SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Singtel Business
Product Factsheet
Managed Defense Services
Singtel Business
White Paper
A CISO’s Guide to Mobile Threat Prevention
A CISO’s Guide to
Mobile Threat Prevention.
You already know that cybercrime and espionage are on the rise, and that security breaches
can cripple your organisation and damage your brand and reputation. What you may not
realise is that standard security solutions are not strong enough for mobile devices and
apps in the workplace. This paper offers security professionals a better understanding of
some of the unique challenges of securely enabling a mobile workforce.
A CISO’s Guide to Mobile Threat Prevention
Overview
The Five Major Threats to Mobile Security
We’ve identified five major categories of attacks and vulnerabilities that can challenge the security of your business. For each
category we include the best practices for dealing with these challenges.
1. System vulnerabilities
Each version of an operating system for a mobile device offers vulnerabilities that cyber criminals can use to launch attacks.
New versions are notoriously late to market. Critical security updates might not make it through testing for weeks or even
months, leaving users exposed.
Android is particularly vulnerable. The 24,000+ different types of Android smartphones and tablets are not updated
consistently and at the same time. Most devices are still using older Android versions in which vulnerabilities have not been
patched.2
Apple’s iOS is less vulnerable because Apple makes only a handful of different devices and consistently prompts users to
update them.3
However, though the number of attacks in 2015 was low, there were twice as many as in 2014, and these
more sophisticated attacks work on devices that haven’t been jailbroken.4
The explosive proliferation of personal smartphones and tablets in the workplace exposes your company to increased risks.
While a breach of personally identifiable information or payment card data is certainly a top concern for many businesses,
there are other risks that any organisation needs to consider. Chief among these are the cost of breaches and responding to
incidents, the potential damage to brand reputation, and a loss of competitive advantage if valuable trade secrets or
intellectual property become public knowledge.1
Mobile systems, the networks they connect to, and the apps they run can all be exploited to steal sensitive information such
as documents, calendar appointments, email messages, texts, and attachments. Cyber criminals can use a device’s
microphone and camera to spy on closed-door meetings, and then send recordings to a secret remote server. They can
even capture user names and passwords as users log in to corporate systems containing sensitive data. Unsecured networks,
or networks using faulty or old security measures, make it possible for criminals to snoop, steal, or even change data sent to
and from devices. Malicious apps can give attackers virtually unrestricted access to a device, its data, and your network.
Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones
and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect newly
created malware or the vulnerabilities in networks, operating systems, and apps.
System
vulnerabilities
Trojans and
malware
Root access and
configuration
changes
Repackaged
and fake apps
Man-in-the-
middle attacks
The cost to understand and recover from a single breach soared 23% in 2015 to a breathtaking $3.79 million, according to the Ponemon Institute. Considering it takes an average
of 256 days just to spot a breach and 82 days to respond to a breach, the damage happening without your knowledge could be catastrophic. In a survey conducted by Ponemon in
April 2014, 29% said that a data breach made them less likely to have a relationship with the company, while 15% said they would discontinue their relationship altogether.
As of early 2016, most devices were still using the older Android versions code-named Jelly Bean (24.7%), KitKat (36.1%), and Lollipop (32.6%). A mere 7% were using the newest
version code-named Marshmallow, which was patched to fix 23 vulnerabilities, two of them critical. For details, see OpenSignal, “Android Fragmentation Visualized,” August 2015,
and Google Developer Dashboard, http://developer.android.com/about/dashboards/index.html, January 2015.
As of early 2016, at least 85% of users had updated to iOS 8, leaving just 15% lagging behind. See OpenSignal, “Android Fragmentation Visualized”, August 2015.
Check Point mobile threat intelligence report, 2015. https://www.checkpoint.com/resources/2015securityreport/
1
2
3
4
2. Root access and configuration changes
Gaining root access to a smartphone or tablet (also called “rooting” with Android or “jailbreaking” with iOS) is no longer
only for gadget enthusiasts. Root access enables a wide range of customisations and configurations. It also gives criminals
greater access, which exposes devices and data to risk.
Configuration changes, which users might accept when installing legitimate apps or businesses might make to meet policy
requirements, can also be used by criminals to stage attacks. Certain configuration settings, such as allowing an Android
device to install third-party apps from unknown sources, expose significant vulnerabilities.
Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) systems, which are used to manage
devices, configuration settings, and security policies, offer static root indicators. They work by detecting the existence of
certain files in a system directory that enable root access. However, free tools are available for avoiding this type of
detection.5
With root access, cyber criminals can even deny root check requests from the EMM or MDM system, bypassing
detection entirely.
Enterprises need to look beyond static indicators and use advanced techniques for detecting if and how root access was
granted. A comprehensive solution would also monitor all configuration changes and use behavioural analysis to detect
