2015 mobile threat report - the rise of mobile malware
TRANSCRIPT
![Page 1: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/1.jpg)
2015 Mobile Threat Report - The Rise of Mobile Malware
![Page 2: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/2.jpg)
AGENDA
• State of mobile security
• Understanding the mobile threat landscape
• Infections vectors
• Top monetization schemes
• Emergence of the mobile cybercrime underground
• Consumer awareness of mobile security threats
2
![Page 3: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/3.jpg)
THE STATE OF MOBILE SECURITY
Mobile downloads will increase to
108 billion by 2017. 2
Mobile malware is growing. Malicious
code is infecting more than
11.6 million mobile devices at any
given time. 3
In 2014 the number of cell phones
(7.3 billion) will exceed the
number of people on the planet (7 billion).1
Mobile devices and the apps we rely on
are under attack.
90% of the top mobile apps have
been hacked. 4
AS MOBILE GROWS, SO DO SECURITY THREATS
![Page 4: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/4.jpg)
4
Responded that they do not know if they had been made vulnerable
Do not know whether they had any corporate assets hijacked for botnet use or if they had any user credentials stolen in 2014.
Do not know if they had become victimized by an advanced persistent threat (APT)
SECURITY IS LAGGING
![Page 5: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/5.jpg)
5
FS-ISAC
Regulations
REGULATORS AND INDUSTRY BODIES CALL TO SECURE THE MOBILE CHANNEL
Regulations
![Page 6: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/6.jpg)
UNDERSTANDING THE MOBILE THREAT LANDSCAPE
6
Jailbroken/ Rooted Outdated OS
Unsecure Wifi
Mobile Malware
Rogue Apps
App Vulnerabilities
Stolen Device BYOD
App hacking
Secure?
Fake Apps
![Page 7: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/7.jpg)
UNDERSTANDING THE MOBILE THREAT LANDSCAPE
7
Security Intelligence
Secure the Device
Secure the Application
Identity, Fraud, and Data Protection
Secure the Transaction Personal and
Consumer Enterprise
Secure the Device Secure the Application Secure the Transaction
Security Intelligence
Stolen Device
App Vulnerabilities
HIGH LOW Solutions for the Spectrum of Business Span of Control
Business Partners
Consumer Transactions
Task/Temp Workers
Employees w/BYOD
Corporate Owned Assets
Outdated OS
Jailbroken/ Rooted
Unsecure Wifi App hacking Fake Apps
Rogue Apps / Mobile Malware
Mobile fraud
Vulnerable devices
Data Breach
![Page 8: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/8.jpg)
MOBILE DEVICE RISK
8
Risk
Jailbroken/ Rooted
Outdated OS
Unsecure Wifi
Malware Rogue Apps
Stolen Device
![Page 9: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/9.jpg)
THE MALWARE IS OUT THERE
9
H1’ 2015 infection rates
![Page 10: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/10.jpg)
10
87% 72%
MOBILE MALWARE TOP MONETIZATION SCHEMES
• Financial information stealers
• 2-Factor Authentication/One-Time-Passwords/Token codes hijacking
• Telephony Fraud
• Scare-Ware and Dummy Apps
• The Top-Up Trojan
• Mobile Ransomware
![Page 11: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/11.jpg)
MOBILE BANKING FRAUD
![Page 12: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/12.jpg)
12
MOBILE RANSOMWARE
![Page 13: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/13.jpg)
13 13
OLD “FRIENDS” CRASH THE PARTY
![Page 14: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/14.jpg)
MALWARE LEADS TO MALWARE
14
![Page 15: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/15.jpg)
15
INFECTION VECTORS - PHISHING / SMISHING
15
![Page 16: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/16.jpg)
16
CROSS-CHANNEL INFECTIONS
•Cybercriminals convince users to supply mobile phone number to install app on phone via malware or phishing
•Users installs fake security application and enters “activation code” in PC malware confirming they completed the mobile install
•Malware captures all SMS traffic, including OTP and forwards to fraudsters allowing fraudulent transfers via Web and using captured OTP to bypass authentication
16
Coordinated attacks across PC and mobile
![Page 17: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/17.jpg)
INFECTION VECTORS – FAKE APPS
17 17
Over 80,000 users have granted the apps permission
to run on their browser, despite the warning the games
will receive full access to a player’s web activity
![Page 18: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/18.jpg)
18
VULNERABLE DEVICES
18
![Page 19: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/19.jpg)
19
INFECTED APPS ON THE OFFICIAL STORES
19
![Page 20: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/20.jpg)
OTHER INFECTION VECTORS
20
![Page 21: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/21.jpg)
21
EMERGENCE OF THE MOBILE CYBERCRIME UNDERGROUND
![Page 22: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/22.jpg)
22 22
UNDERGROUND DISCUSSIONS
![Page 23: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/23.jpg)
24
THE MOBILE MALWARE ECO SYSTEM
![Page 24: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/24.jpg)
EXAMPLE OF MOBILE MALWARE OFFERING
• Gain administrator privilege level on the device
• Grab and send all device information (Phone number, ICCD, IMEI, IMSI, Model, OS)
• Intercept and send out SMS content to admin panel and controlling number.
