SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
FFRI,Inc.
1
Monthly Research
A Survey of Threats in OS X and iOS
FFRI, Inc.
http://www.ffri.jp
Ver 1.00.01
FFRI,Inc.
Overview/Background
• Recently, business use of Mac and iPhone/iPad is increasing.
– It is possible to coexist with Windows by virtual machine or Boot Camp.
– BYOD(Bring Your Own Device) solution for iPhone is available.
• iPhone is popular for general users in Japan, so it is often also used to
BYOD.
– It is believed no malware exists on iPhone.
• A security researcher showed that OS X’s four security
mechanisms(Gatekeeper, XProtect, App Sandbox, Code Signing)
were avoidable easily at RSA Conference USA 2015.
– He said that no security software for Mac detects his attack technique.
• Therefore, we surveyed threats of OS X and iOS
2
FFRI,Inc.
Case Studies: OS X/iOS Malware
• [OS X/2014] iWorm
– Infected via pirated software.
– This bot gets C&C server address list which was written by the attacker on
reditt.com.
• [iOS/2014] WireLurker
– Infected to Windows and OS X via pirated software.
– Infected iPhone App by abusing Sync function.
– Send contacts list to C&C server.
• [iOS/2015] OneClick Fraud App
– Attacker abuses “iOS Developer Enterprise Program” and distributes malware any
place other than AppStore.
– This malware displays fraud contents on the Web server side.*
* The malware to use such a technique is generally in Android.
3
FFRI,Inc.
Activity Overview: WireLurker
4
C&C
Server
Hosting
Server
Pirated software
including the malware
#1 Install Malware
#2 Hiding file of itself
(rootkit)
#3 Stealing of User data
(OSX)
#4 Monitoring USB Connection
#1 Connect to Infected
Device by USB
#2 Collect Apps &
Device Information
#3 Tamper with
Specific(Coded) Apps
#4 Stealing of
Device Information
#5 (When Executed Tampered App)
Stealing of User data
OS X
iOS
FFRI,Inc.
Activity Overview: OneClick Fraud App
5
Apple
Attacker
Malware
(malicious *.ipa)
Malicious Contents
(Web Based)
ipa apkplist
Hosting Server
#1 Deploy
#2 Inspection
is OK
#4 Upload
#5 Visit Contents
and
Click Download link
#6 Check User-Agent
#7 Download plist
#8 Check a Digital Sign based on
Information of plist
#10 Installation Permission
of the App
confirm
#11 infect
OK!
#9 Download App
#12 Visit Contents
and
Large Amount Request
User Interaction
Malicious Activity
*.plist
#3 Generate a plist to
distribute malware via
AdHoc
FFRI,Inc.
Case Studies: OS X/iOS Vulnerability
• [OS X/iOS] Denial of Service via crafted Unicode text
– CVE-2015-1157
– OS/app crashes or reboots when it received crafted message.
– Reported in May 2015.
– Fixed at iOS 8.4 and OS X 10.10.4.
• [OS X/iOS] Cross Application Resource Access (XARA)
– Vulnerability caused by authentication between application.
– Various passwords might be stolen if the vulnerability is exploited.
– Reported in June 2015.
– Apple officials released the following statement:
“we implemented a server-side app security update that secures app data and blocks
apps with sandbox configuration issues from the Mac App Store.”
6
FFRI,Inc.
Routes of Infection and Cyber Attacks
7
Attacker
The Internet
Attacker
(sniffer)
OS X iOS
Sniffing and spoofing
by abuse of “Free Wi-Fi Spot”
Infected to iPhone App
via Sync function
Malware distribution
by abuse of the iOS developer Enterprise program
Drive-by-Download
(e.g. using Java exploit)
Infected through pirated software
Privilege escalation by
kernel vulnerability
FFRI,Inc.
Conclusion
• Recently, OS X and iOS are becoming target of cyber attacks.
– As a result, attack technique peculiar to OS X and iOS comes up.
(e.g. Abuse of sync function, malware distribution by AdHoc etc.)
• We recommend some security settings for Mac and iPhone
based on current state of threats.
– Target system is OS X 10.10.x (Yosemite) and iOS 8.x.
– These settings are only minimal measures.
– These are not always preventing any attacks.
8
FFRI,Inc.
Security Checkpoints in Your Mac/iPhone
9
FFRI,Inc.
Security Checkpoints in Your Mac #1
1.Install security update automatically
– Keep latest software version for vulnerability fix.