unexpected system behaviour. This solution should be integrated with your organisation’s MDM or EMM system to restrict
access and make real-time, risk-based policy adjustments on compromised devices that MDM and EMM systems on their
own can’t detect. A solution that provides dynamic threat response can prevent compromised devices from accessing your
company’s network.
3. Repackaged and fake apps
Malicious apps can take control of mobile devices. The app may not appear to be malicious, and users may not notice or
understand the permissions they grant during installation. Even popular apps can be reverse-engineered and injected with
malicious code, and then uploaded to an app store under a different name.6
Repackaged or renamed apps may provide the
app’s essential functions but also infect the user’s device.
Criminals also create seemingly authentic copies of apps that include similar icons, descriptions, screenshots, and even user
reviews, but don’t work as intended — victims get a malicious payload, such as a subscription to an expensive texting
service or a stealthy surveillance tool. Malicious apps can enable a host of activities, such as remotely seizing control of the
device’s camera and microphone to spy on users and their surroundings. Some trustworthy apps can exhibit risky behaviour,
causing false-positive headaches for security teams and a poor experience for users who might be blocked from using
completely safe apps.7
Best Practices
• Continually analyse devices to uncover system vulnerabilities and criminal behaviours.
• Automatically mitigate risk until the threat is eliminated.
Best Practices
• Use both static and dynamic detection methods to determine if root access has occurred and how it occurred.
• Monitor all configuration changes.
• Use behavioural analysis to detect unexpected system behaviour.
• Integrate advanced detection with EMM or MDM systems for real-time policy adjustments on compromised devices.
For example, Xposed Framework for Android and xCon for iOS.
Flappy Bird, a massively popular Android game, was reverse-engineered to include malware, renamed to a similar name, and uploaded to Google Play. Once discovered, the
app was promptly removed by Google, but not before it had been downloaded by unknown numbers of unsuspecting Android users.
Facebook, for example, syncs and uploads contacts and calendar details, and even records voice during status updates. Although this behaviour is associated with the most
aggressive types of malware, Facebook isn’t malicious.
5
6
7
Cyber criminals make it their business to exploit the weakest links in your systems. You need a solution that continuously
analyses devices to uncover vulnerabilities and the behaviours cyber criminals use to attack devices. When a threat is
identified, the solution must automatically mitigate any risk until the threat is eliminated. With better visibility into the
vulnerabilities of mobile device systems, you can reduce your overall attack surface and your risk.
Mobile anti-virus protection solutions can uncover malicious code in apps by looking for unique binary signatures, but
criminals may have found a way to obfuscate those signatures. Besides, signatures are not yet available for “zero-day”
(newly created) malware. Your solution must employ additional detection methods, such as monitoring the app’s installation
process and determining whether the app actually came from an app store or was installed from some other source.
To ensure productivity with safe apps and still block unsafe apps, you can deploy a solution that captures apps as they are
downloaded, and runs each app in a virtual “sandbox” environment to analyse its behaviour. A cloud solution can
aggregate intelligence about the developer’s reputation, the number of downloads, the app source, and the reputation of
the servers the app talks to, and then white-list the trustworthy apps automatically so that users can download them without
security issues.
4. Trojans and malware
Criminals invest heavily in developing new techniques to install and hide malware. Trojans, carried within an app or installed
through an unsecured network connection, infect a device with malicious code that may conduct surveillance by
eavesdropping and recording conversations, extracting call logs, tracking locations, logging keyboard activity, and
collecting passwords.
An app’s code is like a tremendous map of virtually infinite routes. The logic of one line of code may have dozens or even
thousands of touch points, all within the same app. This makes it difficult to understand if any of these routes are designed
to install a trojan or trigger malicious activity. To expose malicious code, you can deploy a solution that captures apps and
reverse-engineers them automatically. This creates a blueprint for semantic analysis that can identify suspicious patterns and
behaviours. For example, advanced code-flow analysis can expose whether hard-coded phone numbers are used to contact
premium messaging services, or if the code is using the device microphone to record sound files it then sends to nefarious
external servers.
To mitigate risks already found in devices, you can automate responses and user notifications on the devices with
remediation steps, or dynamically trigger device policy changes in your MDM or EMM solution. You should also block traffic
to malicious servers to contain the attack so that users can continue using their devices until remediation is complete.
Best Practices
• Use both static and dynamic detection methods to determine if root access has occurred and how it occurred.
• Uncover malicious code in apps by looking for the unique binary signatures for known malware.
• Determine whether an app came from an app store or some other source, and monitor the app installation process.
• Capture apps as they are downloaded and run them in a “sandbox” environment to analyse their behaviours before
flagging them as malicious.
• Aggregate and correlate intelligence about the developer’s reputation, the number of downloads, the app source,
and the reputation of the app’s servers, in order to white-list legitimate apps.
