SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
Mobile Security

Intense overview of mobile
security threat


     prepared by Fabio Pietrosanti,
               CTO @ PrivateWave
Mobile S
M bil Security
           it

  Introduction




Mobile Security - Fabio Pietrosanti - www.privatewave.com   2
Introduction

      Mobile phones today
        bil   h       d
   Mobile phones have changed our life in the past
    15 years (GSM & CDMA)
      Mobile phones became the most personal and
       private item we own
   Mobile smartphones have changed our digital life
    in the past 5 years
      Growing computational power of “phones”

      Diffusion of high speed mobile data networks

      Real operating systems run on smartphones




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   3
Introduction

Mobile phones today




   Mobile Security - Fabio Pietrosanti - www.privatewave.com   4
Introduction

     It’s something personal
               hi          l

   Mobile phones have become
    the
    th most personal and private
            t        l d i t
    item we own
   You get out from home and
    you take:
      House & car key

      Portfolio

      Mobile phone




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   5
Introduction
    It’s
    It’ something critical
            thi     iti l
 phone call l
   h       ll logs                            Voice calls cross
                                                       ll
 addressbook                                  through it (volatile
 emails
                                               but
                                               b t non th t much)
                                                        that      h)
                                              Corporate network
 sms
                                               access
 mobile browser
                                              GPS tracking data
  history
        y
 documents

 calendar




         Mobile Security - Fabio Pietrosanti - www.privatewave.com   6
Mobile S
 M bil Security
            it


Difference between
mobile security & IT
             y
      security



  Mobile Security - Fabio Pietrosanti - www.privatewave.com   7
Difference between mobile security & IT
                   Security
             Too much trust
   Trust between operators
   Trust between the user and the operators
   Trust between the user and the phone
                                   p




   Still low awareness of users on security risks


              Mobile Security - Fabio Pietrosanti - www.privatewave.com   8
Difference between mobile security & IT
                   Security
    Too difficult to deal with
   Low level communication protocols/networks are
    closed (security through entrance barrier)
   Too many heterogeneous technologies, no single way
    to secure it
      Diffused trusted security but not homogeneous use
       of trusted capabilities
   Reduced detection capability of attack & trojan




               Mobile Security - Fabio Pietrosanti - www.privatewave.com   9
Difference between mobile security & IT
                   Security
            Too many sw/hw
            T           /h
               p
               platforms
    Nokia S60 smartphones
       Symbian/OS coming from Epoc age (psion)

    Apple iPhone
       iPhone OS - Darwin based, as Mac OS X - Unix

    RIM Blackberry
           l kb
       RIMOS – proprietary from RIM

    Windows Mobile (various manufacturer)
       Windows Mobile (coming from heritage of PocketPC)

    Google Android
       Linux Android (unix with custom java based user
        operating environment)


               Mobile Security - Fabio Pietrosanti - www.privatewave.com   10
Difference between mobile security & IT
                    Security
Vulnerability management
    Patching mobile operating system is difficult
       Carrier often builds custom firmware, it’s at their costs
        and not vendors
                 vendors’
       Only some environments provide easy OTA software
        upgrades
       Almost very few control from enterprise provisioning and
        patch management perspective
       Drivers often are not in hand of OS Vendor

       Basend Processor runs another OS

       Assume that some phones will j
                           p           just remain buggy
                                                       ggy




                Mobile Security - Fabio Pietrosanti - www.privatewave.com   11
Difference between mobile security & IT
                     Security
               Vulnerability count
               V l    bilit      t




Source: iSec
                 Mobile Security - Fabio Pietrosanti - www.privatewave.com   12
Mobile Security


Mobile Device Security




   Mobile Security - Fabio Pietrosanti - www.privatewave.com   13
Mobile Device Security
           Devices access and
               authority
   All those subject share authority on the device
      OS Vendor/Manufacturer (2)

      Carrier (1)

      User

      Application Developer
(1) Etisalat operator-wide spyware installation for Blackberry
    http://www.theregister.co.uk/2009/07/14/blackberry_snooping/
    h    //     h    i         k/2009/0 / /bl kb            i /
(2) Blackberry banned by France government for spying risks
    http://news.bbc.co.uk/2/hi/business/6221146.stm
     ttp // e s bbc co u / / /bus ess/6       6 st




                Mobile Security - Fabio Pietrosanti - www.privatewave.com   14
Mobile Device Security
    Reduced security by hw
           design
   Poor keyboard ->
   Poor password

Type a passphrase:
P4rtyn%!ter.nd@ 01
P4rtyn%!ter nd@’01




           Mobile Security - Fabio Pietrosanti - www.privatewave.com   15
Mobile Device Security
       Reduced security by hw
              design
   Poor screen, poor control

   User diagnostic
    capabilities are reduced.
    No easy checking of f
    what’s going on

   Critical situation where
    user analysis is required,
                     required
    difficult to be handled
    (SS ,
    (SSL, Email)
              a )

                 Mobile Security - Fabio Pietrosanti - www.privatewave.com   16
Mobile Device Security
    Mobile security model –
          old school
   Windows Mobile and Blackberry application
      A th
       Authorization b d on di it l signing of
              i ti based         digital i i f
       application
      Everything or nothing

      With or without permission requests

      Limited access to filesystem

   No granular permission fine tuning
    Cracking Blackberry security model with 100$ key
http://securitywatch.eweek.com/exploits_and_attacks/cracking_the_blackberry_with_
    a_100_key.html



                  Mobile Security - Fabio Pietrosanti - www.privatewave.com   17
Mobile Device Security

    Mobile security model –
    old school but Enterprise
   Windows Mobile 6.1 (SCMDM) and Blackberry
    (BES)
      Deep profiling of security features for centrally
       managed devices
              dd i
       - Able to download/execute external application
       - Able to use different data networks
       - Force device PIN protection
       - Force device encryption (BB)
                            y
       - Profile access to connectivity resources (BB)



              Mobile Security - Fabio Pietrosanti - www.privatewave.com   18
Mobile Device Security
    Mobile security model –
            iPhone
   Heritage of OS X Security model
   Centralized distribution method: appstore
   Technical application publishing policy
               pp         p         gp     y
   Non-technical application publishing policy
         AppStore “is” a security feature
                     is
   NO serious enterprise security provisioning



            Mobile Security - Fabio Pietrosanti - www.privatewave.com   19
Mobile Device Security
    Mobile security model –
      Android / Symbian
   Sandbox based approach (data caging)
   Users h
    U     have ti ht control on application permissions
               tight    t l        li ti        i i
       Symbian is so strict on digital signature enforcement
        but not on data confidentiality
       Symbian requires different level of signature
        depending on capability usage
          p      g        p      y    g
   Android supports digital signing with self-signed
    certificates but keep java security model
      A lot of third party security applications

   NO serious enterprise security provisioning

               Mobile Security - Fabio Pietrosanti - www.privatewave.com   20
Mobile Device Security

            Brew & NucleOS
            B      N l OS

   Application is provided *exclusively* from
    manufacturer and from operator
   Delivery is OTA through application portal of
    operator
   Full trust to carrier




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   21
Mobile Device Security
    Development language
           security
   Development l
    D     l        t language/sdk security f t
                              / dk     it features
    support are extremely relevant to increase
    difficulties in exploiting
Blackberry RIMOS             J2ME MIDP 2.0                      No native code

Iphone                       Objective-C                        NX Stack/heap
                                                                protection
Windows Mobile
Wi d    M bil                .NET / C++
                              NET                               GS enhanced security
                                                                     h    d      it

