SlideShare a Scribd company logo
1 of 10
akamai.com
Man-in-the-Middle Mobile Attacks
iOS and Android Targeted
= overview
Evidence suggests that organized and resourceful malicious
actors are attacking smartphones and tablets, primarily in
Asia
• The attacks attempt to extract personal data by phishing, man-in-the-
middle attacks, and installation of malicious applications such as
Remote Access Trojans
• Both iOS and Android devices are being targeted
• Attack techniques suggest a level of skill and resources typically only
available to veteran cybercriminals
The attacks illustrate the level of effort malicious actors are
willing to use to compromise mobile users
2 / [state of the internet] / threat advisory
= open-source attack intelligence
A variety of sources have publicized large attacks involving
mobile devices, including:
• FireEye published research that suggested the use of sophisticated
customized malware, indicating a high-level of skill and resources
typically only available to veteran criminals
• Large-scale attacks appear to have targeted companies that supply
SaaS and application services, such as Apple application services, by
conducting man-in-the-middle attacks on the Internet infrastructure
• GreatFire.org reported a man-in-the-middle attack against Apple iCloud
service, coinciding with the release of the iPhone 6
3 / [state of the internet] / threat advisory
= mobile interception
• Cell phone interception techniques may also have been used to
target victims of mobile attacks
• Interception and exploitation of common mobile protocols such
as GSM and CDMA is possible
• Cell phone interception allows attackers to:
⁄ Pinpoint the user’s location
⁄ Eavesdrop on communications
⁄ Modify incoming transmissions
⁄ View the communication and application protocol in use
• The attackers may have used this technology to target specific
applications and generate customized mobile payloads
4 / [state of the internet] / threat advisory
= Android, iOS, and the jailbreaking factor
Both iOS and Android OSes have been targeted by
the attacks
Android can be exploited much more readily than iOS
• Development resources are free and open-source
• Users can easily install unsigned and unverified third-party
apps
Exploitation can range from footprinting a specific
operating system version to complete takeover and
command
5 / [state of the internet] / threat advisory
= Android, iOS, and the jailbreaking factor
iOS attacks require high levels of skill on the part of the attackers
• iOS is closed-source, with limited access to development tools
• Applications must go through verification, approval, and review
• OS-based security controls require apps to be signed by Apple and downloaded
from the Apple Store
Attackers generally either:
• Impersonated or bypassed the Apple Store
• Created malicious apps which appeared identical to legitimate apps already
installed, replacing them without alerting security
Many users jailbreak their phones to install unverified third-party apps
• In China, 14% of the 60 million iOS devices have been jailbroken
• Entirely bypasses the security controls, leaving iOS open to attack
6 / [state of the internet] / threat advisory
= attack spotlight: Xsser mRAT
Xsser Mobile Remote Access Trojan (mRAT) is the first advanced
Chinese iOS Trojan
• Based off of Android spyware
• Broadly distributed in Hong Kong
• Infects jailbroken iOS devices by way of Cydia
• Payload is disguised as a Cydia source for a legitimate app
Once the payload binary is established, the malicious actor will
receive sensitive information about the infected device
• Stolen data may be used for extortion or social engineering
7 / [state of the internet] / threat advisory
= security advice
These attacks may be very hard to detect by the user
To prevent mobile infection, PLXsert recommends:
• Avoid using free Internet hot-spots
• Disable automatic Wi-Fi connection in untrusted places
• When possible, use VPNs to avoid eavesdropping and man-in-the-middle
attacks
• Ignore sudden or unexpected communications with unusual origin or content
• Do not respond with sensitive information without verifying the origin of
requests or communications
• Do not install any application from an unsigned and untrusted source
• Do not jailbreak phones; this exposes iOS to a wide range of attacks
8 / [state of the internet] / threat advisory
= threat advisory: mobile man-in-the-middle attacks
PLXSert has published a comprehensive threat advisory on this
topic: Man-in-the-Middle Attacks Target iOS and Android
The report contains detailed analysis on:
• Open source intelligence about attacks against mobile devices
• How attackers access Android devices
• How attackers access iOS devices
• Man-in-the-middle GSM and CDMA vulnerabilities
• Why jailbroken phones are at high risk
• How Xsser mRAT ends up on mobile phones
• The malicious use of the Cydia repository
• Infection prevention tips
9 / [state of the internet] / threat advisory
= about stateoftheinternet.com
• StateoftheInternet.com, brought to you by Akamai, serves as the
home for content and information intended to provide an
informed view into online connectivity and cybersecurity trends
as well as related metrics, including Internet connection speeds,
broadband adoption, mobile usage, outages, and cyber-attacks
and threats.
• Visitors to www.stateoftheinternet.com can find current and
archived versions of Akamai’s State of the Internet (Connectivity
and Security) reports, the company’s data visualizations, and
other resources designed to put context around the ever-
changing Internet landscape.
10 / [state of the internet] / threat advisory