10
FFRI,Inc.
Security Checkpoint in Your Mac #2
2.Disable Java plug-in on browser
– Java vulnerabilities are exploited for a lot of malware infection on Mac.
11
FFRI,Inc.
Security Checkpoint in Your Mac #3
3.Enable Firewall
– Firewall is blocking untrusted inbound communication.
12
FFRI,Inc.
Security Checkpoint in Your Mac #4
4.Finder settings
– Finder does not display file extension by default
– We recommend “Show all filename extensions” to detect malware
disguised as harmless file.
13
FFRI,Inc.
Security Checkpoint in Your Mac #5
5.Encryption setting of disk (FileVault)
– It is possible to prevent info leakage when your mac was lost or stolen.
14
FFRI,Inc.
Security Checkpoint in Your Mac #6
6.Screen lock with password
– It is possible to prevent info leakage when your mac was lost or stolen.
15
FFRI,Inc.
Security Checkpoint in Your Mac #7
7.Disable built-in guest user
– It is possible to reduce attack surface.
16
FFRI,Inc.
Security Checkpoint in Your Mac #8
8.Use strong encryption method for Wi-Fi
– Do not connect to non-encrypted access point
– Do not use WEP and WPA-PSK (TKIP)
– Use WPA2 or WPA-PSK (AES)
17
FFRI,Inc.
Security Checkpoint in Your Mac #9
9.Enable “Find my Mac”
– It is possible to trace location when your mac was lost or stolen
18
FFRI,Inc.
Security Checkpoint in Your iPhone #1
1. Install Software update
– iOS update is included security updates
– Keep latest iOS version for vulnerability fix.
19
FFRI,Inc.
Security Checkpoint in Your iPhone #2
2. Screen lock with Touch ID/Passcode
– It is possible to prevent info leakage when lost or stolen
20
FFRI,Inc.
Security Checkpoint in Your iPhone #3
3. Use strong encryption method for Wi-Fi
– Do not connect to non-encrypted access point
– Do not use WEP and WPA-TKIP
– Use WPA2 or WPA-PSK(AES)
21
Do not connect to non-
encrypted access point
FFRI,Inc.
Security Checkpoint in Your iPhone #4
4-1. Do not “trust” PC unnecessarily
– WireLurker infects to iPhone via infected PC
4-2. Do not install apps provided by untrusted developer
– Confirm app developer identity
when iOS demands your permission
22
FFRI,Inc.
Security Checkpoint in Your iPhone #5
5. Enable “Find my iPhone” and “Backup”
– It is possible to trace your iPhone location when lost or stolen.
– Even if iPhone breaks down, you can restore data from backup.
23
FFRI,Inc.
Security Checkpoint in Your iPhone #6
6. Check privacy settings
– iOS can control core functions(camera, location service, etc.) for each apps.
– Check your needs and app permissions.
24
FFRI,Inc.
Security Checkpoint in Your iPhone #7
7. Check profile settings
– Do not install suspicious profile
– Delete suspicious profile
– Malicious profile allow sniffing of your traffic by attacker
25
FFRI,Inc.
References
• Malware Persistence on OS X Yosemite
– https://www.rsaconference.com/writable/presentations/file_upload/ht-r03-malware-persistence-
on-os-x-yosemite_final.pdf
• WIRELURKER: A New Era in iOS and OS X Malware
– https://www.paloaltonetworks.com/content/dam/paloaltonetworks-
com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf
• Japanese one-click fraudsters target iOS users with malicious app delivered over the air
– http://www.symantec.com/connect/blogs/japanese-one-click-fraudsters-target-ios-users-
malicious-app-delivered-over-air
• Unauthorized Cross-App Resource Access on MAC OS X and iOS
– https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view?pli=1
• Serious OS X and iOS flaws let hackers steal keychain, 1Password contents
– http://arstechnica.com/security/2015/06/serious-os-x-and-ios-flaws-let-hackers-steal-keychain-
1password-contents/
• iPhone text message bug can crash Apple Watch, iPad and Mac too
– http://www.theguardian.com/technology/2015/may/28/iphone-text-message-bug-crash-apple-
watch-ipad-mac
• Malicious Profiles – The Sleeping Giant of iOS Security
– https://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/
• NETMARKETSHARE
– http://www.netmarketshare.com/
• openclipart
– https://openclipart.org/share
26
FFRI,Inc.
Contact Information
E-Mail : research—feedback@ffri.jp
Twitter: @FFRI_Research
27