Nokia/Symbian                C++                                Enhanced memory
                                                                management
Android/Linux                Java & NDK                         Java security model


                Mobile Security - Fabio Pietrosanti - www.privatewave.com   22
Mobile Security
              y


Mobile Hacking
      &
 Attack vector



Mobile Security - Fabio Pietrosanti - www.privatewave.com   23
Mobile Hacking & Attack Vector
    Mobile security research

   Mobile security research exponentially
    increased in past 2 years
       DEFCON (USA), BlackHat (USA, Europe, Japan), CCC(DE),
        ShmooCon (USA), YSTS (BR), HITB (Malaysia), CansecWest
        (CAN), S
        (C ) EuSecWest)NL, G S( ) Ekoparty (AR), DeepSec
                        )   GTS(BR), k        ( )        S
        (AT) *CLCERT data
   Hacking environment is taking much more
    interests and attention to mobile hacking
   Dedicated security community:
       TSTF.net , Mseclab , Tam hanna



               Mobile Security - Fabio Pietrosanti - www.privatewave.com   24
Mobile Hacking & Attack Vector
Mobile security research -
          2008
    DEFCON 16 - Taking Back your Cellphone Alexander Lash
    BH DC / BH Europe – Intercepting Mobile Phone/GSM Traffic David
     Hulton, Steve–
    BH Europe - M bil Phone Spying T l Jarno Niemelä–
        E         Mobile Ph     S i Tools J         Ni   lä
    BH USA - Mobile Phone Messaging Anti-Forensics Zane Lackey, Luis
     Miras
    Ekoparty - S
     Ek    t Smartphones (i )
                    t h      (in)security Nicolas E
                                      it Ni l Economou, Alf d O t
                                                            Alfredo Ortega
    BH Japan - Exploiting Symbian OS in mobile devices Collin Mulliner–
    GTS-12 - iPhone and iPod Touch Forensics Ivo Peixinho
    25C3– Hacking the iPhone - M l N d pytey, planetbeing
     25C3 H ki th iPh            MuscleNerd, t         l  tb i
    25C3 Locating Mobile Phones using SS7 – Tobias Engel– Anatomy of
     smartphone hardware Harald Welte
    25C3 Running your own GSM network – H Welte, Dieter Spaar
                                              H. Welte
    25C3 Attacking NFC mobile phones – Collin Mulliner




              Mobile Security - Fabio Pietrosanti - www.privatewave.com   25
Mobile Hacking & Attack Vector
          Mobile security
         research 2009 (1)
   ShmooCon Building an All-Channel Bluetooth Monitor Michael
    Ossmann and Dominic Spill
   ShmooCon Pulling a John Connor: Defeating Android Charlie Miller
   BH USA– A
       USA Attacking SMS - Z
                    ki       Zane Lackey, Luis Miras –
                                    L k   L i Mi
   BH USA Premiere at YSTS 3.0 (BR)
   BH USA Fuzzing the Phone in your Phone - Charlie Miller, Collin
    Mulliner
    M lli
   BH USA Is Your Phone Pwned? - Kevin Mahaffey, Anthony Lineberry &
    John Hering–
   BH USA Post Exploitation Bliss –
   BH USA Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo &
    Charlie Miller–
   BH USA Exploratory Android Surgery - Jesse Burns
   DEFCON 17– Jailbreaking and the Law of Reversing - Fred Von
    Lohmann, Jennifer Granick–



             Mobile Security - Fabio Pietrosanti - www.privatewave.com   26
Mobile Hacking & Attack Vector
         Mobile security
        research 2009 (2)
   DEFCON 17 Hacking WITH the iPod Touch - Thomas Wilhelm
   DEFCON 17 Attacking SMS. It's No Longer Your BFF - Brandon Dixon
   DEFCON 17 Bluetooth, Smells Like Chicken - Dominic Spill, Michael
    Ossmann,
    Ossmann Mark Steward
   BH Europe– Fun and Games with Mac OS X and iPhone Payloads -
    Charlie Miller and Vincenzo Iozzo–
   BH Europe Hijacking Mobile Data Connections - Roberto Gassirà and
    Roberto Piccirillo–
   BH Europe Passports Reloaded Goes Mobile - Jeroen van Beek
   CanSecWest
    CanSecWest– The Smart Phones Nightmare Sergio 'shadown' Alvarez
                       Smart-Phones                  shadown
   CanSecWest - A Look at a Modern Mobile Security Model: Google's
    Android Jon Oberheide–
   CanSecWest - Multiplatform iPhone/Android Shellcode, and other smart
                        p                               ,
    phone insecurities Alfredo Ortega and Nico Economou




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   27
Mobile Hacking & Attack Vector
         Mobile security
        research 2009 (3)
   EuSecWest - Pwning your grandmother's iPhone Charlie Miller–
   HITB Malaysia - Bugs and Kisses: Spying on Blackberry Users for
    FunSheran Gunasekera YSTS 3 0 /
               Gunasekera–        3.0
   HITB Malaysia - Hacking from the Restroom Bruno Gonçalves de
    Oliveira
   PacSec - The Android Security Story: Challenges and Solutions for Secure
    Open Systems Rich Cannings & Alex Stamos
   DeepSec - Security on the GSM Air Interface David Burgess, Harald
    Welte
   DeepSec - Cracking GSM Encryption Karsten Nohl–
   DeepSec - Hijacking Mobile Data Connections 2.0: Automated and
    Improved Roberto Piccirillo, Roberto Gassirà–
   DeepSec - A practical DOS attack to the GSM network Dieter Spaar




              Mobile Security - Fabio Pietrosanti - www.privatewave.com   28
Mobile Hacking & Attack Vector

              Attack layers
                     la ers
   Mobile is attacked at following layers
     Layer2 attacks (GSM, UMTS WiFi)
                     (GSM UMTS,
     Layer4 attacks (SMS/MMS interpreter)

     La er7 attacks (Client side hacking)
      Layer7

    Layer3 (TCP/IP) is generally protected by
    mobile operators by filtering inbound
    connections


            Mobile Security - Fabio Pietrosanti - www.privatewave.com   29
Mobile Hacking & Attack Vector

     Link layer security - GSM
   GSM has been cracked with
    2k USD hw equipment
      http://reflextor.com/trac/a51 - A51
       rainbowtable cracking software
      http://www.airprobe.org - GSM
       interception software
      http://www.gnuradio.org -
       Software defined radio
      htt //
       http://www.ettus.com/products -
                     tt       /   d t
       USRP2 – Cheap software radio


                Mobile Security - Fabio Pietrosanti - www.privatewave.com   30
Mobile Hacking & Attack Vector

    Link layer security - UMTS
   1°UMTS (Kasumi) cracking paper
    by Israel s Weizmann Institute of
        Israel’s
    Science
      http://www.theregister.co.uk/201
        0/01/13/gsm_crypto_crack/
   Still no public practical
             p      p
    implementation
   UMTS mode-only phones are not
    reliable



                Mobile Security - Fabio Pietrosanti - www.privatewave.com   31
Mobile Hacking & Attack Vector

    Link layer security – WiFi
   All known attacks about WiFi
      R
       Rogue AP DNS poisoning,
              AP,        i    i
       arp spoofing, man in the
       middle,
       middle WEP cracking,
                     cracking
       WPA-PSK cracking, etc




