d2: mobile phone security risk: the monkey steals the berries - mobile phone s… · mobile spy web...

23
D2: Mobile Phone Security Risk: The Monkey Steals the Berries Tyler Shields, Veracode

Upload: others

Post on 04-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

D2: Mobile Phone Security Risk: The Monkey Steals the Berries

Tyler Shields, Veracode

Page 2: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

1

The Monkey Steals the Berries The App Does THAT?!The App Does THAT?!

Mobile Backdoors - Security Risks & Mitigation

© 2010 Veracode, Inc. 1

Agenda

o Background

o Attacker Motivationo Attacker Motivation

o Malicious Mobile Applications In The Wild

o Mobile Security Mechanisms

o Potential Effects and Behaviors

o Detecting Malicious Mobile Applications

© 2010 Veracode, Inc. 2

o Demonstration

•2

Page 3: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

2

© 2010 Veracode, Inc. 3

Background

•3

Presenter Backgroundo Currently

– Sr. Security Researcher, Veracode, Inc.

o Previously– Security Consultant - Symantec– Security Consultant - @Stake– Incident Response and Forensics

Handler US Governmento Wishes He Was

– Infinitely rich

© 2010 Veracode, Inc. 4

y– Able to leap tall buildings in a

single bound– Smarter than the average bear

•4

Page 4: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

3

Malicious Mobile Applicationso Often includes modifications to

legitimate programs designed to compromise the device or datacompromise the device or data

o Often inserted by those who have legitimate access to source code or distribution binaries

o May be intentional or inadvertent

o Not specific to any particular i l

© 2010 Veracode, Inc. 5

programming language

o Not specific to any particular mobile Operating System

•5

© 2010 Veracode, Inc. 6

Attacker Motivation

•6

Page 5: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

4

Attacker Motivationo Practical method of compromise for many systems

– Let users install your backdoor on systems you have no access to

– Looks like legitimate software so may bypass mobile AVLooks like legitimate software so may bypass mobile AV

o Retrieve and manipulate valuable private data

– Looks like legitimate application traffic so little risk of detection

o For high value targets such as financial services and government it becomes cost effective and more reliable

– High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture They may seek to implant vulnerability for later

© 2010 Veracode, Inc. 7

critical juncture. They may seek to implant vulnerability for later exploitation

– Think “Aurora” for Mobile Devices

•7

80,000.00

90,000.00

72,934

80,879

Units Sold By Operating System

10,000.00

20,000.00

30,000.00

40,000.00

50,000.00

60,000.00

70,000.00

23,149

11,418

16,498

10,622

4 027

34,347

24,890

15,028 6,7981 193

Units Sold

2008 Units

2009 Units

© 2010 Veracode, Inc. 8

0.00

,

Symbian Research In Motion

iPhone OS Microsoft Windows Mobile

Linux Android WebOS Other OSs

641 04,02715,028

8,1271,193

1,112

Operating SystemData Source: DISTMO Appstore Analytics

www.appstore.info

•8

Page 6: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

5

6%

8%

6%

Units Sold Market Growth

‐2%

0%

2%

4%

Symbian Research In Motion

iPhone OS Microsoft Windows Mobile

Linux Android WebOS Other OSs

3%

3%

3%

0%

‐2%

0%

Percentage

 Growth in

 Market Sh

are

© 2010 Veracode, Inc. 9

‐6%

‐4%

‐6%

‐3% ‐3%

Operating System

Data Source: DISTMO Appstore Analyticswww.appstore.info

•9

140,000

160,000 150,998

Application Counts

40,000

60,000

80,000

100,000

120,000

19 897

Number Of Applications In Store

Last Counted Jan

/Feb 2010

© 2010 Veracode, Inc. 10

0

20,000

iPhone App Store Android Marketplace

Nokia Ovi Store (Maemo)