Contenu connexe

Tendances

Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By NirmalNIRMAL RAJ
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareSam Bowne
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a HouseSynack
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Anant Shrivastava
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00srini0x00
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applicationsSatish b
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaYogesh Ojha
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 

Tendances (20)

WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a House
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applications
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 

Similaire à Monthly Survey of OS X and iOS Threats

Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
Wirelurker
WirelurkerWirelurker
Wirelurkeranupriti
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Subho Halder
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Svetlin Nakov
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndy Lee
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscapeAndrey Apuhtin
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxEric Selje
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecNowSecure
 

Similaire à Monthly Survey of OS X and iOS Threats (20)

Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
128-ch3.pptx
128-ch3.pptx128-ch3.pptx
128-ch3.pptx
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audio
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscape
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptx
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 

Plus de FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) FFRI, Inc.
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...FFRI, Inc.
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)FFRI, Inc.
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) FFRI, Inc.
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShellFFRI, Inc.
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressFFRI, Inc.
 
MR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions OverviewMR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions OverviewFFRI, Inc.
 
MR201501 Latest trends in Linux Malware
MR201501 Latest trends in Linux MalwareMR201501 Latest trends in Linux Malware
MR201501 Latest trends in Linux MalwareFFRI, Inc.
 
MR201412 Windows New Security Features - Control Flow Guard
MR201412 Windows New Security Features - Control Flow GuardMR201412 Windows New Security Features - Control Flow Guard
MR201412 Windows New Security Features - Control Flow GuardFFRI, Inc.
 

Plus de FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShell
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPress
 
MR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions OverviewMR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions Overview
 
MR201501 Latest trends in Linux Malware
MR201501 Latest trends in Linux MalwareMR201501 Latest trends in Linux Malware
MR201501 Latest trends in Linux Malware
 
MR201412 Windows New Security Features - Control Flow Guard
MR201412 Windows New Security Features - Control Flow GuardMR201412 Windows New Security Features - Control Flow Guard
MR201412 Windows New Security Features - Control Flow Guard
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Monthly Survey of OS X and iOS Threats