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   32
Mobile Hacking & Attack Vector
   Link layer security
Rouge operators roaming
   Telecommunication operators are trusted
    among each other (roaming agreements &
    brokers)
   Operators can hijack almost everything of a
    mobile connections:
      mobile connect whatever network is
       available
   Today, becoming a mobile operators is quite
    easy in certain countries, trust, it’s a matter of
    money
   Today the equipment to run an operator is
    cheap (OpenBTS & OpenBSC)
         p p             p

                Mobile Security - Fabio Pietrosanti - www.privatewave.com   33
Mobile Hacking & Attack Vector

                MMS security
   Good delivery system for malware (binary mime encoded
    attachments, like email)
   Use just PUSH-SMS for notifications and HTTP & SMIL for
    MMS retrieval
   “Abused” to send out confidential information (intelligence
    tool for dummies & for activist)
   “Abused” to hack windows powered mobile devices
      MMS remote Exploit (CCC Congress 2006)

     http://www.f-secure.com/weblog/archives/00001064.html
     http://www f secure com/weblog/archives/00001064 html
   MMS spoofing & avoid billing attack
      http://www.owasp.org/images/7/72/MMS_Spoofing.ppt
           p              p g      g             p      g pp
      MMSC filters on certain attachments

   Application filters on some mobile phones for DRM purposes


               Mobile Security - Fabio Pietrosanti - www.privatewave.com   34
Mobile Hacking & Attack Vector

             SMS security (1)
   Only 160byte per SMS (concatenation support)
   CLI spoofing is extremely easy
   SMS interpreter exploit
      i h
        iPhone SMS remote exploit l i
     http://news.cnet.com/8301-27080_3-10299378-245.html
   SMS used to deliver web attacks
      Service Loading (SL) primer

   SMS mobile data hijacking through SMS provisioning
      Send Wap PUSH OTA configuration message to configure
        DNS (little of social engineerings)
      Redirection phishing mitm SSL attack protocol
        Redirection, phishing, mitm,      attack,
        downgrade, etc, etc
   SMSC filters sometimes applied, often bypassed
                            pp             yp

              Mobile Security - Fabio Pietrosanti - www.privatewave.com   35
Mobile Hacking & Attack Vector

        SMS security (2)
Easy social engineering for provisioning SMS




Thanks to Mobile Security Lab, http://www.mseclab.com
                          Lab http://www mseclab com

          Mobile Security - Fabio Pietrosanti - www.privatewave.com   36
Mobile Hacking & Attack Vector

                Bluetooth
                Bl t th (1)
  Bluetooth spamming (they call it, “mobile
   advertising”)
  Bluetooth attacks let you:
     initiate phone calls

     send SMS to any number

     read SMS from the phone
                           p
     read/write phonebook

     set call forwards

     connect to the internet

  Bluesnarfing, bluebug, bluebugging
http://trifinite.org/
http://trifinite org/
  Bluetooth OBEX to send spyware



                Mobile Security - Fabio Pietrosanti - www.privatewave.com   37
Mobile Hacking & Attack Vector

                     Bluetooth (2)
  Bluetooth encryption has been cracked
http://news.techworld.com/security/3797/bluet
   ooth-crack-gets-serious/
  But bluetooth sniffers were expensive
  So an hacked firmware of a bluetooth
   dongle made it accessible: 18$ bluetooth
   sniffer
http://pcworld.about.com/od/wireless/Research
   er creates Bluetooth c.htm
   er-creates-Bluetooth-c htm
  Bluetooth interception became feasible
  Bluetooth SCO (audio flow to bluetooth
   headset) could let phone call interception



                Mobile Security - Fabio Pietrosanti - www.privatewave.com   38
Mobile Hacking & Attack Vector

            NFC – what’s that?
   Near Field Communications
      Diffused in Far East (Japan & China)

      Estimated diffusion in Europe/North America: 2013

      Estimated financial transaction market: 75bn

      NFC Tech: 13.56mhz, data rates 106kbit/s, multiple rfid tags

      NFC Tag transmit URI by proximily to the phone that prompts
       user f action given the protocol:
             for ti     i     th     t  l
         URI
         SMS
         TEL
         SMART Poster (ringone, application, network configuration)
      NFC Tag data format is ndef

      J2ME midlet installation is automatic, user is just asked after
       download


                Mobile Security - Fabio Pietrosanti - www.privatewave.com   39
Mobile Hacking & Attack Vector

              NFC – example use
                         l
   NFC Ticketing (Vienna’s public
         Ti k ti (Vi     ’    bli                    Vending machine NFC payment
    services)                                        Totem public tourist information




                   Mobile Security - Fabio Pietrosanti - www.privatewave.com   40
Mobile Hacking & Attack Vector

               NFC - security
   EUSecWest 2008: Hacking NFC mobile p
                          g            phones, the
                                             ,
    NFCWorm
http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html
   URI Spoofing:
      Hide URI pointed on user

   NDEF WWorm
      Infect tags, not phones

      Spread by writing writable tags

      Use URI spoofing to point to midlet application that
       are automatically downloaded
                        y
   SMS/TEL scam through Tag hijacking


              Mobile Security - Fabio Pietrosanti - www.privatewave.com   41
Mobile Hacking & Attack Vector
           Mobile Web Security -
                   WAP
   HTTPS i considered a secure protocol
          is    id   d             t   l
        Robust and reliable based on digital certificate
   WAP is often used by mobile phones because it has
    special rates and mobile operator wap portals are
        i l         d   bil                     l
    feature rich and provide value added contents
   WAP security uses WTLS that acts as a proxy between a
    WAP client and a HTTPS server
   WTLS in WAP browser breaks the end-to-end security
    nature of SSL in HTTPS
   WAP 2 fix it, only modern devices and modern WAP
    gateway




                       Mobile Security - Fabio Pietrosanti - www.privatewave.com   42
Mobile Hacking & Attack Vector
     Mobile Web Security –
             WEB
   Most issues in end-to-end security
   Attackers are facilitated
      Phones send user-agent identifying precise
       mode
      Some operator HTTP transparent proxy reveal
       to web server MSISDN and IMSI of the phone
                                             p
   Mobile browser has to be small and fast but…
   Mobile browser has to be compatible with existing
                                  p                 g
    web security technologies


             Mobile Security - Fabio Pietrosanti - www.privatewave.com   43
Mobile Hacking & Attack Vector
     Mobile Web Security –
           WEB/SSL
   SSL is the basic security system used in web for HTTPS
   It gets sever limitation for wide acceptance in mobile
    environment ( h
        i           (where smartphone are j
                                   h        just part of)
                                                       f)
      End-to-end break of security in WTLS

      Not all available phones support it

      Out of date Symmetric ciphers

      Certificates problems (root CA)

      Slow to start

      Certificates verification problems




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   44
Mobile Hacking & Attack Vector
         Mobile Web Security –
                SSL UI
   Mobile
    M bil UI are not coherent when handling
                      t h       t h h dli
    SSL certificates and it may be impossible for
    an extremely tricky user to verify the HTTPS
                 y     y             y
    information of the website
      Details not always clear

      From 4 to 6 click required to check SSL
       information
      Information is not always consistent
                            al a s
      Transcoder makes the operator embed
       their custom trusted CA-root to be able
                              CA root
       to do Main In the Middle while
       optimizing web for mobile

                  Mobile Security - Fabio Pietrosanti - www.privatewave.com   45
Mobile Hacking & Attack Vector
         Mobile Web Security –
Tnx to Rsnake & Masabi SSL UI




        Mobile Security - Fabio Pietrosanti - www.privatewave.com   46
Mobile Hacking & Attack Vector