More Related Content

What's hot

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityS.M. Towhidul Islam
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Research in progress defending android smartphones from malware attacks
Research in progress  defending android smartphones from malware attacksResearch in progress  defending android smartphones from malware attacks
Research in progress defending android smartphones from malware attacksJPINFOTECH JAYAPRAKASH
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySubramanian VE
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhanAhmed Sleem
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 

What's hot (20)

THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hacking
HackingHacking
Hacking
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Research in progress defending android smartphones from malware attacks
Research in progress  defending android smartphones from malware attacksResearch in progress  defending android smartphones from malware attacks
Research in progress defending android smartphones from malware attacks
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 

Similar to MITM Mobile Attacks Target iOS Android

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxNitishChoudhary23
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...eightbit
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 

Similar to MITM Mobile Attacks Target iOS Android (20)

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

MITM Mobile Attacks Target iOS Android

  • 2. = overview Evidence suggests that organized and resourceful malicious actors are attacking smartphones and tablets, primarily in Asia • The attacks attempt to extract personal data by phishing, man-in-the- middle attacks, and installation of malicious applications such as Remote Access Trojans • Both iOS and Android devices are being targeted • Attack techniques suggest a level of skill and resources typically only available to veteran cybercriminals The attacks illustrate the level of effort malicious actors are willing to use to compromise mobile users 2 / [state of the internet] / threat advisory
  • 3. = open-source attack intelligence A variety of sources have publicized large attacks involving mobile devices, including: • FireEye published research that suggested the use of sophisticated customized malware, indicating a high-level of skill and resources typically only available to veteran criminals • Large-scale attacks appear to have targeted companies that supply SaaS and application services, such as Apple application services, by conducting man-in-the-middle attacks on the Internet infrastructure • GreatFire.org reported a man-in-the-middle attack against Apple iCloud service, coinciding with the release of the iPhone 6 3 / [state of the internet] / threat advisory
  • 4. = mobile interception • Cell phone interception techniques may also have been used to target victims of mobile attacks • Interception and exploitation of common mobile protocols such as GSM and CDMA is possible • Cell phone interception allows attackers to: ⁄ Pinpoint the user’s location ⁄ Eavesdrop on communications ⁄ Modify incoming transmissions ⁄ View the communication and application protocol in use • The attackers may have used this technology to target specific applications and generate customized mobile payloads 4 / [state of the internet] / threat advisory
  • 5. = Android, iOS, and the jailbreaking factor Both iOS and Android OSes have been targeted by the attacks Android can be exploited much more readily than iOS • Development resources are free and open-source • Users can easily install unsigned and unverified third-party apps Exploitation can range from footprinting a specific operating system version to complete takeover and command 5 / [state of the internet] / threat advisory
  • 6. = Android, iOS, and the jailbreaking factor iOS attacks require high levels of skill on the part of the attackers • iOS is closed-source, with limited access to development tools • Applications must go through verification, approval, and review • OS-based security controls require apps to be signed by Apple and downloaded from the Apple Store Attackers generally either: • Impersonated or bypassed the Apple Store • Created malicious apps which appeared identical to legitimate apps already installed, replacing them without alerting security Many users jailbreak their phones to install unverified third-party apps • In China, 14% of the 60 million iOS devices have been jailbroken • Entirely bypasses the security controls, leaving iOS open to attack 6 / [state of the internet] / threat advisory
  • 7. = attack spotlight: Xsser mRAT Xsser Mobile Remote Access Trojan (mRAT) is the first advanced Chinese iOS Trojan • Based off of Android spyware • Broadly distributed in Hong Kong • Infects jailbroken iOS devices by way of Cydia • Payload is disguised as a Cydia source for a legitimate app Once the payload binary is established, the malicious actor will receive sensitive information about the infected device • Stolen data may be used for extortion or social engineering 7 / [state of the internet] / threat advisory
  • 8. = security advice These attacks may be very hard to detect by the user To prevent mobile infection, PLXsert recommends: • Avoid using free Internet hot-spots • Disable automatic Wi-Fi connection in untrusted places • When possible, use VPNs to avoid eavesdropping and man-in-the-middle attacks • Ignore sudden or unexpected communications with unusual origin or content • Do not respond with sensitive information without verifying the origin of requests or communications • Do not install any application from an unsigned and untrusted source • Do not jailbreak phones; this exposes iOS to a wide range of attacks 8 / [state of the internet] / threat advisory
  • 9. = threat advisory: mobile man-in-the-middle attacks PLXSert has published a comprehensive threat advisory on this topic: Man-in-the-Middle Attacks Target iOS and Android The report contains detailed analysis on: • Open source intelligence about attacks against mobile devices • How attackers access Android devices • How attackers access iOS devices • Man-in-the-middle GSM and CDMA vulnerabilities • Why jailbroken phones are at high risk • How Xsser mRAT ends up on mobile phones • The malicious use of the Cydia repository • Infection prevention tips 9 / [state of the internet] / threat advisory
  • 10. = about stateoftheinternet.com • StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. • Visitors to www.stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to put context around the ever- changing Internet landscape. 10 / [state of the internet] / threat advisory