCoc
 
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdf
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdfMODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdf
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdfAndiCoc
 
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdfAndiCoc
 
Materi: Mengapa tidak memanfaatkan Media ?
Materi: Mengapa tidak memanfaatkan Media ?Materi: Mengapa tidak memanfaatkan Media ?
Materi: Mengapa tidak memanfaatkan Media ?AdePutraTunggali
 
Informatika Latihan Soal Kelas Tujuh.pptx
Informatika Latihan Soal Kelas Tujuh.pptxInformatika Latihan Soal Kelas Tujuh.pptx
Informatika Latihan Soal Kelas Tujuh.pptxMateriSMPTDarulFalah
 
Materi Kimfar Asam,Basa,Buffer dan Garam
Materi Kimfar Asam,Basa,Buffer dan GaramMateri Kimfar Asam,Basa,Buffer dan Garam
Materi Kimfar Asam,Basa,Buffer dan GaramTitaniaUtami
 
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]Fathan Emran
 
UAS Matematika kelas IX 2024 HK_2024.pdf
UAS Matematika kelas IX 2024 HK_2024.pdfUAS Matematika kelas IX 2024 HK_2024.pdf
UAS Matematika kelas IX 2024 HK_2024.pdfssuser29a952
 
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdfAndiCoc
 

Recently uploaded (20)

SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPAS
SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPASSK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPAS
SK PANITIA PELAKSANA IHT SMPN 2 KEMPAS KECAMATAN KEMPAS
 
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptx
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptxMATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptx
MATERI Projek Kreatif Kewirausahaan kelas XI SMK.pptx
 
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR SENI RUPA KELAS 2 KURIKULUM MERDEKA.pdf
 
Aksi Nyata Modul 1.3 Visi Guru penggerak
Aksi Nyata Modul 1.3 Visi Guru penggerakAksi Nyata Modul 1.3 Visi Guru penggerak
Aksi Nyata Modul 1.3 Visi Guru penggerak
 
Analisis Regresi Analisis Regresi dan Korelasi.ppt
Analisis Regresi Analisis Regresi dan Korelasi.pptAnalisis Regresi Analisis Regresi dan Korelasi.ppt
Analisis Regresi Analisis Regresi dan Korelasi.ppt
 
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 2 KURIKULUM MERDEKA.pdf
 
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 3 KURIKULUM MERDEKA.pdf
 
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptx
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptxAksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptx
Aksi Nyata Cegah Perundungan Mulai dari Kelas [Guru].pptx
 
Materi Penggolongan Obat Undang-Undang Kesehatan
Materi Penggolongan Obat Undang-Undang KesehatanMateri Penggolongan Obat Undang-Undang Kesehatan
Materi Penggolongan Obat Undang-Undang Kesehatan
 
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdfMODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 2 KURIKULUM MERDEKA.pdf
 
prinsip dasar kepramukaan dan metode kepramukaan
prinsip dasar kepramukaan dan metode kepramukaanprinsip dasar kepramukaan dan metode kepramukaan
prinsip dasar kepramukaan dan metode kepramukaan
 
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdfMODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR MATEMATIKA KELAS 4 KURIKULUM MERDEKA.pdf
 
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdf
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdfMODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdf
MODUL AJAR PENDIDIKAN AGAMA ISLAM & BUDI PEKERTI (PAIBP) KELAS 6.pdf
 
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 5 KURIKULUM MERDEKA.pdf
 
Materi: Mengapa tidak memanfaatkan Media ?
Materi: Mengapa tidak memanfaatkan Media ?Materi: Mengapa tidak memanfaatkan Media ?
Materi: Mengapa tidak memanfaatkan Media ?
 
Informatika Latihan Soal Kelas Tujuh.pptx
Informatika Latihan Soal Kelas Tujuh.pptxInformatika Latihan Soal Kelas Tujuh.pptx
Informatika Latihan Soal Kelas Tujuh.pptx
 
Materi Kimfar Asam,Basa,Buffer dan Garam
Materi Kimfar Asam,Basa,Buffer dan GaramMateri Kimfar Asam,Basa,Buffer dan Garam
Materi Kimfar Asam,Basa,Buffer dan Garam
 
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]
Modul Ajar Matematika Kelas 5 Fase C Kurikulum Merdeka [abdiera.com]
 
UAS Matematika kelas IX 2024 HK_2024.pdf
UAS Matematika kelas IX 2024 HK_2024.pdfUAS Matematika kelas IX 2024 HK_2024.pdf
UAS Matematika kelas IX 2024 HK_2024.pdf
 
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdfMODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdf
MODUL AJAR BAHASA INDONESIA KELAS 4 KURIKULUM MERDEKA.pdf
 

ID-Malware Summit 2017 -

Editor's Notes

  1. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  2. Good morning members of the jury. It’s great to see you all here, Thank you for coming today I'd like to start by introducing myself. And I will be assisted by my partners here. We are researchers on malware from malware lab Id-SIRTII. Indonesia And today I am here to provide you some exciting information about new OS, which is going to be very beneficial for you in future. Gameover Zeus and Cryptolocker are some of the most well-known pieces of malware that target financial data, but there are many other variants and types of credentials stealing Trojans out there that you need to pay attention to.
  3. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  4. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  5. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  6. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  7. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  8. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  9. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  10. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  11. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  12. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  13. Fact and Figures Consumers in asia pacific will spend $11 billion dealing with security issues created by malware
  14. So it is all up to you now. We hope that in the future, AMOS can be distributed, developed and used to protect our data privacy againts malware attacks. The choice is yours….
  15. So it is all up to you now. We hope that in the future, AMOS can be distributed, developed and used to protect our data privacy againts malware attacks. The choice is yours….
  16. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  17. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  18. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  19. AMOS uses Xubuntu as the system base and the system design. It is a combination between Ubuntu which is stable and XFCE which is light. AMOS is an open source - android malware OS built in 2013 which is light and effective and particularly used to analyze malware and protect devices from the malware attacks anytime and anywhere.
  20. AMOS uses Xubuntu as the system base and the system design. It is a combination between Ubuntu which is stable and XFCE which is light. AMOS is an open source - android malware OS built in 2013 which is light and effective and particularly used to analyze malware and protect devices from the malware attacks anytime and anywhere.