the cybercriminal approach to mobile fraud: now they’re getting serious

46
© 2015 IBM Corporation The Cyberciminal Approach to Mobile Fraud: Now They’re Getting Serious SSA-1721 Ori Bach Sr. Fraud Prevention Strategist

Upload: ibm-security

Post on 15-Jul-2015

366 views

Category:

Technology


0 download

TRANSCRIPT

© 2015 IBM Corporation

The Cyberciminal Approach to Mobile Fraud: Now They’re Getting SeriousSSA-1721

Ori Bach

Sr. Fraud Prevention Strategist

Today’s Agenda

• Different Perspectives

• Current State of Mobile Based Financial Threats

• Mobile Security Challenge

• Looking at Future Threats

Different Perspectives

The User’s Perspective

3

Are you saying that I can do my banking while on the go?

Sign me up!!!

Mobile Banking Services Are a Competitive Advantage

Mobile banking is the

most important deciding

factor when switching

banks (32%)

More important than fees

(24%) or branch location (21%)

or services (21%)… a survey

of mobile banking customers in

the U.S. 1

Mobile banking channel

development is the #1

technology priority of

N.A. retail banks (2013)

#1 Channel

The mobile payments

market will eventually

eclipse $1 trillion by 2017

$1tn

43%of 18-20 year olds

have used a

mobile banking

app in the past

12 months

29%Cash-based retail

payments in the U.S. have

fallen from 36% in 2002 to

29% in 2012

$

Of customers won't mobile bank because of security fears

19%

90%Of mobile banking app users use the app to check account balances or recent transactions

Security is a Growing Concern

5

Source: Consumers and Mobile Financial Services 2013, Federal Reserve

Board

The Financial Services Industry Perspective

6

My customers can interact with me while on the go?

Sign me up!!!

• mBanking Usage Leads mPaymentsSource: US Federal Reserve March , 2014

Mobile Banking and Payment Growth

• Mobile Payments – Global annual shipments of NFC enabled phones are set to rise from

275million units in 2013 to 1.2billion units in 2018.Source: NFC World, February 2014

– By 2017, the total value of global offline transactions facilitated by mobile

devices will reach about $1.5 trillion, up from $120 billion in 2012Source: Business Insider, June 2013

Source: Monitise, The Mobile Money Landscape, Vol. 1 2014

Security Is Front and Center

The Cybercriminal Perspective

10

Source: Consumers and Mobile Financial Services 2013, Federal Reserve

Board

Are you saying that I can do my banking while on the go?

Sign me up!!!

The Criminal’s Perspective: Game On!

11

The Majority of Financial Apps Have Been Hacked

• Majority of top 100 paid Android

and iOS Apps are available as

hacked versions on third-party

sites

• …as are many financial service,

retail, and healthcare apps

• (State of Mobile App Security,

Arxan, 2015)

• "Chinese App Store Offers

Pirated iOS Apps Without the

Need to Jailbreak” (Extreme Tech,

2013)

http://www-03.ibm.com/software/products/en/arxan-application-protection

Mobile Attacks

Server-side Device ID is not effective for mobile devices

Mobile devices share many identical attributes

Mobile devices have the same attributes: OS, browser, fonts etc..

Cybercriminals can easily trick traditional device ID systems

Cybercriminals Love Mobile Anonymity

14

Account takeover via a criminal mobile device is on the rise

15

Old “Friends” Crash the Party

Mobile Ransomware

Mobile Phishing / SMishing

19

SMS Spamming

20

Other Attack Vectors

21

Fake Apps

23

Over 80,000 users have

granted the apps permission

to run on their browser,

despite the warning the games

will receive full access to a

player’s web activity

The Challenge: Vulnerable Devices

24

The Ease of Getting Infected Malware to the Official Stores

25

Overlay Mobile Attack

Overlay Mobile Attack

A Mobile Malware Underground is Developing

29

Mobile Banking Fraud

31

Underground Discussions

Underground Services

32

User Name + Password

OTP SMS

Credentials

OTP SMS

TOR C&C

App Latching (Bundeling)

Source: Dancho Danchev

The Mobile Security Challenge

Oldschool Mobile Security

36

37

Security Solution Silos

Apple’s Walled Garden

38

Cybercriminals Are Finding Ways Into the Walled Garden

39

The Challenge: Vulnerable Devices

40

Mobile AVs Started Popping Up

41

The Criminal’s Perspective: We Know This Game!

42

Root Detection Evasion

Future Threats

Mobile Threats – New Vectors

We have seen

Classic threats migrate to mobile: Phishing, Ransomware,

Overlay

Mobile specific threats such as fake Apps

We are bound to see

Mobile specific exploit kits

Bundling frameworks and services (perhaps automated)

Device takeover malware for mobile

NFC, ApplePay – new targets

New Tech – New Challenges

• New technology challenges:

• Wearable tech

• IoT (Internet of Things)

• Will ransomware be applied to IoT?

• A car lockdown?

• A house blackout?

• A pacemaker threat?

Users Will Always Make Mistakes

Remember – Security is in YOUR Hands

Notices and Disclaimers

Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or

transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with

IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been

reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM

shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY,

EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF

THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT

OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the

agreements under which they are provided.

Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without

notice.

Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are

presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual

performance, cost, savings or other results in other operating environments may vary.

References in this document to IBM products, programs, or services does not imply that IBM intends to make such products,

programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not

necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither

intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal

counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s

business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or

represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Notices and Disclaimers (con’t)

Information concerning non-IBM products was obtained from the suppliers of those products, their published

announcements or other publicly available sources. IBM has not tested those products in connection with this

publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM

products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to

interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,

INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A

PARTICULAR PURPOSE.

The provision of the information contained herein is not intended to, and does not, grant any right or license under any

IBM patents, copyrights, trademarks or other intellectual property right.

• IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document

Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand,

ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™,

PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®,

pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®,

urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of

International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and

service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on

the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.

Thank YouYour Feedback is

Important!

Access the InterConnect 2015

Conference CONNECT Attendee

Portal to complete your session

surveys from your smartphone,

laptop or conference kiosk.