17
1 STRICTLY PRIVATE & CONFIDENTIAL © 2015 STRICTLY PRIVATE & CONFIDENTIAL © 2015 1 3 ways to loose your identity in the Mobile World

3 ways to lose your identity in the mobile world

Embed Size (px)

Citation preview

Page 1: 3 ways to lose your identity in the mobile world

1 STRICTLY PRIVATE & CONFIDENTIAL © 2015 STRICTLY PRIVATE & CONFIDENTIAL © 2015 1

3 ways to loose your identity in the Mobile World

Page 2: 3 ways to lose your identity in the mobile world

2 STRICTLY PRIVATE & CONFIDENTIAL © 2015 STRICTLY PRIVATE & CONFIDENTIAL © 2015 2

Rogue Mobile Apps

Page 3: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

3 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps Subtly altered version of popular apps are being solicited by hackers Often available free, and offered to be installed or downloaded after a

survey that promises an iPAD Google and Apple support alternative stores or private stores Rogue Mobile Apps spread through alternative stores

Page 4: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

4 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps In 2015 Apple admitted to its App Store

hosted apps that installed Root Certificates

Ad-blocker apps like Been Choice on your phone MiTM the traffic using self-signed Root Certificates to read and remove Ads from Facebook, Pinterest etc

But they can also read/decrypt the TLS traffic thereby stealing your identity(similar to the Lenovo superfish adware)

Page 5: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

5 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps Rogue Apps that are a look alike

Android 09Droid phishing application is one good example that was intended to gather users’ banking credentials

A snapshot of a set of fake mobile app

Small screen and partial display of URLs make it difficult to differentiate

http://arstechnica.com/security/2015/10/apple-removes-several-apps-that-could-spy-on-encrypted-traffic/

Page 6: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

6 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps The vast majority of rogue apps are

found on unofficial app stores or websites, many based in China or Russia.

This rogue apps presents normal functionality with a malicious code intended to run on behalf of attacker.

Possible suspicious activity : Balance deduction, Rapid Battery drains

Ex: Google++ , DroidDream (malware embedded in apps)

Detection : Anti-virus

http://www.cnet.com/news/android-malware-masquerading-as-google-app/ https://blog.lookout.com/blog/2011/03/02/android-malware-droiddream-how-it-works/

Page 7: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

7 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps With the increasing numbers of applications available for Android;

spyware is becoming a real concern. Several malicious applications, ranging from fake banking applications

to an SMS Trojan embedded into a fake media player.

Page 8: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

8 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Rogue Mobile Apps Defending against Rogue Mobile Apps

Do not trust or install ad blocking apps that are not certified by Apple or Google

Do not install apps from unofficial stores

Do not click on links sent via SMS or Whatsapp that invoke installation of apps

Have a good Anti-virus and Anti-malware software installed on mobile phones

Page 9: 3 ways to lose your identity in the mobile world

9 STRICTLY PRIVATE & CONFIDENTIAL © 2015 STRICTLY PRIVATE & CONFIDENTIAL © 2015 9

Menace of Ad Libraries

Page 10: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

10 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Menace of Ad Libraries Mobile users should be aware of risks of some mobile ads may pose In a study of 100,000 apps in the Google Play market, more than half

had ad libraries. 297 of these were using ad libraries that could run code from remote servers

Researchers said they've found more than 250 iOS apps that violate Apple's App Store privacy policy forbidding the gathering of e-mail addresses, installed apps, serial numbers, and other personally identifying information that can be used to track users.

In-App ad libraries can retrieve ads remotely and some ad libraries have the same permissions that users grant the app during installation. Retrieve users’ location, call logs, phone numbers, device ID etc

http://arstechnica.com/security/2015/10/apple-removes-several-apps-that-could-spy-on-encrypted-traffic/

http://arstechnica.com/security/2015/10/researchers-find-256-ios-apps-that-collect-users-personal-info/

Page 11: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

11 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Menace of Ad Libraries Ads are used to get revenue out of free apps.

Mainly third party library are used.

Have same permission as the actual installed app.

Send and receive data in unencrypted HTTP protocol.

Collects user personal information and location based data.

Could be used to spy users.

“We’ve identified a group of apps that are using a third-party advertising SDK, developed by Youmi, a mobile advertising provider, that uses private APIs to gather private information, such as user email addresses and device identifiers, and route data to its company server. “ Apple

Impact Collecting sensitive information from

users

Propagating itself via SMS message

Potentially pushing fraudulent advertisements

Ability to execute additional payloads

Page 12: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

12 STRICTLY PRIVATE & CONFIDENTIAL © 2015

Menace of Ad Libraries Defend against Ad Libraries

Always be wary of apps asking for more permissions that required

Apps like permissionDog allow you check what permissions other apps have.

Check Privacy settings after installation of any app

Delete apps that do not allow you change privacy settings or permissions

Page 13: 3 ways to lose your identity in the mobile world

13 STRICTLY PRIVATE & CONFIDENTIAL © 2015 STRICTLY PRIVATE & CONFIDENTIAL © 2015 13

NotSoSecure Wifi

Page 14: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

14 STRICTLY PRIVATE & CONFIDENTIAL © 2015

NotSoSecure Wifi SSLstrip is an SSL stripping proxy, designed to make unencrypted HTTP

sessions look as much as possible like HTTPS sessions. It converts https links to http or to https with a known private key. It even provides a padlock favicon for the illusion of a secure channel. Many HTTPS sites are normally accessed from a redirect on an HTTP

page, and many users don't notice when their connection isn't upgraded.

Commonly used on Wifi networks alongwith MiTM attacks

Page 15: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

15 STRICTLY PRIVATE & CONFIDENTIAL © 2015

NotSoSecure Wifi App for MiTM

Zanti

SSL strip for android

Page 16: 3 ways to lose your identity in the mobile world

Click to edit Master title style

STRICTLY PRIVATE & CONFIDENTIAL © 2015

Click to edit Master text styles Second level

Third level

Fourth level

Fifth level

16 STRICTLY PRIVATE & CONFIDENTIAL © 2015

NotSoSecure Wifi Defending Against SSL Stripping

What can Enterprises do? Enable SSL site wide (i.e., use HTTPS only)

Enable HSTS (HTTP Strict Transport Security).

Enable Cert Pinning.

What can Users do? Do not trust Public Wifi

Do not perform sensitive transactions, or access social media via Public Wifi.

Do not start or use email clients, or chat clients while using Public Wifi.

Use a Private VPN service when using Public Wifi to tunnel all internet traffic via the secure VPN connection

Page 17: 3 ways to lose your identity in the mobile world

18 STRICTLY PRIVATE & CONFIDENTIAL © 2015 © 2015 PALADION NETWORKS PRIVATE LIMITED | WWW.PALADION.NET | CONFIDENTIAL18