15
MOBILE APPLICATIONS THREATS REVIEW S1 2017

OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

MOBILE APPLICATIONS THREATS REVIEW S1 2017

Page 2: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

KEY FINDINGS

This study is based on a sample of

1.5 Million

M o s t R e c e n t S i n g l e

A p p l i c a t i o n s

processed by Pradeo's engine

An explosion of unknown malwares is being observed whereas

known malwares are maintaining the same ratio outlining the

mismatch of antivirus solutions to protect against such threats.

For both Android and iOS applications, data leakage and

corruption represent the main source of threat despite store

policies and permissions.

1 out of 4 Applications embeds vulnerabilities for which 75% are

ranked in the OWASP TOP 10.

The most popular Applications are not the safest ones. Games,

Entertainment and Tools have higher threat ratios compared to all

Apps categories.

Page 3: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

THE PREVALENCE OF APPLICATIONS In the mobile threat landscape

We commonly consider our smartphones and tablets as small computers. In term of security, this statement applies to network and device layers where both attack and protection techniques are similar.

On another hand, Apps bring a new dimension to mobile usages with an inescapable access point to personal and corporate information.

With a short development cycle, a direct access to end users with the publication on stores…

Apps became the main vector of threats and come on top of mobile security challenges.

Repartition of mobile threat sources

Page 4: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

OVERVIEW ON APPS NATURE Nowadays, we can find Applications for every purposes; ranking from business activities to a personal day-to-day use, from Games or Entertainment to specific Tools need. When focusing on a device, it appears that half of its applications are safe, but the other half turns to be intrusive and could even include malwares. From a general perspective, the figures are even worse with 60.7% of Applications leaking or corrupting data which reflect the real risk coming from Apps and this not just for individuals but also for companies.

On average, a smartphone has 51 applications with 1 out of 2 being intrusive.

25 Safe applications

25.4 Intrusive applications

0.6 Malicious application 60.7%

12.5%

5.5%

1.5%

The combined set of Applications across devices highlights more than 60% of Applications to feature data leakage or corruption.

% Applications featuring a malicious or an intrusive behavior

Data leakage or corruption

Malware System Manipulation

Communications exploit

Based on a sample of 10531 mobile devices.

Page 5: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

MALWARES TREND Unknown malwares are on the rise

0.7%

0.3%

0.6%

1.2%

Known malwares Unknown malwares

2016 S1 report 2017 S1 report

Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1 2017, the volume of applications infected by known malware remain stable whereas unknown malwares quadrupled.

This trend reflects the evolution of the mobile cyber-criminality and the incapacity of an antivirus to properly counter and stop mobile threats. Hackers keep on developing unknown and advanced threats and easily bypass traditional antivirus protections.

% applications embedding known or unknown malwares

4X U n k n o w n m a l w a r e s

whereas

K n o w n m a l w a r e s

maintain the same ratio

More applications embedding

Page 6: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

TOP 3 Keylogger, Data Sending Trojan and Screenlogger remain on top of unknown malwares identified within applications. The volume of other unknown malwares increased from 3% to 6% in one year.

OTHER CATEGORIES Overlay attack is surfacing in 2017 metrics representing 0,1% of unknown malwares. In line with the news, Ransomwares are spreading with a growth of infected applications. OTP interceptor malware represents the largest growth moving from 52% to 70%.

Repartition of others categories of unknown malwares

8%

35%

54%

3%

Keylogger Data Sending Trojan

13%

25%

56%

6%

Screenlogger Others

Main categories of unknown malwares in 2016 S1 report

Main categories of unknown malwares in 2017 S1 report

FOCUS ON CATEGORIES OF UNKNOWN MALWARES

0%

0.1%

0.6%

1.0%

0.8%

0.7%

1.6%

4.1%

Overlay Ransomware SMS Trojan OTP interceptor

6% others in 2017 S1 report

3% others in 2016 S1 report

Page 7: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

DATA LEAKAGE OR CORRUPTION Sending, deletion or modification

29% of Applications exploit user's location

52%

of Applications manipulate hardware information

13.4%

23.8%

29.5%

47.8%

52%

Network information

Device identifiers

Phone network information

Device information

Hardware information

0.7%

1.0%

3.3%

3.6%

4.2%

5.9%

6.3%

29%

Call logs

Audio/video recordings

User files

SMS/MMS

Contacts information

User information

User profile information

Location information

% of Applications manipulating user's data

User's data

Device's data

% of Applications manipulating device's data

Data leakage or corruption come on top of identified threats in this study with 60.7% of Applications featuring intrusive behaviors.

This demonstrates the gap between public stores standard security policies and data protection levels expected by companies or individuals.

Page 8: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

PERMISSIONS Permeable boundaries

0.1%

38%

24%

21.7%

45.8%

Send SMS permission

Send SMS permission

Read SMS permission

Read contact permission

Read phone state permission Send out device identifier

% of Applications bypassing permissions and performing data leakage

Send out contacts

Send out automatic SMS

Send out automatic SMS to premium rate numbers

Despite the nature of permissions, Applications can bypass those boundaries and perform data leakage. Permissions grant the ability for an Application to manipulate a data.

Permissions cannot be considered as proper safeguards for data protection nor reflect any risk level to evaluate Applications.