                      Mobile VPN
   Mobile devices often need to access
    corporate networks
   VPN security has slightly different concepts
                y       g y                  p
      User managed VPN (Mobile IPSec
       clients)
      Operator Managed VPN (MPLS-like
       model with dedicated APN on 3G data
       networks)
        Authentication based on SIM card
           and/or with login/password
             d/    i hl i /          d



                 Mobile Security - Fabio Pietrosanti - www.privatewave.com   47
Mobile Hacking & Attack Vector
            Voice interception
   Voice interception is the most known and
                   p
    considered risks because of media coverage
    on legal & illegal wiretapping
      I t
        Interception th
                 ti through S
                            h Spyware i j ti
                                       injection
        (250E)
      Interception through GSM cracking
        (2000-150.000E)
      Interception through Telco Hijacking
        (30.000E)
   Approach depends on the technological
    skills of the attacker
   Protection is not technologically easy


                Mobile Security - Fabio Pietrosanti - www.privatewave.com   48
Mobile Hacking & Attack Vector
     Location Based Services or
           Location Based
          Intelligence? (1)
   New risks given by official and
    unofficial LBS technologies
   GPS:
      Cheap cross-platform powerful
       spyware software with geo tracking
       (http://www.flexispy.com)
       (htt //      fl i         )
      Gps data in photo’s metadata
       (iphone)
      Community based tracking
       (lifelook)
               Mobile Security - Fabio Pietrosanti - www.privatewave.com   49
Mobile Hacking & Attack Vector
     Location Based Services or
           Location Based
          Intelligence? (2)
   HLR (Home Location Register) MSC lookup:
      GSM network ask the network’s HLR’
              t    k k th     t   k’ HLR’s:
       where is the phone’s MSC?
      Network answer:
       {"status":"OK","number":"123456789","imsi":"22002123456
       7890","mcc":"220",”mnc":"02","msc":"13245100001",””msc
       _location”:”London,UK”,”operator_name”:” Orange
       ( ) , p
       (UK)”,”operator_country”:”UK”}
                       _     y      }
   HLR Lookup services (50-100 EUR):
      http://www.smssubmit.se/en/hlr-
       lookup.html
       l k ht l
      http://www.routomessages.com




                      Mobile Security - Fabio Pietrosanti - www.privatewave.com   50
Mobile Hacking & Attack Vector
             Mobile malware -
                spyware
   Commercial spyware focus on information spying
      Flexispy (cross-platform commercial spyware)

        Listen to an active phone call (CallInterception)
        Secretly read SMS, Call Logs, Email, Cell ID and make Spy Call
         Listen to the phone surrounding
        Secret GPS trackingg
        Highly stealth (user Undetectable in operation)
       A lot small softwares made for lawful and unlawful use
        by many small companies




                  Mobile Security - Fabio Pietrosanti - www.privatewave.com   51
Mobile Hacking & Attack Vector
             Mobile malware –
              virus/worm (1)
   Worm
     Still no cross-platform system

     Mainly involved in phone fraud            (SMS
      & Premium numbers)
     Sometimes making d
              i       ki damage
     Often masked as useful application or sexy stuff

     In July 2009 first mobile botnet for SMS
      spamming
http://www.zdnet.co.uk/news/security-threats/2009/07/16/phone-trojan-
http://www zdnet co uk/news/security threats/2009/07/16/phone trojan
   has-botnet-features-39684313/



               Mobile Security - Fabio Pietrosanti - www.privatewave.com   52
Mobile Hacking & Attack Vector
             Mobile malware –
              virus/worm (2)
   Malware full feature list
     Spreading via Bluetooth, MMS, Sending SMS messages, Infecting
    files, Enabling remote control of the smartphone, M dif i
    fil E bli                     l f h           h      Modifying or
    replacing icons or system applications, Installing "fake" or non-
    working fonts and applications, Combating antivirus programs,
    Installing th
    I t lli other malicious programs, Locking memory cards,
                        li i             L ki                   d
    Stealing data, Spreading via removable media (memory sticks) ,
    Damaging user data, Disabling operating system security
    mechanisms,
    mechanisms Downloading other files from the Internet Calling
                                                      Internet,
    paid services,Polymorphism
Source: Karspersky Mobile Malware evolution
http://www.viruslist.com/en/analysis?pubid=204792080




                Mobile Security - Fabio Pietrosanti - www.privatewave.com   53
Mobile Hacking & Attack Vector
           Mobile Forensics
   It's not just taking down SMS, photos
    and addressbook, but all the information
    ecosystem of the new phone
   Like a new kind of computer to be
    analyzed, just more difficult
   Require custom equipment
        q              q p
   Local data easy to be retrieved
   Network data are not affordable,
    spoofing is concrete
   More dedicated training course about
    mobile forensics
         bil f      i



              Mobile Security - Fabio Pietrosanti - www.privatewave.com   54
Mobile Hacking & Attack Vector
               Extension of
               organization:
               The operator
   Mobile operator customer service identify users
    by CLI & some personal data
   Mix of social engineering & CLI spoofing let
                    g       g        p     g
    compromise of
       Phone call logs (Without last 3 digits)
       Denial of service (sim card blocking)
       Voice mailbox access (not always)




             Mobile Security - Fabio Pietrosanti - www.privatewave.com   55
Mobile Hacking & Attack Vector
          Some near future
             scenarios
   Real diffusion of cross-platform trojan targeting
    fraud (espionage already in p
          ( p       g        y place)  )
      Back to the era of mobile phone dialers

      Welcome to the new era of mobile phishing

   QR code phishing:
      “Free mobile chat, meet girls” ->
        Free                     girls >
       http://tinyurl.com/aaa -> web mobile-dependent
       malware.
   SMS spamming becomes aggressive


             Mobile Security - Fabio Pietrosanti - www.privatewave.com   56
Mobile Security
                    y


 The economic risks
TLC & Financial frauds



       Mobile Security - Fabio Pietrosanti - www.privatewave.com   57
The economic risks
          Basic of phone fraud
   Basic of fraud
      Make the user trigger billable
       events
   Basics of cash-out
      Subscriber billable communications

        SMS to premium number
        CALL premium number
        CALL international premium
           number
        DOWNLOAD content from wap
                            t tf
           sites (wap billing)


                Mobile Security - Fabio Pietrosanti - www.privatewave.com   58
The economic risks
            Fraud against
           user/corporate
   Induct users to access content through:
     SMS spamming (Finnish & Italian cases)
     MMS spamming

     Web delivery of telephony related URL
      (sms:// tel://)
     Bluetooth spamming/worm

   Phone dialers back from the ‘90 modem
                                 90
    age

            Mobile Security - Fabio Pietrosanti - www.privatewave.com   59
The economic risks

         Security of mobile
                     banking
                           g


   Very h
         heterogeneous approach to access & security:
                                 h
      STK/SIM toolkit application mobile banking

      M bil web mobile banking - powerful phishing
       Mobile     b    bil b ki             f l hi hi
      Application based mobile banking (preferred because of
       usability)
      SMS banking (feedbacks / confirmation code)




                Mobile Security - Fabio Pietrosanti - www.privatewave.com   60
Mobile Security
              y
  Conclusion




Mobile Security - Fabio Pietrosanti - www.privatewave.com   61
Conclusion
           Enterprise mobile
           security policies?
   Still not widely diffused
       Lacks of general knowledge about risk
                 g                g
       Lacks of widely available cross-platform tools
   Difficult to be effectively implemented
                              y
       Application protection and privileges cannot be finely
        tuned across different platforms in the same way
       The only action taken usually is anti-theft and device-
        specific security services (such as Blackberry
        application provisioning/protection & data
        encryption)