Blackberry App World

Palm App Catalog Windows Marketplace

19,897

6118 52911452 944

Marketplace NameData Source: DISTMO Appstore Analytics

www.appstore.info

•10

Page 7: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

6

3.00

s)

iPhone Applications Sold

0.00

0.50

1.00

1.50

2.00

2.50

Applications Sold (In Billions

© 2010 Veracode, Inc. 11

Data Source: Gartner, Inc., a research and advisory firm 

•11

Back To The Future

© 2010 Veracode, Inc. 12•12

Page 8: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

7

Back To The Future

© 2010 Veracode, Inc. 13•13

© 2010 Veracode, Inc. 14

Malicious Mobile Applications In The Wild

•14

Page 9: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

8

FlexiSpy

o http://www.flexispy.como $149 - $350 PER YEAR depending on featureso $149 $350 PER YEAR depending on featureso Features

– Remote Listening– C&C Over SMS– SMS and Email Logging– Call History Logging– Location Tracking

© 2010 Veracode, Inc. 15

g– Call Interception– GPS Tracking– Symbian, Blackberry, Windows Mobile Supported

•15

FlexiSpy Web Site Quotes

o “Download FlexiSPY spyphone software directly onto a mobile phone and receive copies of SMS, Call Logs, Emails, Locations and listen to conversations within minutes of purchase “and listen to conversations within minutes of purchase.

o “Catch cheating wives or cheating husbands, stop employee espionage, protect children, make automatic backups, bug meetings rooms etc.”

o “F Secure seem to think that its ok for them to interfere with legitimate, legal and accountable software. Who appointed them judge, jury and executioner anyway, and why wont they answer our emails, so we have to ask who is the real malware? Here is how to remove FSecure malware from your device

© 2010 Veracode, Inc. 16

Here is how to remove FSecure malware from your device. Please don't believe the fsecure fear mongers who simply wish you to buy their products.”

•16

Page 10: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

9

Mobile Spy

o http://www.mobile-spy.como $49 97 PER QUARTER or $99 97 PER YEARo $49.97 PER QUARTER or $99.97 PER YEARo Features

– SMS Logging– Call Logging– GPS Logging

W b URL L i

© 2010 Veracode, Inc. 17

– Web URL Logging– BlackBerry, iPhone (Jailbroken Only), Android,

Windows Mobile or Symbian

•17

Mobile Spy Web Site Quotes

o “This high-tech spy software will allow you to see exactly what they do while you are away. Are your exactly what they do while you are away. Are your kids texting while driving or using the phone in all hours of the night? Are your employees sending company secrets? Do they erase their phone logs?”

o “Our software is not for use on a phone you do not own or have proper permission to monitor from the user or owner. You must always follow all applicable

© 2010 Veracode, Inc. 18

user or owner. You must always follow all applicable laws and regulations in your region.”

o “Purchased by more than 30,000 customers in over 150 countries”

•18

Page 11: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

10

Etisalat (SS8)

o Cell carrier in United Arab Emirates (UAE)o Pushed via SMS as “software patch” for Blackberry p y

smartphoneso Upgrade urged to “enhance performance” of Blackberry

serviceo Blackberry PIN messaging as C&Co Sets FLAG_HIDDEN bit to trueo Interception of outbound email / SMS only

Di d d fl d d li i

© 2010 Veracode, Inc. 19

o Discovered due to flooded listener server cause retries that drained batteries of affected devices

o Accidentally released the .jar as well as the .cod (ooopsie?!)

•19

Storm8 Phone Number Farming

o iMobsters and Vampires Live (and others)o “Storm8 has written the software for all its games in such a way

th t it t ti ll ll t d t it th that it automatically accesses, collects, and transmits the wireless telephone number of each iPhone user who downloads any Storm8 game," the suit alleges. " ... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed."

o “Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.”Th il bl i th iT A St !

© 2010 Veracode, Inc. 20

o These were available via the iTunes App Store!o http://www.boingboing.net/2009/11/05/iphone-game-dev-

accu.html

•20

Page 12: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

11

Symbian Sexy Space

o Poses as legitimate server ACSServer.exe

o Calls itself 'Sexy Space‘y p

o Steals phone and network information

o Exfiltrates data via hacker owned web site connection

o Can SPAM contact list members

o Basically a “botnet” for mobile phones

o Signing process– Anti-virus scan using F-Secure

Approx 43% proactive detection rate (PCWorld)

© 2010 Veracode, Inc. 21

o Approx 43% proactive detection rate (PCWorld)

