how mobile malware bypasses secure containers

34
How Mobile Malware Bypasses Secure Containers

Upload: lacoon-mobile-security

Post on 18-Nov-2014

1.436 views

Category:

Technology


1 download

DESCRIPTION

How does mobile malware bypass secure containers, wrappers and MDM?

TRANSCRIPT

Page 1: How Mobile Malware Bypasses Secure Containers

How Mobile Malware Bypasses Secure Containers

Page 2: How Mobile Malware Bypasses Secure Containers

The Mobile Application Sandbox Security Model

Page 3: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Page 4: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Page 5: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Memory

Page 6: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Device Functionalities (GPS,Network, SMS)

Page 7: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Memory

Device Functionalities (GPS,Network, SMS)

Page 8: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Memory

Device Functionalities (GPS,Network, SMS)

Page 9: How Mobile Malware Bypasses Secure Containers

Secure Containers and Wrappers

Page 10: How Mobile Malware Bypasses Secure Containers

Secure Containers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 11: How Mobile Malware Bypasses Secure Containers

Secure Containers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 12: How Mobile Malware Bypasses Secure Containers

Wrappers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 13: How Mobile Malware Bypasses Secure Containers

How Mobile Malware Breaks Secure Containers

Page 14: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 15: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 16: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 17: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 18: How Mobile Malware Bypasses Secure Containers

Step-by-Step

Page 19: How Mobile Malware Bypasses Secure Containers

Step 1: Infection of the Device/ Android

Page 20: How Mobile Malware Bypasses Secure Containers

Step 1: Infecting the Device with Malware/ iOS

Page 21: How Mobile Malware Bypasses Secure Containers

Step 2: Installing a Backdoor Android/“Rooting”

Administrative Every process can run as an administrative (root)

user if it is able to trigger a vulnerability in the OS

Vulnerability Each Android device had/ has a vulnerability Exploit Detection mechanisms don’t look at apps that

exploit the vulnerability

] [ ] [

Page 22: How Mobile Malware Bypasses Secure Containers

Step 2: Installing a Backdoor Android/iOS/ “Jailbreaking”

Community

Jailbroken

xCon

] [ ] [

Page 23: How Mobile Malware Bypasses Secure Containers

Step 3: Bypassing Containerization

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 24: How Mobile Malware Bypasses Secure Containers

Step 3: Bypassing Containerization

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 25: How Mobile Malware Bypasses Secure Containers

There’s More... Android

Page 26: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

Page 27: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

HELLO WORLD

Page 28: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

HELLO WORLD

Page 29: How Mobile Malware Bypasses Secure Containers

Mitigating the Threat with Lacoon

Mobile Security

Page 30: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Cloud-based virtual execution of applications and payloads to detect exploits

Page 31: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Page 32: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Detection

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device

Page 33: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Detection

Blocking of drive-by attacks

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device

Blocking of drive-by attacks, including exploits of unpatched Web browser vulnerabilities and Jailbreaking attempts

Page 34: How Mobile Malware Bypasses Secure Containers

Thank You.

Contact us:

[email protected]