Sample attack scenario (cont.)
Transkrypt
Sample attack scenario (cont.)
Mobile threats Artur Maj, Prevenity Agenda • Cellular phones – Historic overview – Mobile operating systems • • • • • Security of smartphones Smartphones in banking Threats to banking Demonstration of bank account intercepting Our recommendations © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 1 Historic overview 1980 1982 2000 1990 2005 2007 © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Mobile operating systems Linux 3,70% Other 0,70% Windows Mobile 6,80% Android 9,60% Apple iOS 15,40% Symbian 44,30% BlackBerry 19,40% Source: Gartner, Worldwide Smartphone Sales 1Q 2010 © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 2 Security of smartphones • Privilleges levels • Access control lists (ACLs) • Antivirus and antispam software, personal firewalls – de facto standard • Simplified privilleges levels* • Limited possibilities of access control* • Security software rarely used © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Security weaknesses of smartphones • Technology weaknesses (GSM, Bluetooth itp.) • Security vulnerabilities in operating system • Security vulnerabilities in mobile applications Known security vulnerabilities in mobile operating systems, source: OSVDB © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 3 Smartphones’ infection methods • Synchronization with PC – Active Sync, Nokia PC Suite etc. • • • • • • Web browser E-mail messages SMS, MMS, WAP Push 3rd parties’ applications Memory cards Wireless network – 3G, EDGE/GPRS, UMTS, Wi-Fi, Bluetooth etc. © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Mobile malware • Future or reality? © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 4 Mobile malware (cont.) © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Mobile malware (cont.) • Development of mobile malware © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 5 Mobile malware (cont.) • Examples – Trojan horses • SymbOS/AppDisabler • SymbOS/Cabir • SymbOS/Skulls – Viruses and worms • • • • • SymbOS/Beselo SymbOS/Commwarrior SymbOS/Mabir iPhoneOS/Ikee WinCE.InfoJack – Spyware • SymbOS/Flexispy • SymbOS/Mopofeli © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Smartphones in banking 6 Smartphones in banking • Popular appliances of mobile phones in electronic banking: – Possibility of making money transfers – User authentication – Banking transaction authentication – Alarms and notifications (SMS) – Micropayments (SMS, USSD) • The above appliances seem to be secure… © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Smartphones in banking (cont.) … but they only seem as such © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 7 Smartphones in banking (cont.) • Mobile phone’s infection very serious threat to internet banking • In conjuction with PC infection – the real risk of loosing even all the money from victim’s bank account • Examples of attacks: – Redirection of short text messages (SMS) – Remote access to phone’s graphics interface © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Smartphone in banking (cont.) • Redirection of text messages Telecommunication operator Unaware victim Intruder © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 8 Smartphone in banking (cont.) • Remote access to phone’s graphics interface © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Sample attack scenario • Infection of PC and smartphone Step 1 • • • • • Infection of PC by malware Zero-day exploit Infected PDF document Vulnerable web browser Vulnerability in Adobe Flash Trojan horse in downloaded software © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 9 Sample attack scenario (cont.) • Infection of PC and smartphone (cont.) Step 2 Infection of smartphone while copying pictures to PC • Automatic • Several versions of mobile malware for different mobile operating systems • Manual • Intruder creates and remotely install software for specific mobile device © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Sample attack scenario (cont.) • Infection of PC and smartphone (cont.) Step 3 Malware sends to the intruder victim’s credentials • URL to Internet banking application • Data intercepted by keylogger: • User’s login • User’s password • Data regarding mobile phone: • Number and type of mobile phone © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 10 Sample attack scenario (cont.) • Infection of PC and smartphone (cont.) Step 4 Attacker remotely enables SMS redirection „feature” on victim’s phone • Since this moment all SMSes are redirected to intruder’s phone without victim’s awareness • One time passwords • Alarms and notifications © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Sample attack scenario (cont.) • Infection of PC and smartphone (cont.) Step 5 Intruder performs unauthorized banking transaction • What the intruder possesses? • URL to internet banking application • Login to victim’s account • Password to victim’s account • One time passwords send via SMSes © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 11 Sample attack scenario (cont.) Will transaction be carried out? Will anti-fraud systems detect fraud? Can bank avoid fraud? © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Sample attack scenario (cont.) • Multiple variants of attack exists: – Using phone’s API directly from PC – Remote GUI access via wireless network (a’la Remote Desktop) – Infection of smartphone only © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 12 Sample attack scenario (cont.) • Multiple targets of the attack: – – – – – – – Transaction confirmations Applications downloaded and installed in phone’s memory Applications on SIM card Software authentication tokens USSD micropayments SMS micropayments Alarms and notifications © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Sample attack scenario (cont.) • Security mechanisms can be circumvented: – One-time passwords „scratched” – Hardware authentication tokens – Software authenitcation tokens – Virtual keyboards – „captcha” mechanisms – PKI tokens © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 13 Demonstration Interception of bank account based on the example of MS Windows Mobile infection © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Attack – easy or complicated? © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 14 Summary • Smartphone = computer • The impact of successfull attack on smartphone can be more dangerous than in case of PC • Good and bad news (from security point of view) © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Summary (cont.) • Good news: – Older phones not vulnerable for these kind of attacks – Majority of users uses smartphones only for voice and text messaging purporses – Only some users synchronize phones with PC – Diversity of mobile operating systems and versions complicated performing successful attacks – Operating systems possess different capabilities that can be leveraged by malware © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 15 Summary (cont.) • Bad news: – Smartphones’ market share grows every quarter – Growing popularity may lead to increase number of vulnerabilities and infection methods found – Whether or not the user utilized advanced features of smartphones may not matter (e.g. intruder can leverage vulnerabilities in handling MMSes) – Using security software on mobile phones still not popular © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone Our recommendations • Considering to leverage alternative methods of electronic transaction authentication • Treating smartphones as untrusted devices (as in case of PCs) • Including threats related to mobile devices in the process of risk assessment • Build users’ awareness to apply best security practices also in case of cellular phones © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 16 Contact [email protected] © 2010 Prevenity Sp.Sp. z o.o. Wszelkie prawa zastrzeżone. © 2010 Prevenity z o.o. Wszelkie prawa zastrzeżone 17