Best Practices
• Capture and reverse-engineer apps for code-flow analysis to expose any suspicious behaviour.
• Automate responses and user notifications with remediation steps to remove the malware.
• Dynamically trigger device policy changes in your MDM or EMM solution.
• Block traffic to malicious servers to contain the attack.
SSL (Secure Sockets Layer) is a standard for establishing an encrypted link between a server and a client - typically a website and a browser, or a mail server and a mail client (such
as Outlook). SSL stripping circumvents automatic redirection to secure connections, and SSL bumping uses fake certificates to fool apps and browsers into believing they’re using
private web connections. Both of these attacks can leave sensitive data unprotected.
8
5. Man-in-the-middle attacks
Man-in-the-middle attacks can eavesdrop, intercept and alter traffic between two devices. You believe you are interacting
with a known and trusted entity, but an attack is copying credentials, snooping on instant messages, or stealing sensitive
information. The familiar alert and warning signs on PCs and laptops are far more subtle and easily overlooked on mobile
devices. Small screen sizes can hide web addresses, making it harder to validate the address the browser is pointing to.
Public Wi-Fi hotspots, which are convenient for internet access, are easy to fake. An attacker can create a spoofed Wi-Fi
network, or eavesdrop and alter a legitimate network’s encrypted communications by using spoofed certificates or
downgrading the communication link so that it is no longer encrypted.8
The attacker can then intercept communications,
alter data in transit, or install a trojan.
You need behavioural analysis that can detect rogue hotspots and malicious network behaviour and conditions, and
automatically disable suspicious networks to keep devices and your data safe. Your solution should validate the integrity of
secure connections to detect compromises, and use a cloud-based honeypot — a system set up to attract and identify
attackers who try to penetrate your network. You may also want to dynamically trigger a secure Virtual Private Network
(VPN) on the device to protect the privacy and integrity of communications and minimise the impact of an attack.
Conclusion
Many companies enforce basic mobile hygiene policies using mobile device management to address security and bring-
your-own-device issues. Some augment this management with a hodgepodge of point solutions that offer incremental and
often rudimentary enhancements. These solutions may control the potential damage inflicted by lost or stolen devices, but
they address risks only on the surface.
Comprehensive mobile security should be a system of components that work together cohesively to identify a wide variety
of threats and to protect data while addressing employee privacy concerns. Only solutions that can analyse behaviour across
all vectors for indicators of attack can protect mobile devices effectively to keep them safe.
Singtel Mobile Threat Prevention is a multilayered security infrastructure that provides comprehensive protection. It identifies
threats using on-device, network and cloud-based algorithms, and triggers automatic defence responses. Its cloud-based risk
engine identifies suspicious patterns and behaviours over time by sandboxing apps in an emulator and detecting threats at
the device, app, and network levels. The infrastructure integrates with existing security investments to support incident
response and provide continuous protection. As a result, organisations always have an accurate picture of the types of threats
devices on their network are facing, as well as detailed information about what is being done to mitigate those risks.
Best Practices
• Use behavioural analysis to detect rogue hotspots and malicious network behaviour.
• Automatically disable suspicious networks to keep devices and your data safe.
• Validate the integrity of secure connections to detect compromises.
• Use a cloud-based honeypot to attract and identify attackers.
• Use on-device remediation to dynamically trigger a secure VPN that protects the privacy and integrity of your
communications.
Copyright © 2016 Singapore Telecommunications Ltd (CRN:199201624D). All rights reserved.
All other trademarks mentioned in this document are the property of their respective owners.
July2016
www.singtel.com/MTP g-singtelemm@singtel.comFor more information
About Singtel
Singtel is Asia's leading communications group providing a portfolio of services including voice
and data solutions over fixed, wireless and Internet platforms as well as infocomm technology
and pay TV. The Group has presence in Asia, Australia and Africa with over 605 million mobile
customers in 25 countries, including Bangladesh, India, Indonesia, the Philippines and Thailand.
It also has a vast network of offices throughout Asia Pacific, Europe and the United States.
About Check Point Software Technologies
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally,
providing industry-leading solutions and protecting customers from cyber attacks with an
unmatched catch rate of malware and other types of threats. Check Point offers a complete
security architecture defending enterprises – from networks to mobile devices – in addition to
the most comprehensive and intuitive security management. Check Point protects over 100,000
organisations of all sizes.
Awards
Asia Communications Awards 2016
Best Customer Care: Business
Computerworld SG Customer Care Awards
Telecommunications Services (2008 – 2015)
Frost & Sullivan Singapore Excellence Awards 2015
Mobile Service Provider of the Year
Telecom Service Provider of the Year
HWM + Hardwarezone.com Tech Awards
Best Telco, Singapore (2010 – 2016)
Best Fibre Broadband Service , Singapore (2010 – 2016)
NetworkWorld Asia Info Mgmt Awards
Security-as-a-Service (2012 – 2016)
NetworkWorld Asia Readers’ Choice Awards
Managed Infrastructure Services (2012 – 2015)
Managed Security Services (2014 – 2015)
Contact your Mobile Sales Specialist