               Mobile Security - Fabio Pietrosanti - www.privatewave.com   62
Conclusion
    New challenges require
       new approach
   Mobile manufacturer, Mobile OS provider and
    Carriers should agree on true common standards
    for
    f securityi
   Antifraud systems must be proactive and new
    technology sho ld secure “by-design”
    technolog should sec re “b design”
   Enterprises should press the market and, large
    ITSec vendors should push on manufacturer &
    operators for homogeneous security solutions
   We should expect even more important attacks
    soon


            Mobile Security - Fabio Pietrosanti - www.privatewave.com   63

Contenu connexe

Tendances

Mobile security
Mobile securityMobile security
Mobile securityhome
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 

En vedette

2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security zakiakhmad
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingkalaiselvanresearch
 
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...dinesh krishna
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And SecurityJames Wernicke
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
Mobile device security informative v2
Mobile device security   informative v2Mobile device security   informative v2
Mobile device security informative v2Salman Zahid
 

En vedette (15)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
 
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...blocking misbehaving users in anonymizing networks full ppt with screenshots ...
blocking misbehaving users in anonymizing networks full ppt with screenshots ...
 
Mobile Security Solutions
Mobile Security SolutionsMobile Security Solutions
Mobile Security Solutions
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
SEMINAR
SEMINARSEMINAR
SEMINAR
 
Mobile device security informative v2
Mobile device security   informative v2Mobile device security   informative v2
Mobile device security informative v2
 

Similaire à Mobile security - Intense overview

Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityVitor Domingos
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, ArduinoParis Open Source Summit
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile Edge Event
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 

Similaire à Mobile security - Intense overview (20)

Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 
Securing mobile devices 1
Securing mobile devices 1Securing mobile devices 1
Securing mobile devices 1
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 

Plus de PrivateWave Italia SpA

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateWave Italia SpA
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateWave Italia SpA
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 

Plus de PrivateWave Italia SpA (20)

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_en
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_en
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_en
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Private gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_enPrivate gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_en
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Mobile security - Intense overview