  • 1. FFRI,Inc. 1 Monthly Research A Survey of Threats in OS X and iOS FFRI, Inc. http://www.ffri.jp Ver 1.00.01
  • 2. FFRI,Inc. Overview/Background • Recently, business use of Mac and iPhone/iPad is increasing. – It is possible to coexist with Windows by virtual machine or Boot Camp. – BYOD(Bring Your Own Device) solution for iPhone is available. • iPhone is popular for general users in Japan, so it is often also used to BYOD. – It is believed no malware exists on iPhone. • A security researcher showed that OS X’s four security mechanisms(Gatekeeper, XProtect, App Sandbox, Code Signing) were avoidable easily at RSA Conference USA 2015. – He said that no security software for Mac detects his attack technique. • Therefore, we surveyed threats of OS X and iOS 2
  • 3. FFRI,Inc. Case Studies: OS X/iOS Malware • [OS X/2014] iWorm – Infected via pirated software. – This bot gets C&C server address list which was written by the attacker on reditt.com. • [iOS/2014] WireLurker – Infected to Windows and OS X via pirated software. – Infected iPhone App by abusing Sync function. – Send contacts list to C&C server. • [iOS/2015] OneClick Fraud App – Attacker abuses “iOS Developer Enterprise Program” and distributes malware any place other than AppStore. – This malware displays fraud contents on the Web server side.* * The malware to use such a technique is generally in Android. 3
  • 4. FFRI,Inc. Activity Overview: WireLurker 4 C&C Server Hosting Server Pirated software including the malware #1 Install Malware #2 Hiding file of itself (rootkit) #3 Stealing of User data (OSX) #4 Monitoring USB Connection #1 Connect to Infected Device by USB #2 Collect Apps & Device Information #3 Tamper with Specific(Coded) Apps #4 Stealing of Device Information #5 (When Executed Tampered App) Stealing of User data OS X iOS
  • 5. FFRI,Inc. Activity Overview: OneClick Fraud App 5 Apple Attacker Malware (malicious *.ipa) Malicious Contents (Web Based) ipa apkplist Hosting Server #1 Deploy #2 Inspection is OK #4 Upload #5 Visit Contents and Click Download link #6 Check User-Agent #7 Download plist #8 Check a Digital Sign based on Information of plist #10 Installation Permission of the App confirm #11 infect OK! #9 Download App #12 Visit Contents and Large Amount Request User Interaction Malicious Activity *.plist #3 Generate a plist to distribute malware via AdHoc
  • 6. FFRI,Inc. Case Studies: OS X/iOS Vulnerability • [OS X/iOS] Denial of Service via crafted Unicode text – CVE-2015-1157 – OS/app crashes or reboots when it received crafted message. – Reported in May 2015. – Fixed at iOS 8.4 and OS X 10.10.4. • [OS X/iOS] Cross Application Resource Access (XARA) – Vulnerability caused by authentication between application. – Various passwords might be stolen if the vulnerability is exploited. – Reported in June 2015. – Apple officials released the following statement: “we implemented a server-side app security update that secures app data and blocks apps with sandbox configuration issues from the Mac App Store.” 6
  • 7. FFRI,Inc. Routes of Infection and Cyber Attacks 7 Attacker The Internet Attacker (sniffer) OS X iOS Sniffing and spoofing by abuse of “Free Wi-Fi Spot” Infected to iPhone App via Sync function Malware distribution by abuse of the iOS developer Enterprise program Drive-by-Download (e.g. using Java exploit) Infected through pirated software Privilege escalation by kernel vulnerability
  • 8. FFRI,Inc. Conclusion • Recently, OS X and iOS are becoming target of cyber attacks. – As a result, attack technique peculiar to OS X and iOS comes up. (e.g. Abuse of sync function, malware distribution by AdHoc etc.) • We recommend some security settings for Mac and iPhone based on current state of threats. – Target system is OS X 10.10.x (Yosemite) and iOS 8.x. – These settings are only minimal measures. – These are not always preventing any attacks. 8
  • 10. FFRI,Inc. Security Checkpoints in Your Mac #1 1.Install security update automatically – Keep latest software version for vulnerability fix. 10
  • 11. FFRI,Inc. Security Checkpoint in Your Mac #2 2.Disable Java plug-in on browser – Java vulnerabilities are exploited for a lot of malware infection on Mac. 11
