Download presentation
Presentation is loading. Please wait.
Published byRodney Armstrong Modified over 8 years ago
1
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER
2
©2015 Check Point Software Technologies Ltd. 2 Over arching themes of the moment: IBM estimate that in 2016 there will be more mobile devices on the planet than human beings State of the nation The macro back drop of everything we are talking about today is an explosion of technology adoption and consumerisation of IT
3
3 VECTORS OF Network AttacksOS ExploitsInfected Apps
4
TURN ON THE MICROPHONE TURN ON THE CAMERA TRACK DEVICE LOCATION CAPTURE EMAILS EXTRACT DATA STEAL USERNAME & PASSWORD
5
©2015 Check Point Software Technologies Ltd. 5 Ideal victim unprotected always connected accesses valuable personal and business data using credentials for company resources
6
MAJOR ATTACKS
7
Legit app developers Infected XCode compiler Injection during compilation Apple failed to block infected apps 4,000+ apps infected
9
Uses multiple, advanced techniques to avoid Google Play malware detection and to maintain persistency on target devices. Establishes a rootkit on the device, allowing it to download and execute any code a cybercriminal would want to run at will. Leverages an anti-uninstall watchdog that uses two system applications to monitor the removal of one of the components and reinstall the component.
10
Infects via SMS phishing, interesting due to advanced obfuscation seen on mobiles for the first time.e.g. Tor based C&C server comms Roots device, send SMS messages to premium-rate numbers. Read SMS messages, defeating authentication codes sent as part of two-factor authentication mechanisms (frequently used by online banking apps and e- commerce websites).
11
©2015 Check Point Software Technologies Ltd. 11 Malware Industry
12
©2015 Check Point Software Technologies Ltd. 12 HAVE OUR PERSONAL & BUSINESS DATA BROADLY UNDEFENDED BECOME THE BACKDOOR TO YOUR NETWORK Mobile Devices Are Becoming Key In Cyber Attacks
13
MOBILE SECURITY BUILDING BLOCKS Mobile Device Management Policy Enforcement Secure Containers Data Leakage Prevention Anti-Virus, App Reputation Known Threats Mobile Threat Prevention Unknown Threats and Zero Day
14
MOBILE THREAT PREVENTION Advanced Threat Detection and Mitigation Full Visibility Simple Deployment
15
FULL VISIBILITY
16
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.