Contenu connexe

Tendances

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 

Tendances (20)

Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Continuous Monitoring for Web Application Security
Continuous Monitoring for Web Application SecurityContinuous Monitoring for Web Application Security
Continuous Monitoring for Web Application Security
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Can Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successCan Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster success
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurity
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 

En vedette

Sperotree-Logo
Sperotree-LogoSperotree-Logo
Sperotree-Logo
Cathy Hill
 

En vedette (13)

GEOMATICS ANALYSIS ON LAND USE LAND COVER CLASSIFICATION SYSTEM IN PRECAMBRIA...
GEOMATICS ANALYSIS ON LAND USE LAND COVER CLASSIFICATION SYSTEM IN PRECAMBRIA...GEOMATICS ANALYSIS ON LAND USE LAND COVER CLASSIFICATION SYSTEM IN PRECAMBRIA...
GEOMATICS ANALYSIS ON LAND USE LAND COVER CLASSIFICATION SYSTEM IN PRECAMBRIA...
 
abortion
abortionabortion
abortion
 
OPEP 2015
OPEP 2015OPEP 2015
OPEP 2015
 
Bring The World To Your Doorstep & Classroom
Bring The World To Your Doorstep & ClassroomBring The World To Your Doorstep & Classroom
Bring The World To Your Doorstep & Classroom
 
