33
#RSAC Andrew Hoog How Android and iOS Security Enhancements Complicate Threat Detection Session ID: MBS-R03R CEO NowSecure @ahoog42

How Android and iOS Security Enhancements Complicate Threat Detection

Embed Size (px)

Citation preview

Page 1: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

AndrewHoog

HowAndroidandiOSSecurityEnhancementsComplicateThreatDetection

SessionID:MBS-R03R

CEONowSecure@ahoog42

Page 2: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

MobileSecurityIncidentsAreGoingUndetected

Page 3: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Highprofileexamplesofmobilecompromise

CYBERCRIMEFORFINANCIALGAIN

TARGETEDATTACKS

THRIVINGMARKETFORMOBILEEXPLOITS

Page 4: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Historicrecurrence– Web/PCattacksasproxy

Malware

Ransomware

Targetedattacks

“Historymaynotrepeatitselfbutitsuredoesrhyme.”—MarkTwain(reputedly)

Page 5: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Predatorfollowsprey: 2of3minutesarenowmobile

476,553 480,967 550,522 491,743

409,847621,410

778,954 864,32877,081

97,440

118,299 124,787

2013 2014 2015 2016

TOTALMINUTESSPENTONDIGITALMEDIAMobileWebMobileAppDesktop

http://www.comscore.com/layout/set/popup/content/download/36073/1978401/version/1/file/2016_US_Mobile_App_Report.pdf

Page 6: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Knownvulnerabilitiesperplatform(CVEs)

561

492425 423

168112

33 20 6 1 0

173 155 160

87124

74

275

0 0 0 1

DenialofService

ExecuteCode Overflow MemoryCorruption

GainInformation

BypassSomething

GainPrivilege XSS DirectoryTraversal

CSRF SQLInjection

iOS Android

Android• 619lifetimeCVEs(2009– 2016)• 523CVEsin2016

iOS• 984lifetimeCVEs(2007– 2016)• 161CVEsin2016

http://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224http://www.cvedetails.com/product/15556/Apple-Iphone-Os.html?vendor_id=49

Page 7: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Theapertureisspiralingshut

Legacytoolsandmethodsdon’tworkformobile

PlatformarchitectureandAPIrestrictionsrestrictvisibility

Platformsecurityenhancementsdisarmresponders/defenders

Attackersknowmorethantherestofus(asymmetricadvantage)

Securitytelemetryisephemeral,onlyonepointintime

Page 8: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

PlatformSecurityEnhancementsThatPutBlindersOnDefenders/Responders

Page 9: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

1.Prohibitingadmin/rootaccess

PROS

Sandboxing& lackofrootaccesslimitsimpactofsecurityflaws–knownandunknown

Improvesprivacybyrestrictingapp’saccesstosensitivedeviceandotherappdata

CONS

Attackerscontinuetofindwaystoelevateprivileges,givingthemthemtheadvantage

Securitysoftwarecannotrunonthesystemwithsufficientaccesstodetect/preventattacks

Page 10: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

PROS CONS

2.Hamstringingsecuritytoolsonmobiledevices

ForcesOSvendorstobuildsecurityintotheirsystem

Preventstheinstallationofsecurityappsthatmightharborvulnerabilities(e.g.,somePC-basedsecuritysoftwarehasseriousflaws)

Securityappsgeneratedatathatcaneasilybeabused

Lackofvisibilityfordefendersmakesdetectingattacksnearlyimpossible

Continuousmonitoring,anomalydetection,etc.becomeimpossible

Securityinnovationwithers

Page 11: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

PROS CONS

3.Restrictingback-ups

Reducesoverallattacksurface

Datafromadeviceisfarlessaccessibletoattackers

Informationcriticaltoinvestigatingasecuritybreachisnolongeraccessibletodefenders

Attackersbarelyhavetocovertheirtrackswithfewfootprintsleftbehind

Importantdevice-specificartifacts(e.g.theactualappbinary)notavailableforanalysis

Page 12: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

PROS CONS

4.EliminatingaccesstoAPIs&devicedata

Endusers’privacy& datacannotbeviolated(un)intentionallybydevelopers

ReducingcomplexityandquantityofAPIsreducesoverallattacksurface

Defenderslackeventhemostbasicvisibilityintowhat’shappeningonthedevice

(Near)continuousmonitoringisimpossibleviaanapp

Forcesdefenderstophysicallyconnectadevicetoextractrelevanttelemetry

Page 13: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

PROS CONS

5.Implementingsecurebootmechanisms

Defenderscannotaccesssystemimagesorcriticaldevicedataforaninvestigation

Security-consciousexpertscannotinstallalternativeoperatingsystems

Securityresearch,instrumentation,&honeypotsbecomeincrediblydifficult

Anattackerwithphysicalaccesstoyourdevicecan’tbootanalternativeROM& extractyourdata

Abilitytoimplement“TrustedComputing”capabilitiesliketrustedplatformmodules(TPMs)andvendor-specificextensions(e.g.,KNOX,QualcommHaven,etc.)

Page 14: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Platformowners’policies,responsetogovernment&LE

Platformownerswanttogrowandexpandworldwide

Platformownershavemadeconcessionstogovernmentrequestsinthepast(e.g.,inordertooperateinothercountries)

Iftheplatformownerdoesn’tyieldtogovernmentpressure,thegovernmentwilltapthemarkettogetwhattheywant(aswesawintheSanBernardinocase)

Page 15: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

OvercomingCurrentForensicTools’Limitations

15

Page 16: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Thelimitsofavailableforensictoolsasrelatestomobile

Samefundamentals,butdifferentangle–weneedmorethancourt-admissibleevidence

Can’taccesssomedataduetoplatformsecurityenhancements

Lessemphasisonappdataandintegrityofoperatingsystemandapps,keyareasdefendersexamineforcompromise

Page 17: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Examplesofwhataforensicanalystislookingfor

STOREDANDDELETEDDATA

(e.g.,iMessages,SMS,e-mail,etc.)