– Random selection of inbound manually assessed

o Symbian signed this binary as safe!

o http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm

•21

Symbian MergoSMS

o The worm spreads as self-signed (untrusted) SIS installers o Installer contains sub-SIS installers some of them signed by

S biSymbian.o Spreads by sending text messages

– Contain variable messages in Chinese and a link to a website– Going to link results in worm download

o On phone reboot malware runs, downloads worm payload, completing infection

o The worm was spread on Chinese file sharing web siteso Originally spread as games themes etc for Symbian Series60

© 2010 Veracode, Inc. 22

o Originally spread as games, themes, etc. for Symbian Series60 3rd & 5th edition phones.

o http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml

•22

Page 13: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

12

09Droid – Banking Applications Attack

o Droid app that masquerades as any number of different target banking applications

o Target banks included– Royal Bank of Canada

– Chase

– BB&T

– SunTrust

– Over 50 total financial institutions were affected

o May steal and exfiltrate banking credentials

o Approved and downloaded from Google’s Android Marketplace!

© 2010 Veracode, Inc. 23

o http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps-market

o http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953

o http://www.f-secure.com/weblog/archives/00001852.html

•23

3D Anti-Terrorist / PDA Poker Art / Codec Pack WM1.0

o Games available on legitimate application download siteso Originally written by Chinese company Huikeo Repackaged in Russia by unknown authors to include malwareo Calls premium rate 800 numberso Three days idle before first dialo Idles one month between subsequent outbound dialingo Distributed via common Windows Mobile shareware sites

o http://www.eweek.com/c/a/Security/Malware-Hidden-in-

© 2010 Veracode, Inc. 24

p // / / / y/Windows-Mobile-Applications-424076/

•24

Page 14: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

13

© 2010 Veracode, Inc. 25

Mobile Security Mechanisms

•25

Common Mobile Security Mechanisms

Corporate level security policies

Applied at the corporate IT level

Can’t be modified by a lower level security mechanism

Application level security policies

May be pushed down from corporate policy

Otherwise applied at handset itself

© 2010 Veracode, Inc. 26

Restricts access to specific resources

•26

Page 15: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

14

Common Mobile Security Mechanisms

Mobile Anti-Virus

Implemented at the handset itself

Fails due to the same reasons PC antivirus is failing today

Application market place security screening

Applied by the marketplace owner

Currently opaque and ill defined

© 2010 Veracode, Inc. 27

Misplaced trust already acquired

•27

Does It Really Matter?!

Only 23% of smartphone owners use the security softwareOnly 23% of smartphone owners use the security software installed on the devices.

(Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009)

13% of organizations currently protect from mobile viruses(Mobile Security 2009 Survey by Goode Intelligence)

© 2010 Veracode, Inc. 28•28

Page 16: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

15

Blackberry IT Policies

o Requires connection to Blackberry Enterprise Server (BES)

o Supersedes lower levels of security restrictionso Can prevent devices from downloading third-party

applications over wirelesso Prevent installation of specific third-party applicationso Control permissions of third party applications

– Allow Internal ConnectionsAllow Third Party Apps to Use Serial Port

© 2010 Veracode, Inc. 29

– Allow Third-Party Apps to Use Serial Port– Allow External Connections

o MOSTLY “Default Allow All” policy for BES and non-BES devices

•29

Blackberry Application Policies

o Can be controlled at the BESo If no BES present controls are set on the handheld o If no BES present, controls are set on the handheld

itselfo Can only be MORE restrictive than the IT policy,

never lesso Control individual resource access per applicationo Control individual connection access per application