• Covertly send SMS to any number – invisible to the victim and grab all incoming and outgoing SMS content.
• Redirect calls from the device to another number.
• Grab all contact and call logs and send to admin panel.
• Record audio files via the devices camera and send to admin panel.
25
![Page 25: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/25.jpg)
EXAMPLE OF UNDERGROUND PRICE LIST
26
ITEM PURPOSE PRICE* PRICING MODEL
BOT ADMIN PANNEL
MANAGE A BOTNET $4000 DOWN + $500 MONTHLY FEES
TO RENT
MAZWLTOV! MALWARING SPREADING $3000 SERVICE SPYWARE CYBER-ESPIONAGE $7,000 TO OWN BANKIR FINANCIAL INFORMATION
STEALER
$5000 TO OWN
X-iTmo SMS 2FA INTERCEPTOR $715 TO RENT (3 MONTHS)
*Prices In USD. Original prices are in USD or BTC
![Page 26: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/26.jpg)
27
390
609
355
CONSUMER AWARENESS OF MOBILE SECURITY THREATS
![Page 27: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/27.jpg)
IBM MOBILE SECURITY FRAMEWORK
28
MobileFirst Protect (MaaS360)
AppScan, Arxan, Trusteer M; bile SDK
AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana
HP Fortify, Veracode, Proguard CA, Oracle, RSA
• Manage multi-OS BYOD environment
• Mitigate risks of lost & compromised devices
• Separate enterprise and personal data
• Enforce compliance with security policies
• Distribute & control enterprise apps
• Build and secure apps & protect them “in the wild”
• Provide secure web, mobile, API access control
• Meet ease-of-use expectation
Extend Security Intelligence
• Extend security information & event management (SIEM) to mobile platform
• Incorporate mobile log management, anomaly detection, configuration & vulnerability mgmt
Protect Devices Secure Content & Collaboration Safeguard Applications & Data Manage Access & Fraud Extend Security Intelligence
DATA
Personal and Consumer
Enterprise
Manage Access & Fraud
Safeguard Applications & Data
Secure Content & Collaboration
Protect Devices
![Page 28: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/28.jpg)
NEW CSX TRAINING & CERTIFICATIONS
Introducing CSX Skills-Based Cybersecurity Training and Performance-Based Certifications! • Designed to help you build, test and showcase your skills in critical areas of cybersecurity – and prove you have the ability to do the job
from day one.
• Unlike other certifications available today which test for knowledge in a question and answer format, CSX training and exams are conducted in a live, virtual “cyber lab” environment — providing validation of actual technical skill, ability and performance.
• Training courses will be available through leading global training partners, to help professionals build skills needed at each certification level
29
![Page 29: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/29.jpg)
![Page 30: 2015 Mobile Threat Report - The Rise of Mobile Malware](https://reader030.vdocument.in/reader030/viewer/2022032620/55c6cfb6bb61ebac7c8b4609/html5/thumbnails/30.jpg)