  • 12. FFRI,Inc. Security Checkpoint in Your Mac #3 3.Enable Firewall – Firewall is blocking untrusted inbound communication. 12
  • 13. FFRI,Inc. Security Checkpoint in Your Mac #4 4.Finder settings – Finder does not display file extension by default – We recommend “Show all filename extensions” to detect malware disguised as harmless file. 13
  • 14. FFRI,Inc. Security Checkpoint in Your Mac #5 5.Encryption setting of disk (FileVault) – It is possible to prevent info leakage when your mac was lost or stolen. 14
  • 15. FFRI,Inc. Security Checkpoint in Your Mac #6 6.Screen lock with password – It is possible to prevent info leakage when your mac was lost or stolen. 15
  • 16. FFRI,Inc. Security Checkpoint in Your Mac #7 7.Disable built-in guest user – It is possible to reduce attack surface. 16
  • 17. FFRI,Inc. Security Checkpoint in Your Mac #8 8.Use strong encryption method for Wi-Fi – Do not connect to non-encrypted access point – Do not use WEP and WPA-PSK (TKIP) – Use WPA2 or WPA-PSK (AES) 17
  • 18. FFRI,Inc. Security Checkpoint in Your Mac #9 9.Enable “Find my Mac” – It is possible to trace location when your mac was lost or stolen 18
  • 19. FFRI,Inc. Security Checkpoint in Your iPhone #1 1. Install Software update – iOS update is included security updates – Keep latest iOS version for vulnerability fix. 19
  • 20. FFRI,Inc. Security Checkpoint in Your iPhone #2 2. Screen lock with Touch ID/Passcode – It is possible to prevent info leakage when lost or stolen 20
  • 21. FFRI,Inc. Security Checkpoint in Your iPhone #3 3. Use strong encryption method for Wi-Fi – Do not connect to non-encrypted access point – Do not use WEP and WPA-TKIP – Use WPA2 or WPA-PSK(AES) 21 Do not connect to non- encrypted access point
  • 22. FFRI,Inc. Security Checkpoint in Your iPhone #4 4-1. Do not “trust” PC unnecessarily – WireLurker infects to iPhone via infected PC 4-2. Do not install apps provided by untrusted developer – Confirm app developer identity when iOS demands your permission 22
  • 23. FFRI,Inc. Security Checkpoint in Your iPhone #5 5. Enable “Find my iPhone” and “Backup” – It is possible to trace your iPhone location when lost or stolen. – Even if iPhone breaks down, you can restore data from backup. 23
  • 24. FFRI,Inc. Security Checkpoint in Your iPhone #6 6. Check privacy settings – iOS can control core functions(camera, location service, etc.) for each apps. – Check your needs and app permissions. 24
  • 25. FFRI,Inc. Security Checkpoint in Your iPhone #7 7. Check profile settings – Do not install suspicious profile – Delete suspicious profile – Malicious profile allow sniffing of your traffic by attacker 25
  • 26. FFRI,Inc. References • Malware Persistence on OS X Yosemite – https://www.rsaconference.com/writable/presentations/file_upload/ht-r03-malware-persistence- on-os-x-yosemite_final.pdf • WIRELURKER: A New Era in iOS and OS X Malware – https://www.paloaltonetworks.com/content/dam/paloaltonetworks- com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf • Japanese one-click fraudsters target iOS users with malicious app delivered over the air – http://www.symantec.com/connect/blogs/japanese-one-click-fraudsters-target-ios-users- malicious-app-delivered-over-air • Unauthorized Cross-App Resource Access on MAC OS X and iOS – https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view?pli=1 • Serious OS X and iOS flaws let hackers steal keychain, 1Password contents – http://arstechnica.com/security/2015/06/serious-os-x-and-ios-flaws-let-hackers-steal-keychain- 1password-contents/ • iPhone text message bug can crash Apple Watch, iPad and Mac too – http://www.theguardian.com/technology/2015/may/28/iphone-text-message-bug-crash-apple- watch-ipad-mac • Malicious Profiles – The Sleeping Giant of iOS Security – https://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/ • NETMARKETSHARE – http://www.netmarketshare.com/ • openclipart – https://openclipart.org/share 26
  • 27. FFRI,Inc. Contact Information E-Mail : research—feedback@ffri.jp Twitter: @FFRI_Research 27