Title of Presentation DD/MM/YYYY © 2015 Skycure 1 1 1 Why Are Hackers Winning the Mobile Malware Battle.

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson.
IOS & Android Security, Hacking and Tweaking Workshop D.Papamartzivanos University Of the Aegean – Info Sec Lab Android Security – Cydia Substrate Dimitris.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
Presentation By Deepak Katta
Introduction to Mobile Malware
Sophos Mobile Security
DroidKungFu and AnserverBot
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Cyber Crimes.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 Workshop on Mobile Security Technologies (MoST)
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
APT29 HAMMERTOSS Jayakrishnan M.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Is Your Mobile App Secure. DEF CON 23 Wall of Sheep Sat
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
Android Security Auditing Slides and projects at samsclass.info.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Winning with Check point
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Slides and projects at samsclass.info. Adding Trojans to Apps Slides and projects at samsclass.info.
Malicious Software.
Wireless and Mobile Security
Sky Advanced Threat Prevention
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
Computer Security By Duncan Hall.
VMM Based Rootkit Detection on Android
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Android and IOS Permissions Why are they here and what do they want from me?
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
The Ultimate Reason Why Hackers Are Winning The Mobile Malware Battle Yair Amit CTO & Co-Founder Skycure.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
What mobile ads know about mobile users
INTRODUCTION CHARLES MUIRURI
Module 51 (Mobile Device Fundamentals - Android)
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Mobile Hacking - Fundamentals
Application Communities
A Virtual Tour of SophosLabs Building next-generation protection
Ilija Jovičić Sophos Consultant.
A lustrum of malware network communication: Evolution & insights
ADVANCED PERSISTENT THREATS (APTs) - Simulation
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Forensics Week 11.
Myths About Web Application Security That You Need To Ignore.
University of California, Santa Barbara
Home Internet Vulnerabilities
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
Ransomware in Web Apps OWASP Singapore.
Computer Security.
Basic Dynamic Analysis VMs and Sandboxes
Exploring DOM-Based Cross Site Attacks
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Cybersecurity Simplified: Phishing
Presentation transcript:

Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle

Title of Presentation DD/MM/YYYY © 2015 Skycure Introductions Yair Amit CTO, Co-Founder Skycure 15+ Patents IDF 8200

Title of Presentation DD/MM/YYYY © 2015 Skycure Agenda The Mobile Security Landscape Evolution of App Stores & Mobile Malware Popular Mobile Malware Analysis Techniques  Signature-Based, Dynamic & Static Analysis  Why Do They Fail? Demo So What Can Defenders Do?

Title of Presentation DD/MM/YYYY © 2015 Skycure Modern Mobile Attacks

Title of Presentation DD/MM/YYYY © 2015 Skycure Theft Unauthorized Access Loss

Title of Presentation DD/MM/YYYY © 2015 Skycure /7 exposure Off-the-shelf hacking tools WiFi & cellular

Title of Presentation DD/MM/YYYY © 2015 Skycure Based on Skycure Threat Intelligence

Title of Presentation DD/MM/YYYY © 2015 Skycure External Android stores Repackaged apps iOS impact

Title of Presentation DD/MM/YYYY © 2015 Skycure OS & app-level Patching challenges Never-ending story

Title of Presentation DD/MM/YYYY © 2015 Skycure 10 Mobile Malware

Title of Presentation DD/MM/YYYY © 2015 Skycure 11 Evolution of Android Malware Google introduces technologies such as “Bouncer” and “Verify Apps” Google Play is riddled with malware rd party stores are riddled with malware 2015

Title of Presentation DD/MM/YYYY © 2015 Skycure 12 Malware Analysis Techniques

Title of Presentation DD/MM/YYYY © 2015 Skycure 13 Signature-Based Analysis

Title of Presentation DD/MM/YYYY © 2015 Skycure Dynamic Analysis Identification techniques: Network activity Debugging Instrumentation Etc. Identification techniques: Network activity Debugging Instrumentation Etc.