  • 1. Mobile Security Intense overview of mobile security threat prepared by Fabio Pietrosanti, CTO @ PrivateWave
  • 2. Mobile S M bil Security it Introduction Mobile Security - Fabio Pietrosanti - www.privatewave.com 2
  • 3. Introduction Mobile phones today bil h d  Mobile phones have changed our life in the past 15 years (GSM & CDMA)  Mobile phones became the most personal and private item we own  Mobile smartphones have changed our digital life in the past 5 years  Growing computational power of “phones”  Diffusion of high speed mobile data networks  Real operating systems run on smartphones Mobile Security - Fabio Pietrosanti - www.privatewave.com 3
  • 4. Introduction Mobile phones today Mobile Security - Fabio Pietrosanti - www.privatewave.com 4
  • 5. Introduction It’s something personal hi l  Mobile phones have become the th most personal and private t l d i t item we own  You get out from home and you take:  House & car key  Portfolio  Mobile phone Mobile Security - Fabio Pietrosanti - www.privatewave.com 5
  • 6. Introduction It’s It’ something critical thi iti l  phone call l h ll logs  Voice calls cross ll  addressbook through it (volatile  emails but b t non th t much) that h)  Corporate network  sms access  mobile browser  GPS tracking data history y  documents  calendar Mobile Security - Fabio Pietrosanti - www.privatewave.com 6
  • 7. Mobile S M bil Security it Difference between mobile security & IT y security Mobile Security - Fabio Pietrosanti - www.privatewave.com 7
  • 8. Difference between mobile security & IT Security Too much trust  Trust between operators  Trust between the user and the operators  Trust between the user and the phone p  Still low awareness of users on security risks Mobile Security - Fabio Pietrosanti - www.privatewave.com 8
  • 9. Difference between mobile security & IT Security Too difficult to deal with  Low level communication protocols/networks are closed (security through entrance barrier)  Too many heterogeneous technologies, no single way to secure it  Diffused trusted security but not homogeneous use of trusted capabilities  Reduced detection capability of attack & trojan Mobile Security - Fabio Pietrosanti - www.privatewave.com 9
  • 10. Difference between mobile security & IT Security Too many sw/hw T /h p platforms  Nokia S60 smartphones  Symbian/OS coming from Epoc age (psion)  Apple iPhone  iPhone OS - Darwin based, as Mac OS X - Unix  RIM Blackberry l kb  RIMOS – proprietary from RIM  Windows Mobile (various manufacturer)  Windows Mobile (coming from heritage of PocketPC)  Google Android  Linux Android (unix with custom java based user operating environment) Mobile Security - Fabio Pietrosanti - www.privatewave.com 10
  • 11. Difference between mobile security & IT Security Vulnerability management  Patching mobile operating system is difficult  Carrier often builds custom firmware, it’s at their costs and not vendors vendors’  Only some environments provide easy OTA software upgrades  Almost very few control from enterprise provisioning and patch management perspective  Drivers often are not in hand of OS Vendor  Basend Processor runs another OS  Assume that some phones will j p just remain buggy ggy Mobile Security - Fabio Pietrosanti - www.privatewave.com 11
  • 12. Difference between mobile security & IT Security Vulnerability count V l bilit t Source: iSec Mobile Security - Fabio Pietrosanti - www.privatewave.com 12
  • 13. Mobile Security Mobile Device Security Mobile Security - Fabio Pietrosanti - www.privatewave.com 13
  • 14. Mobile Device Security Devices access and authority  All those subject share authority on the device  OS Vendor/Manufacturer (2)  Carrier (1)  User  Application Developer (1) Etisalat operator-wide spyware installation for Blackberry http://www.theregister.co.uk/2009/07/14/blackberry_snooping/ h // h i k/2009/0 / /bl kb i / (2) Blackberry banned by France government for spying risks http://news.bbc.co.uk/2/hi/business/6221146.stm ttp // e s bbc co u / / /bus ess/6 6 st Mobile Security - Fabio Pietrosanti - www.privatewave.com 14
  • 15. Mobile Device Security Reduced security by hw design  Poor keyboard ->  Poor password Type a passphrase: P4rtyn%!ter.nd@ 01 P4rtyn%!ter nd@’01 Mobile Security - Fabio Pietrosanti - www.privatewave.com 15
  • 16. Mobile Device Security Reduced security by hw design  Poor screen, poor control  User diagnostic capabilities are reduced. No easy checking of f what’s going on  Critical situation where user analysis is required, required difficult to be handled (SS , (SSL, Email) a ) Mobile Security - Fabio Pietrosanti - www.privatewave.com 16
  • 17. Mobile Device Security Mobile security model – old school  Windows Mobile and Blackberry application  A th Authorization b d on di it l signing of i ti based digital i i f application  Everything or nothing  With or without permission requests  Limited access to filesystem  No granular permission fine tuning Cracking Blackberry security model with 100$ key http://securitywatch.eweek.com/exploits_and_attacks/cracking_the_blackberry_with_ a_100_key.html Mobile Security - Fabio Pietrosanti - www.privatewave.com 17
  • 18. Mobile Device Security Mobile security model – old school but Enterprise  Windows Mobile 6.1 (SCMDM) and Blackberry (BES)  Deep profiling of security features for centrally managed devices dd i - Able to download/execute external application - Able to use different data networks - Force device PIN protection - Force device encryption (BB) y - Profile access to connectivity resources (BB) Mobile Security - Fabio Pietrosanti - www.privatewave.com 18
  • 19. Mobile Device Security Mobile security model – iPhone  Heritage of OS X Security model  Centralized distribution method: appstore  Technical application publishing policy pp p gp y  Non-technical application publishing policy AppStore “is” a security feature is  NO serious enterprise security provisioning Mobile Security - Fabio Pietrosanti - www.privatewave.com 19
  • 20. Mobile Device Security Mobile security model – Android / Symbian  Sandbox based approach (data caging)  Users h U have ti ht control on application permissions tight t l li ti i i  Symbian is so strict on digital signature enforcement but not on data confidentiality  Symbian requires different level of signature depending on capability usage p g p y g  Android supports digital signing with self-signed certificates but keep java security model  A lot of third party security applications  NO serious enterprise security provisioning Mobile Security - Fabio Pietrosanti - www.privatewave.com 20
  • 21. Mobile Device Security Brew & NucleOS B N l OS  Application is provided *exclusively* from manufacturer and from operator  Delivery is OTA through application portal of operator  Full trust to carrier Mobile Security - Fabio Pietrosanti - www.privatewave.com 21
  • 22. Mobile Device Security Development language security  Development l D l t language/sdk security f t / dk it features support are extremely relevant to increase difficulties in exploiting Blackberry RIMOS J2ME MIDP 2.0 No native code Iphone Objective-C NX Stack/heap protection Windows Mobile Wi d M bil .NET / C++ NET GS enhanced security h d it Nokia/Symbian C++ Enhanced memory management Android/Linux Java & NDK Java security model Mobile Security - Fabio Pietrosanti - www.privatewave.com 22
  • 23. Mobile Security y Mobile Hacking & Attack vector Mobile Security - Fabio Pietrosanti - www.privatewave.com 23
  • 24. Mobile Hacking & Attack Vector Mobile security research  Mobile security research exponentially increased in past 2 years  DEFCON (USA), BlackHat (USA, Europe, Japan), CCC(DE), ShmooCon (USA), YSTS (BR), HITB (Malaysia), CansecWest (CAN), S (C ) EuSecWest)NL, G S( ) Ekoparty (AR), DeepSec ) GTS(BR), k ( ) S (AT) *CLCERT data  Hacking environment is taking much more interests and attention to mobile hacking  Dedicated security community:  TSTF.net , Mseclab , Tam hanna Mobile Security - Fabio Pietrosanti - www.privatewave.com 24
  • 25. Mobile Hacking & Attack Vector Mobile security research - 2008  DEFCON 16 - Taking Back your Cellphone Alexander Lash  BH DC / BH Europe – Intercepting Mobile Phone/GSM Traffic David Hulton, Steve–  BH Europe - M bil Phone Spying T l Jarno Niemelä– E Mobile Ph S i Tools J Ni lä  BH USA - Mobile Phone Messaging Anti-Forensics Zane Lackey, Luis Miras  Ekoparty - S Ek t Smartphones (i ) t h (in)security Nicolas E it Ni l Economou, Alf d O t Alfredo Ortega  BH Japan - Exploiting Symbian OS in mobile devices Collin Mulliner–  GTS-12 - iPhone and iPod Touch Forensics Ivo Peixinho  25C3– Hacking the iPhone - M l N d pytey, planetbeing 25C3 H ki th iPh MuscleNerd, t l tb i  25C3 Locating Mobile Phones using SS7 – Tobias Engel– Anatomy of smartphone hardware Harald Welte  25C3 Running your own GSM network – H Welte, Dieter Spaar H. Welte  25C3 Attacking NFC mobile phones – Collin Mulliner Mobile Security - Fabio Pietrosanti - www.privatewave.com 25