Send out SMS conversation

Page 9: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

SYSTEM MANIPULATION

4%

2%

Exploit rootkit

Perform an action on the environment

Volume of Applications manipulating the system

1 APP on 2 3 0 0 0

Root the device

COMMUNICATIONS EXPLOIT

Volume of Applications exploiting communications

10.2%

2.6%

Unsecured or unauthorized connections

Invisible Calls / SMS / MMS

Those metrics highlight the ability of some Applications to manipulate their environment.

4% of Applications are exploiting elevated privileges of rooted or jailbroken devices and 2% perform actions on the device such as killing or launching another application‘s process.

With 12.5% of Applications exploiting communications, it represents the 2nd source of threat coming from Applications.

1 out of 10 Applications performs unsecured connections increasing the exposure to network threats. On another hand, invisible calls / SMS or MMS might cause financial losses when dialing premium rate numbers.

Page 10: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

APPLICATIONS VULNERABILITIES An open door to hackers

¼ Application embeds vulnerabilities

with an average per Application of

3.4 vulnerabilities

¾ of Applications report flaws ranked within OWASP TOP 10

with an average per Application of

1.6 vulnerabilities

Applications with vulnerabilities Vulnerable Applications with OWASP TOP 10 flaws

A vulnerability represents a weakness within an Application that could be exploited to jeopardize it. The study identified that 25% of Applications are embedding weaknesses, for which 75% of them are listed in the OWASP top 10 flaws.

The implementation of new regulations regarding data privacy protection might positively impact those ratios in the future enforcing companies to include security within their development process.

Page 11: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

WHAT ABOUT MOST POPULAR APPLICATIONS? Games, Entertainment and Tools

% Applications featuring a malicious or an intrusive behaviors in Games, Utilities & Tools and Entertainment categories

The most popular Applications are not the safest ones.

The focus on Games, Tools and Entertainment families of Applications outlines high rates of Applications presenting malicious or intrusive behaviors.

% Applications featuring a malicious or an intrusive behaviors

0.7%

2.4%

1.7%

1.7%

9.8%

2.8%

3.4%

9.2%

8.2%

72.4%

55.2%

68.5%

Games

Tools

Entertainment

Data leakage and corruption Communications exploit

System manipulation Malwares

Higher threat ratio compared to all Apps categories

60.7%

12.5%

5.5%

1.5%

Data leakage or corruption

Malwares System manipulation

Communications exploit

Page 12: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

ANDROID / iOS WHAT IS DIFFERENT?

81.7%

17.9%

99.6% of new smartphones run Android or iOS

0.3%

3.3%

6.8%

47.8%

2.1%

6.5%

15.4%

67.2%

Malwares

System manipulation

Communications exploit

Data leakage or corruption

Android iOS

% Applications featuring a malicious or an intrusive behaviors for Android and iOS

Android turns out to be a privileged threat landscape.

More permissive than iOS, Android is an easier playground for hackers with a higher propagation rate because of its widespread use. iOS requires more complex hacking techniques to bypass Play store's and user's checks. However, data leakage and corruption also hits a high ratio with 47.8% of Applications. In addition, iOS malwares, though less numerous than Android, still represent an important threat in terms of damages.

Gartner's Q4 2016 figures

Page 13: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

RECOMMENDATIONS

1. Keep your system updated An update is available? Install it right away; it probably holds corrections of your current version’s detected breaches. 2. Don’t download applications outside official

stores The App Store and the Google Play Store provide both a first level security evaluation, prior to publishing the App on their stores. In opposition to third party stores, on which a great part of their available applications are malwares. 3. Verify applications’ permissions Asking a permission should be related with the app’s main purpose. For instance, an App that is meant to edit pictures shouldn’t have access to your microphone.

4. Don’t do sensitive operations through open networks

You have to transfer money to an important supplier’s bank account? Doing so during your lunch break while connected to the restaurant’s Wi-Fi might expose you to an attack such as a man-in-the-middle. You should wait to be connected to a secured network. 5. Don’t root / jailbreak your device A “cracked” device gives an easier access to the information it contains and increases its vulnerability. 6. Get a security solution Make sure that you are using a solution that will help you assure apps legitimacy and protect from “zero-day” attacks.

Page 14: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

ABOUT PRADEO

An innovative global Mobile Security company

Recognized by Gartner and Markets&Markets

A unique patented technology

Rewarded by the Telecom Council of Silicon Valley

Strategic technical alliances

With the major EMM and security players as well as manufacturers

A solution to protect Apps and Mobile devices

Several clients in the Fortune 500

Page 15: OBILE APPLICATIONS THREATS REVIEW€¦ · 2016 S1 report 2017 S1 report Known malwares represent applications identified as malicious from their viral signature. From S1 2016 to S1

The technology

PRADEO'S EXPERTISE

Pioneer in the Applications behavioral analysis, PRADEO

has been recognized by Gartner, for the 4th year in a row,

for its mobile security technology.

PRADEO SECURITY solution delivers complete, automatic

and seamless services to detect and qualify suspicious

activities and vulnerabilities and proactively protect

devices, applications and sensitive data with a full 360°

security approach.

Fore more details

www.pradeo.com - [email protected]