USERLOCATIONHISTORY

TIMELINEOFEVENTS

(basedontherecoverabledata)

10101010101010101010101010101010

Page 18: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Examplesofwhatadefender/responderislookingfor

DEVICEINTEGRITYINFORMATION

(e.g.,OS,bootloader,howhealthyisthedeviceitself?)

APPDATA

(e.g.,installed/uninstalledapps,securityflaws,datacollected)

TRAFFICDESTINATIONS

(e.g.,wasdataexfiltrated andifso,wheretoandisitpersistent?)

1010101010101010101010101010101010101010101010101

Page 19: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

iCloudversuson-deviceiOSforensics

vs.

DATARECOVEREDFROMICLOUD

DATARECOVEREDVIAON-DEVICEFORENSICS

Moredataisaccessiblewithaccesstothephysicaldevice(providedyouhavethePIN/password)

Ifenabled,devicesbackupmorefrequentlytocloudthaniTunes.

SomecommercialandOSStoolsavailableandaccessdatasuchas:callhistory,messages,attachments,contacts,Safaridata,Googledata,Calendardata,Notesdata,info&settingsdata,CameraRolldata,andsocialcommunications

Page 20: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Introducing:TheMobile-triageTool

Page 21: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

ios-triage

WHATITIS:amobileincidentresponsetool

WHOIT’SFOR:incidentresponders,defenders,hackers

WHATITDOES:extractsmobileartifactsthatmatter,presentsthemforanalysis,combinesandcorrelatesthemwithotherrelevantdata

HOWIT’SDIFFERENT:providesmorevisibilityintodatarelevanttodefendingagainstorrespondingtomobilesecurityincidents

WHERETOGETIT:https://github.com/ahoog42/ios-triage

Page 22: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Toolsetarchitecture/workflow

1 EXTRACT

Unlocked&Trusted

OSX(Linux)

USB

2 PROCESS<dir>/UDID/epoch/artifacts

/processed/report

Multipleepochs(i.e.,timestamps)

ios-triageprocess

3 REPORT

1010101010101010101010101010101010101010101010101

Page 23: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

LiveDemo- Details

Overviewofdeviceandappanalysis

Detailedviewofartifactdataforalldomains

Appspecifictelemetryincludingentitlements,backgroundmodes,privacysensitiverequests,transportsecurityexceptions

Page 24: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

LiveDemo- Issues

Flagissuesinonecentrallocation

Includestheissue,levelofimpact,description,andremediationtips

Flexibleandextensibletransformationofprocessedartifactsintoissues

Page 25: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

LiveDemo- Diffs

Display`diff`intheoutputfromtwoseparatereports

Abilitytotrackchangestoadeviceovertime

Page 26: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

LiveDemo- Community

Contributenon-PIItelemetry

Detectanomalies

Addnewthird-partydatasources

Enablecommunitydrivenresearch(e.g.IOCs,TTP,etc.)

Page 27: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

ExampleofdiffsbetweeniOS8.xand10.x

iOS8showeddeletedapps,usefultodetectifaforensicsappwasInstalledThenremovedafterexfiltration

InabilitytodownloadtheactualappsinstalledonthedeviceAllowingattackerstohideHindertheabilitytodetermineIOCs,TTPs,etc

Page 28: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

FutureWork

Allowsharingofnon-identifyingdatatocreatecrowd-sourceddatabase

Movetoadatabasebackend

DownloadiOSappsviaiTunesandperformstaticanalysis

Integrateseveralthird-partydatasources

Releaseandroid-triage

Page 29: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Howyoucancontribute

Runthetool

Contactmewithfeedback,bugs,suggestionsTwitter:@ahoog42GitHub:https://github.com/ahoog42Email:[email protected]

Participateincrowd-sourcedefforts

Pitchinonfuturedevelopmentwork

Page 30: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

SummaryandNextSteps

Page 31: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Keytakeaways

Theplatformsbuildsecurityoutratherthanin(i.e.,attackerscanpenetratethe“walledgarden,”butdefenders/responderscan’tseewhat’sgoingonbecauseweplaybytherules)

Asaresult,followingthetrajectoryoflaptopsecurityisimpossibleunlesstheindustrychangesorwesummonthepowertomakeitchange

Weneedtodiminishattackers’asymmetricadvantage,butwithoutmoresharingofmoredata,wehaveephemeraldatawecan’tcomparetoanything

1

2

3

Page 32: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

Applywhatyou’velearned

NEXTWEEKYOUSHOULD:Downloadthetoolandrunitagainstyourpersonalphone

WITHIN30DAYSYOUSHOULD:Runthetooloncriticaldeviceswhereyouseethehighestrisk(e.g.,usedbyCEOandCFO)sothatyouhaveabaselineforcomparison/detection

WITHINTHREEMONTHSYOUSHOULD:Educateusersonhowtoreportpotentialincidentstoyou,baselineasmanydevicesasyoucansoyoucanalsoidentifyanomalies

Page 33: How Android and iOS Security Enhancements Complicate Threat Detection

#RSAC

AndrewHoog

ThankYou

CEONowSecure@ahoog42