  • 26. Mobile Hacking & Attack Vector Mobile security research 2009 (1)  ShmooCon Building an All-Channel Bluetooth Monitor Michael Ossmann and Dominic Spill  ShmooCon Pulling a John Connor: Defeating Android Charlie Miller  BH USA– A USA Attacking SMS - Z ki Zane Lackey, Luis Miras – L k L i Mi  BH USA Premiere at YSTS 3.0 (BR)  BH USA Fuzzing the Phone in your Phone - Charlie Miller, Collin Mulliner M lli  BH USA Is Your Phone Pwned? - Kevin Mahaffey, Anthony Lineberry & John Hering–  BH USA Post Exploitation Bliss –  BH USA Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo & Charlie Miller–  BH USA Exploratory Android Surgery - Jesse Burns  DEFCON 17– Jailbreaking and the Law of Reversing - Fred Von Lohmann, Jennifer Granick– Mobile Security - Fabio Pietrosanti - www.privatewave.com 26
  • 27. Mobile Hacking & Attack Vector Mobile security research 2009 (2)  DEFCON 17 Hacking WITH the iPod Touch - Thomas Wilhelm  DEFCON 17 Attacking SMS. It's No Longer Your BFF - Brandon Dixon  DEFCON 17 Bluetooth, Smells Like Chicken - Dominic Spill, Michael Ossmann, Ossmann Mark Steward  BH Europe– Fun and Games with Mac OS X and iPhone Payloads - Charlie Miller and Vincenzo Iozzo–  BH Europe Hijacking Mobile Data Connections - Roberto Gassirà and Roberto Piccirillo–  BH Europe Passports Reloaded Goes Mobile - Jeroen van Beek  CanSecWest CanSecWest– The Smart Phones Nightmare Sergio 'shadown' Alvarez Smart-Phones shadown  CanSecWest - A Look at a Modern Mobile Security Model: Google's Android Jon Oberheide–  CanSecWest - Multiplatform iPhone/Android Shellcode, and other smart p , phone insecurities Alfredo Ortega and Nico Economou Mobile Security - Fabio Pietrosanti - www.privatewave.com 27
  • 28. Mobile Hacking & Attack Vector Mobile security research 2009 (3)  EuSecWest - Pwning your grandmother's iPhone Charlie Miller–  HITB Malaysia - Bugs and Kisses: Spying on Blackberry Users for FunSheran Gunasekera YSTS 3 0 / Gunasekera– 3.0  HITB Malaysia - Hacking from the Restroom Bruno Gonçalves de Oliveira  PacSec - The Android Security Story: Challenges and Solutions for Secure Open Systems Rich Cannings & Alex Stamos  DeepSec - Security on the GSM Air Interface David Burgess, Harald Welte  DeepSec - Cracking GSM Encryption Karsten Nohl–  DeepSec - Hijacking Mobile Data Connections 2.0: Automated and Improved Roberto Piccirillo, Roberto Gassirà–  DeepSec - A practical DOS attack to the GSM network Dieter Spaar Mobile Security - Fabio Pietrosanti - www.privatewave.com 28
  • 29. Mobile Hacking & Attack Vector Attack layers la ers  Mobile is attacked at following layers  Layer2 attacks (GSM, UMTS WiFi) (GSM UMTS,  Layer4 attacks (SMS/MMS interpreter)  La er7 attacks (Client side hacking) Layer7 Layer3 (TCP/IP) is generally protected by mobile operators by filtering inbound connections Mobile Security - Fabio Pietrosanti - www.privatewave.com 29
  • 30. Mobile Hacking & Attack Vector Link layer security - GSM  GSM has been cracked with 2k USD hw equipment  http://reflextor.com/trac/a51 - A51 rainbowtable cracking software  http://www.airprobe.org - GSM interception software  http://www.gnuradio.org - Software defined radio  htt // http://www.ettus.com/products - tt / d t USRP2 – Cheap software radio Mobile Security - Fabio Pietrosanti - www.privatewave.com 30
  • 31. Mobile Hacking & Attack Vector Link layer security - UMTS  1°UMTS (Kasumi) cracking paper by Israel s Weizmann Institute of Israel’s Science  http://www.theregister.co.uk/201 0/01/13/gsm_crypto_crack/  Still no public practical p p implementation  UMTS mode-only phones are not reliable Mobile Security - Fabio Pietrosanti - www.privatewave.com 31
  • 32. Mobile Hacking & Attack Vector Link layer security – WiFi  All known attacks about WiFi  R Rogue AP DNS poisoning, AP, i i arp spoofing, man in the middle, middle WEP cracking, cracking WPA-PSK cracking, etc Mobile Security - Fabio Pietrosanti - www.privatewave.com 32
  • 33. Mobile Hacking & Attack Vector Link layer security Rouge operators roaming  Telecommunication operators are trusted among each other (roaming agreements & brokers)  Operators can hijack almost everything of a mobile connections:  mobile connect whatever network is available  Today, becoming a mobile operators is quite easy in certain countries, trust, it’s a matter of money  Today the equipment to run an operator is cheap (OpenBTS & OpenBSC) p p p Mobile Security - Fabio Pietrosanti - www.privatewave.com 33
  • 34. Mobile Hacking & Attack Vector MMS security  Good delivery system for malware (binary mime encoded attachments, like email)  Use just PUSH-SMS for notifications and HTTP & SMIL for MMS retrieval  “Abused” to send out confidential information (intelligence tool for dummies & for activist)  “Abused” to hack windows powered mobile devices  MMS remote Exploit (CCC Congress 2006) http://www.f-secure.com/weblog/archives/00001064.html http://www f secure com/weblog/archives/00001064 html  MMS spoofing & avoid billing attack  http://www.owasp.org/images/7/72/MMS_Spoofing.ppt p p g g p g pp  MMSC filters on certain attachments  Application filters on some mobile phones for DRM purposes Mobile Security - Fabio Pietrosanti - www.privatewave.com 34
  • 35. Mobile Hacking & Attack Vector SMS security (1)  Only 160byte per SMS (concatenation support)  CLI spoofing is extremely easy  SMS interpreter exploit  i h iPhone SMS remote exploit l i http://news.cnet.com/8301-27080_3-10299378-245.html  SMS used to deliver web attacks  Service Loading (SL) primer  SMS mobile data hijacking through SMS provisioning  Send Wap PUSH OTA configuration message to configure DNS (little of social engineerings)  Redirection phishing mitm SSL attack protocol Redirection, phishing, mitm, attack, downgrade, etc, etc  SMSC filters sometimes applied, often bypassed pp yp Mobile Security - Fabio Pietrosanti - www.privatewave.com 35
  • 36. Mobile Hacking & Attack Vector SMS security (2) Easy social engineering for provisioning SMS Thanks to Mobile Security Lab, http://www.mseclab.com Lab http://www mseclab com Mobile Security - Fabio Pietrosanti - www.privatewave.com 36
  • 37. Mobile Hacking & Attack Vector Bluetooth Bl t th (1)  Bluetooth spamming (they call it, “mobile advertising”)  Bluetooth attacks let you:  initiate phone calls  send SMS to any number  read SMS from the phone p  read/write phonebook  set call forwards  connect to the internet  Bluesnarfing, bluebug, bluebugging http://trifinite.org/ http://trifinite org/  Bluetooth OBEX to send spyware Mobile Security - Fabio Pietrosanti - www.privatewave.com 37
  • 38. Mobile Hacking & Attack Vector Bluetooth (2)  Bluetooth encryption has been cracked http://news.techworld.com/security/3797/bluet ooth-crack-gets-serious/  But bluetooth sniffers were expensive  So an hacked firmware of a bluetooth dongle made it accessible: 18$ bluetooth sniffer http://pcworld.about.com/od/wireless/Research er creates Bluetooth c.htm er-creates-Bluetooth-c htm  Bluetooth interception became feasible  Bluetooth SCO (audio flow to bluetooth headset) could let phone call interception Mobile Security - Fabio Pietrosanti - www.privatewave.com 38
  • 39. Mobile Hacking & Attack Vector NFC – what’s that?  Near Field Communications  Diffused in Far East (Japan & China)  Estimated diffusion in Europe/North America: 2013  Estimated financial transaction market: 75bn  NFC Tech: 13.56mhz, data rates 106kbit/s, multiple rfid tags  NFC Tag transmit URI by proximily to the phone that prompts user f action given the protocol: for ti i th t l URI SMS TEL SMART Poster (ringone, application, network configuration)  NFC Tag data format is ndef  J2ME midlet installation is automatic, user is just asked after download Mobile Security - Fabio Pietrosanti - www.privatewave.com 39
  • 40. Mobile Hacking & Attack Vector NFC – example use l  NFC Ticketing (Vienna’s public Ti k ti (Vi ’ bli  Vending machine NFC payment services)  Totem public tourist information Mobile Security - Fabio Pietrosanti - www.privatewave.com 40
  • 41. Mobile Hacking & Attack Vector NFC - security  EUSecWest 2008: Hacking NFC mobile p g phones, the , NFCWorm http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html  URI Spoofing:  Hide URI pointed on user  NDEF WWorm  Infect tags, not phones  Spread by writing writable tags  Use URI spoofing to point to midlet application that are automatically downloaded y  SMS/TEL scam through Tag hijacking Mobile Security - Fabio Pietrosanti - www.privatewave.com 41
  • 42. Mobile Hacking & Attack Vector Mobile Web Security - WAP  HTTPS i considered a secure protocol is id d t l  Robust and reliable based on digital certificate  WAP is often used by mobile phones because it has special rates and mobile operator wap portals are i l d bil l feature rich and provide value added contents  WAP security uses WTLS that acts as a proxy between a WAP client and a HTTPS server  WTLS in WAP browser breaks the end-to-end security nature of SSL in HTTPS  WAP 2 fix it, only modern devices and modern WAP gateway Mobile Security - Fabio Pietrosanti - www.privatewave.com 42