© 2010 Veracode, Inc. 30

o MOSTLY “Default Allow All” policy for BES and non-BES devices

•30

Page 17: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

16

V4.7.0.148  Default 3rd Party Application Permissions

USB ConnectionsBluetooth Connections

Phone Connections Location Data

Internet IPC Device Settings

MediaApplication Management

Themes Input Simulation

© 2010 Veracode, Inc. 31

Browser Filtering Recording Security Timer Reset

Email Data Organizer Data Files Security Data

•31

V5.0.0.328 Default 3rd Party Application Permissions

USB ConnectionsBluetooth Connections

Phone Connections Location Data

Server Network Internet IPC Device Settings

MediaApplication Management

Themes Input Simulation

© 2010 Veracode, Inc. 32

Browser Filtering Recording Security Timer ResetDisplay Information 

While Locked

Email Data Organizer Data Files Security Data

•32

Page 18: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

17

V5.0.0.328 Trusted 3rd Party Application Permissions

USB ConnectionsBluetooth Connections

Phone Connections Location Data

Server Network Internet IPC Device Settings

MediaApplication Management

Themes Input Simulation

© 2010 Veracode, Inc. 33

Browser Filtering Recording Security Timer ResetDisplay Information 

While Locked

Email Data Organizer Data Files Security Data

•33

© 2010 Veracode, Inc. 34

Potential Effects and Behaviors

•34

Page 19: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

18

Installation Methods

o Accessing a web site using the mobile browser and choosing to download the application over the choosing to download the application over the network (OTA Installation)

o Running the application loader tool on the desktop system and choosing to download the application onto the device using a physical connection to the computer

o Using enterprise management solutions to push the

© 2010 Veracode, Inc. 35

o Using enterprise management solutions to push the application to the entire user community

o Get it into the global application marketplace and let the user choose to install it for you!

•35

Logging and DumpingMonitor connected / disconnected calls

Monitor PIM added / removed / updated

M it i b d SMSMonitor inbound SMS

Monitor outbound SMS

Real Time track GPS coordinates

Dump all contacts

Dump current location

© 2010 Veracode, Inc. 36

Dump current location

Dump phone logs

Dump email

Dump microphone capture (security prompted)

•36

Page 20: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

19

Exfiltration and C&C MethodsSMS (No CDMA)

SMS Datagrams (Supports CDMA)

E ilEmail

HTTP GET

HTTP POST

TCP Socket

UDP Socket

DNS Exfiltration

© 2010 Veracode, Inc. 37

Default command and control to inbound SMS

TXSPROTO Bidirectional TCP based  command and control

•37

© 2010 Veracode, Inc. 38

Detecting Malicious Mobile Code

•38

Page 21: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

20

Detecting Malicious Mobile Code

o Signature Based Detection– This is how the current anti-virus world is failing– Requires “known” signatures for detection– Too reactive

o Resource Usage White Listing– Require individual configuration and white listing of

resources

© 2010 Veracode, Inc. 39

– Make it fine grained enough to be effective– Balancing act resulting in user complaints about

ease of use

•39

Detecting Malicious Mobile Code

o Sandbox Based Execution Heuristics– Run the application and detect malicious activity– Requires execution in a sandbox and is reactive– Can’t ensure complete execution

o Static Decompilation and Analysis– Enumeration of sources of sensitive taint and

exfiltration sinks

© 2010 Veracode, Inc. 40

– Control/Data flow mapping for tracing sensitive taint from source to sink

– Compare findings against expected values

•40

Page 22: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

21

Defense in Depth

Do all of the above!

o Implement and enforce strong IT policieso Implement and enforce strong IT policies

o Implement and enforce additional application policies as required

o Implement a best of breed anti-virus solution– If only for thoroughness of deployed options

Utili t ti d il ti d l i f

© 2010 Veracode, Inc. 41

o Utilize static decompilation and analysis of applications considered for deployment

•41

© 2010 Veracode, Inc. 42

Demonstration

•42

Page 23: D2: Mobile Phone Security Risk: The Monkey Steals the Berries - Mobile Phone S… · Mobile Spy Web Site Quotes o “This high-tech spy software will allow you to see exactly what

22

Conclusion

o We are currently trusting the vendor application store provider for the majority of our mobile device security

o Minimal methods of real time eradication or detection of spyware type activities exists

o When the do exist they are not configured correctly (or at all)

o No easy/automated way to confirm for ourselves what the applications are actually doing

© 2010 Veracode, Inc. 43

o Automate the decompilation and static analysis of applications that are required for the ongoing functioning of your business

•43

Questions?

[email protected]: txs

© 2010 Veracode, Inc. 44

Twitter: txs