Title of Presentation DD/MM/YYYY © 2015 Skycure 15 Bypassing Dynamic Analysis Make sure the malicious code is not executed during the analysis Examples:  Time bombs Location bombs, IP bombs, etc.  Sandbox detection Is the contact list full and “real”? Same for meetings, s, accounts, etc. Am I running in a debugger? [Anti debugging]  Victim detection Targeted attacks Trick the detection module

Title of Presentation DD/MM/YYYY © 2015 Skycure Static Analysis Static analysis unpacks the app and analyses its code & resources

Title of Presentation DD/MM/YYYY © 2015 Skycure //... String deviceName = getDeviceName(); //... "&senesitiveData=" + data //... String data = getSensitiveData (); String data2 = ……………………………………………………… + data PostRequest(" data2); String data = getSensitiveData (); String data2 = "DeviceName=" + deviceName + PostRequest(" data2); Static Analysis (in detail) Source – a method returning sensitive data Sink - a method leaking out data

Title of Presentation DD/MM/YYYY © 2015 Skycure Static Analysis (taint analysis example) Sources: Sinks :

Title of Presentation DD/MM/YYYY © 2015 Skycure 19 Bypassing Static Analysis Exploiting the Static Analysis FP/FN tradeoff  Arrays, files, etc. String data = getSensitiveData(); String data2 = ""; for (int i=0; i<data.length(); i++) { if (data.charAt(i) == 'a') data2 += 'a'; if (data.charAt(i) == 'b') data2 += 'b';... } PostRequest(" data2); data2); String data = getSensitiveData(); String data2 = ""; for (int i=0; i<data.length(); i++) { if (data.charAt(i) == 'a') data2 += 'a'; if (data.charAt(i) == 'b') data2 += 'b';... } PostRequest(" data2); data2);

Title of Presentation DD/MM/YYYY © 2015 Skycure 20 Bypassing Static Analysis Exploiting the Static Analysis FP/FN tradeoff  Arrays, files, etc. Dynamic flows Dynamic code  Reflection  Remote server DEX/apk HTML & JavaScript (also applicable for iOS)

Title of Presentation DD/MM/YYYY © 2015 Skycure 21 Bypassing Advanced Techniques Analyzer How can you detect malware code if you don’t see it? Naive code returned Naive code returned Get code to execute Malicious code

Title of Presentation DD/MM/YYYY © 2015 Skycure 22 Let’s Make It Concrete

Title of Presentation DD/MM/YYYY © 2015 Skycure 23 App Repackaging - The Steps Choose and download a popular app Decode the app Patch the decoded app  to load remote code from server Rebuild the patched app Sign the app with newly generated keys Send to victim(s) At attacker’s will, change remote code to be malicious

Title of Presentation DD/MM/YYYY © 2015 Skycure 24 Live Demo

Title of Presentation DD/MM/YYYY © 2015 Skycure 25 Stealthy Malware – Next Steps What about the CNC Server? Can it be blacklisted? Analyzer Naive code returned Naive code returned Get code to execute Malicious code

Title of Presentation DD/MM/YYYY © 2015 Skycure 26 So What Can Defenders Do? Change the paradigm:  Analyzing an app by itself is not enough  Utilize analysis of similar apps on other devices Crowd-wisdom intelligence:  Compare app traits to all millions of apps that have been seen before  Ability to track legitimate app behaviors  Ability to track malicious app behaviors

Title of Presentation DD/MM/YYYY © 2015 Skycure 27 Apply What You Have Learned Utilize a combined approach to fight mobile malware  Signature-based analysis  Static analysis  Dynamic analysis  Crowd intelligence Remember  Malware is only one element of mobile threat landscape  Mobile Threat Defense solution should address all threats

Title of Presentation DD/MM/YYYY © 2015 Skycure 28 Q&A And Next Steps /Skycure