  • 43. Mobile Hacking & Attack Vector Mobile Web Security – WEB  Most issues in end-to-end security  Attackers are facilitated  Phones send user-agent identifying precise mode  Some operator HTTP transparent proxy reveal to web server MSISDN and IMSI of the phone p  Mobile browser has to be small and fast but…  Mobile browser has to be compatible with existing p g web security technologies Mobile Security - Fabio Pietrosanti - www.privatewave.com 43
  • 44. Mobile Hacking & Attack Vector Mobile Web Security – WEB/SSL  SSL is the basic security system used in web for HTTPS  It gets sever limitation for wide acceptance in mobile environment ( h i (where smartphone are j h just part of) f)  End-to-end break of security in WTLS  Not all available phones support it  Out of date Symmetric ciphers  Certificates problems (root CA)  Slow to start  Certificates verification problems Mobile Security - Fabio Pietrosanti - www.privatewave.com 44
  • 45. Mobile Hacking & Attack Vector Mobile Web Security – SSL UI  Mobile M bil UI are not coherent when handling t h t h h dli SSL certificates and it may be impossible for an extremely tricky user to verify the HTTPS y y y information of the website  Details not always clear  From 4 to 6 click required to check SSL information  Information is not always consistent al a s  Transcoder makes the operator embed their custom trusted CA-root to be able CA root to do Main In the Middle while optimizing web for mobile Mobile Security - Fabio Pietrosanti - www.privatewave.com 45
  • 46. Mobile Hacking & Attack Vector Mobile Web Security – Tnx to Rsnake & Masabi SSL UI Mobile Security - Fabio Pietrosanti - www.privatewave.com 46
  • 47. Mobile Hacking & Attack Vector Mobile VPN  Mobile devices often need to access corporate networks  VPN security has slightly different concepts y g y p  User managed VPN (Mobile IPSec clients)  Operator Managed VPN (MPLS-like model with dedicated APN on 3G data networks) Authentication based on SIM card and/or with login/password d/ i hl i / d Mobile Security - Fabio Pietrosanti - www.privatewave.com 47
  • 48. Mobile Hacking & Attack Vector Voice interception  Voice interception is the most known and p considered risks because of media coverage on legal & illegal wiretapping  I t Interception th ti through S h Spyware i j ti injection (250E)  Interception through GSM cracking (2000-150.000E)  Interception through Telco Hijacking (30.000E)  Approach depends on the technological skills of the attacker  Protection is not technologically easy Mobile Security - Fabio Pietrosanti - www.privatewave.com 48
  • 49. Mobile Hacking & Attack Vector Location Based Services or Location Based Intelligence? (1)  New risks given by official and unofficial LBS technologies  GPS:  Cheap cross-platform powerful spyware software with geo tracking (http://www.flexispy.com) (htt // fl i )  Gps data in photo’s metadata (iphone)  Community based tracking (lifelook) Mobile Security - Fabio Pietrosanti - www.privatewave.com 49
  • 50. Mobile Hacking & Attack Vector Location Based Services or Location Based Intelligence? (2)  HLR (Home Location Register) MSC lookup:  GSM network ask the network’s HLR’ t k k th t k’ HLR’s: where is the phone’s MSC?  Network answer: {"status":"OK","number":"123456789","imsi":"22002123456 7890","mcc":"220",”mnc":"02","msc":"13245100001",””msc _location”:”London,UK”,”operator_name”:” Orange ( ) , p (UK)”,”operator_country”:”UK”} _ y }  HLR Lookup services (50-100 EUR):  http://www.smssubmit.se/en/hlr- lookup.html l k ht l  http://www.routomessages.com Mobile Security - Fabio Pietrosanti - www.privatewave.com 50
  • 51. Mobile Hacking & Attack Vector Mobile malware - spyware  Commercial spyware focus on information spying  Flexispy (cross-platform commercial spyware) Listen to an active phone call (CallInterception) Secretly read SMS, Call Logs, Email, Cell ID and make Spy Call Listen to the phone surrounding Secret GPS trackingg Highly stealth (user Undetectable in operation)  A lot small softwares made for lawful and unlawful use by many small companies Mobile Security - Fabio Pietrosanti - www.privatewave.com 51
  • 52. Mobile Hacking & Attack Vector Mobile malware – virus/worm (1)  Worm  Still no cross-platform system  Mainly involved in phone fraud (SMS & Premium numbers)  Sometimes making d i ki damage  Often masked as useful application or sexy stuff  In July 2009 first mobile botnet for SMS spamming http://www.zdnet.co.uk/news/security-threats/2009/07/16/phone-trojan- http://www zdnet co uk/news/security threats/2009/07/16/phone trojan has-botnet-features-39684313/ Mobile Security - Fabio Pietrosanti - www.privatewave.com 52
  • 53. Mobile Hacking & Attack Vector Mobile malware – virus/worm (2)  Malware full feature list Spreading via Bluetooth, MMS, Sending SMS messages, Infecting files, Enabling remote control of the smartphone, M dif i fil E bli l f h h Modifying or replacing icons or system applications, Installing "fake" or non- working fonts and applications, Combating antivirus programs, Installing th I t lli other malicious programs, Locking memory cards, li i L ki d Stealing data, Spreading via removable media (memory sticks) , Damaging user data, Disabling operating system security mechanisms, mechanisms Downloading other files from the Internet Calling Internet, paid services,Polymorphism Source: Karspersky Mobile Malware evolution http://www.viruslist.com/en/analysis?pubid=204792080 Mobile Security - Fabio Pietrosanti - www.privatewave.com 53
  • 54. Mobile Hacking & Attack Vector Mobile Forensics  It's not just taking down SMS, photos and addressbook, but all the information ecosystem of the new phone  Like a new kind of computer to be analyzed, just more difficult  Require custom equipment q q p  Local data easy to be retrieved  Network data are not affordable, spoofing is concrete  More dedicated training course about mobile forensics bil f i Mobile Security - Fabio Pietrosanti - www.privatewave.com 54
  • 55. Mobile Hacking & Attack Vector Extension of organization: The operator  Mobile operator customer service identify users by CLI & some personal data  Mix of social engineering & CLI spoofing let g g p g compromise of  Phone call logs (Without last 3 digits)  Denial of service (sim card blocking)  Voice mailbox access (not always) Mobile Security - Fabio Pietrosanti - www.privatewave.com 55
  • 56. Mobile Hacking & Attack Vector Some near future scenarios  Real diffusion of cross-platform trojan targeting fraud (espionage already in p ( p g y place) )  Back to the era of mobile phone dialers  Welcome to the new era of mobile phishing  QR code phishing:  “Free mobile chat, meet girls” -> Free girls > http://tinyurl.com/aaa -> web mobile-dependent malware.  SMS spamming becomes aggressive Mobile Security - Fabio Pietrosanti - www.privatewave.com 56
  • 57. Mobile Security y The economic risks TLC & Financial frauds Mobile Security - Fabio Pietrosanti - www.privatewave.com 57
  • 58. The economic risks Basic of phone fraud  Basic of fraud  Make the user trigger billable events  Basics of cash-out  Subscriber billable communications SMS to premium number CALL premium number CALL international premium number DOWNLOAD content from wap t tf sites (wap billing) Mobile Security - Fabio Pietrosanti - www.privatewave.com 58
  • 59. The economic risks Fraud against user/corporate  Induct users to access content through:  SMS spamming (Finnish & Italian cases)  MMS spamming  Web delivery of telephony related URL (sms:// tel://)  Bluetooth spamming/worm  Phone dialers back from the ‘90 modem 90 age Mobile Security - Fabio Pietrosanti - www.privatewave.com 59
  • 60. The economic risks Security of mobile banking g  Very h heterogeneous approach to access & security: h  STK/SIM toolkit application mobile banking  M bil web mobile banking - powerful phishing Mobile b bil b ki f l hi hi  Application based mobile banking (preferred because of usability)  SMS banking (feedbacks / confirmation code) Mobile Security - Fabio Pietrosanti - www.privatewave.com 60
  • 61. Mobile Security y Conclusion Mobile Security - Fabio Pietrosanti - www.privatewave.com 61
  • 62. Conclusion Enterprise mobile security policies?  Still not widely diffused  Lacks of general knowledge about risk g g  Lacks of widely available cross-platform tools  Difficult to be effectively implemented y  Application protection and privileges cannot be finely tuned across different platforms in the same way  The only action taken usually is anti-theft and device- specific security services (such as Blackberry application provisioning/protection & data encryption) Mobile Security - Fabio Pietrosanti - www.privatewave.com 62
  • 63. Conclusion New challenges require new approach  Mobile manufacturer, Mobile OS provider and Carriers should agree on true common standards for f securityi  Antifraud systems must be proactive and new technology sho ld secure “by-design” technolog should sec re “b design”  Enterprises should press the market and, large ITSec vendors should push on manufacturer & operators for homogeneous security solutions  We should expect even more important attacks soon Mobile Security - Fabio Pietrosanti - www.privatewave.com 63