Mastermind Java
Mastermind Java Mastermind Java
Mastermind Java
 
RESISTANCE DISTANCE METHOD FOR DETERMINATION OF ISOMORPHISM AMONG PLANAR KINE...
RESISTANCE DISTANCE METHOD FOR DETERMINATION OF ISOMORPHISM AMONG PLANAR KINE...RESISTANCE DISTANCE METHOD FOR DETERMINATION OF ISOMORPHISM AMONG PLANAR KINE...
RESISTANCE DISTANCE METHOD FOR DETERMINATION OF ISOMORPHISM AMONG PLANAR KINE...
 
Sperotree-Logo
Sperotree-LogoSperotree-Logo
Sperotree-Logo
 
Android Open Accessory APIs
Android Open Accessory APIsAndroid Open Accessory APIs
Android Open Accessory APIs
 
BEARING CAPACITY OF STRIP FOOTING RESTING ON DUNE SANDS STABILIZED BY GROUTIN...
BEARING CAPACITY OF STRIP FOOTING RESTING ON DUNE SANDS STABILIZED BY GROUTIN...BEARING CAPACITY OF STRIP FOOTING RESTING ON DUNE SANDS STABILIZED BY GROUTIN...
BEARING CAPACITY OF STRIP FOOTING RESTING ON DUNE SANDS STABILIZED BY GROUTIN...
 
Tok intro, maps 1
Tok   intro, maps 1Tok   intro, maps 1
Tok intro, maps 1
 
Vih sida
Vih sidaVih sida
Vih sida
 
Porting golang development environment developed with golang
Porting golang development environment developed with golangPorting golang development environment developed with golang
Porting golang development environment developed with golang
 
Personal and shared knowledge
Personal and shared knowledgePersonal and shared knowledge
Personal and shared knowledge
 

Similaire à Whitepaper - CISO Guide_6pp

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 

Similaire à Whitepaper - CISO Guide_6pp (20)

Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 

Whitepaper - CISO Guide_6pp

  • 1. Singtel Business Product Factsheet Managed Defense Services Singtel Business White Paper A CISO’s Guide to Mobile Threat Prevention A CISO’s Guide to Mobile Threat Prevention. You already know that cybercrime and espionage are on the rise, and that security breaches can cripple your organisation and damage your brand and reputation. What you may not realise is that standard security solutions are not strong enough for mobile devices and apps in the workplace. This paper offers security professionals a better understanding of some of the unique challenges of securely enabling a mobile workforce.
  • 2. A CISO’s Guide to Mobile Threat Prevention Overview The Five Major Threats to Mobile Security We’ve identified five major categories of attacks and vulnerabilities that can challenge the security of your business. For each category we include the best practices for dealing with these challenges. 1. System vulnerabilities Each version of an operating system for a mobile device offers vulnerabilities that cyber criminals can use to launch attacks. New versions are notoriously late to market. Critical security updates might not make it through testing for weeks or even months, leaving users exposed. Android is particularly vulnerable. The 24,000+ different types of Android smartphones and tablets are not updated consistently and at the same time. Most devices are still using older Android versions in which vulnerabilities have not been patched.2 Apple’s iOS is less vulnerable because Apple makes only a handful of different devices and consistently prompts users to update them.3 However, though the number of attacks in 2015 was low, there were twice as many as in 2014, and these more sophisticated attacks work on devices that haven’t been jailbroken.4 The explosive proliferation of personal smartphones and tablets in the workplace exposes your company to increased risks. While a breach of personally identifiable information or payment card data is certainly a top concern for many businesses, there are other risks that any organisation needs to consider. Chief among these are the cost of breaches and responding to incidents, the potential damage to brand reputation, and a loss of competitive advantage if valuable trade secrets or intellectual property become public knowledge.1 Mobile systems, the networks they connect to, and the apps they run can all be exploited to steal sensitive information such as documents, calendar appointments, email messages, texts, and attachments. Cyber criminals can use a device’s microphone and camera to spy on closed-door meetings, and then send recordings to a secret remote server. They can even capture user names and passwords as users log in to corporate systems containing sensitive data. Unsecured networks, or networks using faulty or old security measures, make it possible for criminals to snoop, steal, or even change data sent to and from devices. Malicious apps can give attackers virtually unrestricted access to a device, its data, and your network. Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect newly created malware or the vulnerabilities in networks, operating systems, and apps. System vulnerabilities Trojans and malware Root access and configuration changes Repackaged and fake apps Man-in-the- middle attacks The cost to understand and recover from a single breach soared 23% in 2015 to a breathtaking $3.79 million, according to the Ponemon Institute. Considering it takes an average of 256 days just to spot a breach and 82 days to respond to a breach, the damage happening without your knowledge could be catastrophic. In a survey conducted by Ponemon in April 2014, 29% said that a data breach made them less likely to have a relationship with the company, while 15% said they would discontinue their relationship altogether. As of early 2016, most devices were still using the older Android versions code-named Jelly Bean (24.7%), KitKat (36.1%), and Lollipop (32.6%). A mere 7% were using the newest version code-named Marshmallow, which was patched to fix 23 vulnerabilities, two of them critical. For details, see OpenSignal, “Android Fragmentation Visualized,” August 2015, and Google Developer Dashboard, http://developer.android.com/about/dashboards/index.html, January 2015. As of early 2016, at least 85% of users had updated to iOS 8, leaving just 15% lagging behind. See OpenSignal, “Android Fragmentation Visualized”, August 2015. Check Point mobile threat intelligence report, 2015. https://www.checkpoint.com/resources/2015securityreport/ 1 2 3 4
  • 3. 2. Root access and configuration changes Gaining root access to a smartphone or tablet (also called “rooting” with Android or “jailbreaking” with iOS) is no longer only for gadget enthusiasts. Root access enables a wide range of customisations and configurations. It also gives criminals greater access, which exposes devices and data to risk. Configuration changes, which users might accept when installing legitimate apps or businesses might make to meet policy requirements, can also be used by criminals to stage attacks. Certain configuration settings, such as allowing an Android device to install third-party apps from unknown sources, expose significant vulnerabilities. Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) systems, which are used to manage devices, configuration settings, and security policies, offer static root indicators. They work by detecting the existence of certain files in a system directory that enable root access. However, free tools are available for avoiding this type of detection.5 With root access, cyber criminals can even deny root check requests from the EMM or MDM system, bypassing detection entirely. Enterprises need to look beyond static indicators and use advanced techniques for detecting if and how root access was granted. A comprehensive solution would also monitor all configuration changes and use behavioural analysis to detect unexpected system behaviour. This solution should be integrated with your organisation’s MDM or EMM system to restrict access and make real-time, risk-based policy adjustments on compromised devices that MDM and EMM systems on their own can’t detect. A solution that provides dynamic threat response can prevent compromised devices from accessing your company’s network. 3. Repackaged and fake apps Malicious apps can take control of mobile devices. The app may not appear to be malicious, and users may not notice or understand the permissions they grant during installation. Even popular apps can be reverse-engineered and injected with malicious code, and then uploaded to an app store under a different name.6 Repackaged or renamed apps may provide the app’s essential functions but also infect the user’s device. Criminals also create seemingly authentic copies of apps that include similar icons, descriptions, screenshots, and even user reviews, but don’t work as intended — victims get a malicious payload, such as a subscription to an expensive texting service or a stealthy surveillance tool. Malicious apps can enable a host of activities, such as remotely seizing control of the device’s camera and microphone to spy on users and their surroundings. Some trustworthy apps can exhibit risky behaviour, causing false-positive headaches for security teams and a poor experience for users who might be blocked from using completely safe apps.7 Best Practices • Continually analyse devices to uncover system vulnerabilities and criminal behaviours. • Automatically mitigate risk until the threat is eliminated. Best Practices • Use both static and dynamic detection methods to determine if root access has occurred and how it occurred. • Monitor all configuration changes. • Use behavioural analysis to detect unexpected system behaviour. • Integrate advanced detection with EMM or MDM systems for real-time policy adjustments on compromised devices. For example, Xposed Framework for Android and xCon for iOS. Flappy Bird, a massively popular Android game, was reverse-engineered to include malware, renamed to a similar name, and uploaded to Google Play. Once discovered, the app was promptly removed by Google, but not before it had been downloaded by unknown numbers of unsuspecting Android users. Facebook, for example, syncs and uploads contacts and calendar details, and even records voice during status updates. Although this behaviour is associated with the most aggressive types of malware, Facebook isn’t malicious. 5 6 7 Cyber criminals make it their business to exploit the weakest links in your systems. You need a solution that continuously analyses devices to uncover vulnerabilities and the behaviours cyber criminals use to attack devices. When a threat is identified, the solution must automatically mitigate any risk until the threat is eliminated. With better visibility into the vulnerabilities of mobile device systems, you can reduce your overall attack surface and your risk.
  • 4. Mobile anti-virus protection solutions can uncover malicious code in apps by looking for unique binary signatures, but criminals may have found a way to obfuscate those signatures. Besides, signatures are not yet available for “zero-day” (newly created) malware. Your solution must employ additional detection methods, such as monitoring the app’s installation process and determining whether the app actually came from an app store or was installed from some other source. To ensure productivity with safe apps and still block unsafe apps, you can deploy a solution that captures apps as they are downloaded, and runs each app in a virtual “sandbox” environment to analyse its behaviour. A cloud solution can aggregate intelligence about the developer’s reputation, the number of downloads, the app source, and the reputation of the servers the app talks to, and then white-list the trustworthy apps automatically so that users can download them without security issues. 4. Trojans and malware Criminals invest heavily in developing new techniques to install and hide malware. Trojans, carried within an app or installed through an unsecured network connection, infect a device with malicious code that may conduct surveillance by eavesdropping and recording conversations, extracting call logs, tracking locations, logging keyboard activity, and collecting passwords. An app’s code is like a tremendous map of virtually infinite routes. The logic of one line of code may have dozens or even thousands of touch points, all within the same app. This makes it difficult to understand if any of these routes are designed to install a trojan or trigger malicious activity. To expose malicious code, you can deploy a solution that captures apps and reverse-engineers them automatically. This creates a blueprint for semantic analysis that can identify suspicious patterns and behaviours. For example, advanced code-flow analysis can expose whether hard-coded phone numbers are used to contact premium messaging services, or if the code is using the device microphone to record sound files it then sends to nefarious external servers. To mitigate risks already found in devices, you can automate responses and user notifications on the devices with remediation steps, or dynamically trigger device policy changes in your MDM or EMM solution. You should also block traffic to malicious servers to contain the attack so that users can continue using their devices until remediation is complete. Best Practices • Use both static and dynamic detection methods to determine if root access has occurred and how it occurred. • Uncover malicious code in apps by looking for the unique binary signatures for known malware. • Determine whether an app came from an app store or some other source, and monitor the app installation process. • Capture apps as they are downloaded and run them in a “sandbox” environment to analyse their behaviours before flagging them as malicious. • Aggregate and correlate intelligence about the developer’s reputation, the number of downloads, the app source, and the reputation of the app’s servers, in order to white-list legitimate apps. Best Practices • Capture and reverse-engineer apps for code-flow analysis to expose any suspicious behaviour. • Automate responses and user notifications with remediation steps to remove the malware. • Dynamically trigger device policy changes in your MDM or EMM solution. • Block traffic to malicious servers to contain the attack.
  • 5. SSL (Secure Sockets Layer) is a standard for establishing an encrypted link between a server and a client - typically a website and a browser, or a mail server and a mail client (such as Outlook). SSL stripping circumvents automatic redirection to secure connections, and SSL bumping uses fake certificates to fool apps and browsers into believing they’re using private web connections. Both of these attacks can leave sensitive data unprotected. 8 5. Man-in-the-middle attacks Man-in-the-middle attacks can eavesdrop, intercept and alter traffic between two devices. You believe you are interacting with a known and trusted entity, but an attack is copying credentials, snooping on instant messages, or stealing sensitive information. The familiar alert and warning signs on PCs and laptops are far more subtle and easily overlooked on mobile devices. Small screen sizes can hide web addresses, making it harder to validate the address the browser is pointing to. Public Wi-Fi hotspots, which are convenient for internet access, are easy to fake. An attacker can create a spoofed Wi-Fi network, or eavesdrop and alter a legitimate network’s encrypted communications by using spoofed certificates or downgrading the communication link so that it is no longer encrypted.8 The attacker can then intercept communications, alter data in transit, or install a trojan. You need behavioural analysis that can detect rogue hotspots and malicious network behaviour and conditions, and automatically disable suspicious networks to keep devices and your data safe. Your solution should validate the integrity of secure connections to detect compromises, and use a cloud-based honeypot — a system set up to attract and identify attackers who try to penetrate your network. You may also want to dynamically trigger a secure Virtual Private Network (VPN) on the device to protect the privacy and integrity of communications and minimise the impact of an attack. Conclusion Many companies enforce basic mobile hygiene policies using mobile device management to address security and bring- your-own-device issues. Some augment this management with a hodgepodge of point solutions that offer incremental and often rudimentary enhancements. These solutions may control the potential damage inflicted by lost or stolen devices, but they address risks only on the surface. Comprehensive mobile security should be a system of components that work together cohesively to identify a wide variety of threats and to protect data while addressing employee privacy concerns. Only solutions that can analyse behaviour across all vectors for indicators of attack can protect mobile devices effectively to keep them safe. Singtel Mobile Threat Prevention is a multilayered security infrastructure that provides comprehensive protection. It identifies threats using on-device, network and cloud-based algorithms, and triggers automatic defence responses. Its cloud-based risk engine identifies suspicious patterns and behaviours over time by sandboxing apps in an emulator and detecting threats at the device, app, and network levels. The infrastructure integrates with existing security investments to support incident response and provide continuous protection. As a result, organisations always have an accurate picture of the types of threats devices on their network are facing, as well as detailed information about what is being done to mitigate those risks. Best Practices • Use behavioural analysis to detect rogue hotspots and malicious network behaviour. • Automatically disable suspicious networks to keep devices and your data safe. • Validate the integrity of secure connections to detect compromises. • Use a cloud-based honeypot to attract and identify attackers. • Use on-device remediation to dynamically trigger a secure VPN that protects the privacy and integrity of your communications.
  • 6. Copyright © 2016 Singapore Telecommunications Ltd (CRN:199201624D). All rights reserved. All other trademarks mentioned in this document are the property of their respective owners. July2016 www.singtel.com/MTP g-singtelemm@singtel.comFor more information About Singtel Singtel is Asia's leading communications group providing a portfolio of services including voice and data solutions over fixed, wireless and Internet platforms as well as infocomm technology and pay TV. The Group has presence in Asia, Australia and Africa with over 605 million mobile customers in 25 countries, including Bangladesh, India, Indonesia, the Philippines and Thailand. It also has a vast network of offices throughout Asia Pacific, Europe and the United States. About Check Point Software Technologies Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organisations of all sizes. Awards Asia Communications Awards 2016 Best Customer Care: Business Computerworld SG Customer Care Awards Telecommunications Services (2008 – 2015) Frost & Sullivan Singapore Excellence Awards 2015 Mobile Service Provider of the Year Telecom Service Provider of the Year HWM + Hardwarezone.com Tech Awards Best Telco, Singapore (2010 – 2016) Best Fibre Broadband Service , Singapore (2010 – 2016) NetworkWorld Asia Info Mgmt Awards Security-as-a-Service (2012 – 2016) NetworkWorld Asia Readers’ Choice Awards Managed Infrastructure Services (2012 – 2015) Managed Security Services (2014 – 2015) Contact your Mobile Sales Specialist