33
Session ID: Session Classification: Grayson Milbourne (@gmilbourne) Webroot, Inc. MBS-R02 Intermediate ANDROID MALWARE EXPOSED – AN IN-DEPTH LOOK AT ITS EVOLUTION

Android Malware Exposed - An In-depth Look at its Evolution

Embed Size (px)

Citation preview

Page 1: Android Malware Exposed - An In-depth Look at its Evolution

Session ID: Session Classification:

Grayson  Milbourne  (@gmilbourne)  Webroot, Inc.

MBS-R02 Intermediate

ANDROID MALWARE EXPOSED – AN IN-DEPTH LOOK AT ITS EVOLUTION

Page 2: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Agenda

▶ Trends of 2013 ▶  OS releases ▶  OS diversity and adoption ▶  Industry awareness ▶  Breaking news

▶ Evolutions in Android malware ▶  Threat vectors ▶  Popular malware permissions ▶  Source code behaviors ▶  SMS Trojans, botnets, spyware & adware

▶ Predictions for 2013/2014 ▶ Q&A

Page 3: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Trends of 2013

Page 4: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Trends of 2013 – OS Releases

▶ Google’s last two major OS releases added a number of security focused improvements ▶  Ice Cream Sandwich – December, 2011

▶ Full device encryption ▶ Introduced ASLR ▶ Data transfer controls

▶  Jelly Bean – July, 2012 – July, 2013 ▶ Built in bouncer / VirustTotal acquistion ▶ Premium SMS send alerts ▶ External storage permissions ▶ SELinux ▶ Always on VPN ▶ Master key exploit !x

Page 5: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Trends of 2013 – OS Diversity/Adoption

Jellybean

Ice Cream Sandwich

Gingerbread

Froyo

v4.0

v4.1 – 4.3

v2.3 v2.2

v2.1

v1.6

v1.5

Page 6: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Trends of 2013 – Industry Awareness

▶ Do Companies realize the risk? ▶  59% agree mobile devices create a high security risk ▶  49% think mobile device security is a high priority

▶ What are companies concerned with? ▶  74% are very concerned with data loss/protection ▶  70% are very concerned with mobile malware

▶ How are companies impacted? ▶  43% reported lost or stolen devices ▶  23% reported malware infected devices

▶ How fast has Android malware grown? ▶  January 2012 – 13k samples, January 2013 – 180k samples ▶  September 2013 – 650k samples + 615k PUA

Page 7: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Trends of 2013 – Breaking News

Q3-12 •  Do-it-yourself Android malware tools •  Rogue AV’s now on Android

Q4-12 •  Drive-by-downloads target Android devices •  FBI warning to mobile device users

Q1-13 •  Red-October mobile module - iOS, Win Mobile, Nokia •  Google Play app downloads Windows malware

Q2-13 •  DIY tools for infecting legit Android apps with botnet code •  Increase in malicious Android banking app discoveries

Q3-13 •  ‘Master key’ exploit discovered impacting 99% of devices •  Affiliate networks impersonate Google Play -> SMS Trojans

Page 8: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Evolutions in Android Malware

Page 9: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Threat Vectors

▶ Rogue applications ▶ System folder install ▶ Polymorphic distribution ▶ Payload encryption ▶ Security app removal ▶ Embedded payloads

▶ Rogue applications ▶  Infected applications ▶ SMS phishing ▶ Man-in-the-mobile ▶ Website drive-by ▶ QR code ▶ Rogue Android markets

Social-Engineering Evasion Tactics

Page 10: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Popular Malware Permissions

22.08%  22.40%  26.80%  

51.41%  56.12%  58.62%  59.81%  62.51%  62.81%  63.45%  67.34%  70.32%  73.37%  76.73%  

95.25%  96.97%  99.52%  

CHANGE_WIFI_STATE  

WRITE_APN_SETTINGS  

GET_TASKS  

WAKE_LOCK  

READ_SMS  

RECEIVE_SMS  

ACCESS_FINE_LOCATION  

SEND_SMS  

ACCESS_COARSE_LOCATION  

VIBRATE  

WRITE_EXTERNAL_STORAGE  

ACCESS_WIFI_STATE  

INSTALL_SHORTCUT  

RECEIVE_BOOT_COMPLETED  

READ_PHONE_STATE  

ACCESS_NETWORK_STATE  

INTERNET  

Page 11: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Targeted Source Code Behaviors

Exynos Exploit, 1.00%

AirPush, 38.77%

GoldDream, 1.00%

Yzhcsms, 1.00%

Reads IMEI, 63.74%

FakeInst 1161#, 1.00%

Gets IMSI Number, 22.53%

Gappusin, 1.00%

Mania, 1.00%

Leadbolt, 19.21%

Iconosys, 2.00%

Contacts Email Address Info, 1.60%

Get IP Address, 16.47%

SMS.Agent, 2.00% Contacts Data Table, 3.70%

Sends SMS, 9.04%

Rage Against the Cage, 5.70%

Accesses Contacts, 7.20%

GingerMaster.b, 2.15%

Contacts Phone Numbers, 2.52%

Page 12: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans

▶ First detected in the summer of 2010 ▶ Alias: FAkeInst, SMSSend, Boxer, OpFake ▶ Variants: FakePlayer, RuFraud, Foncy ▶ Accounts for more than half of android malware ▶ Sends premium rate SMS ▶ Google Play – 3rd party markets – rogue markets ▶ Fake apps – fake markets

Page 13: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans - Then

Page 14: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans - Then

Page 15: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans Now – Pay for Play

▶ Sending up to 2 SMS messages to a short number: ▶  In France:

▶  81015 (€3.00) ▶  81085 (€4.50)

▶  In the UK: ▶  69067 (£2.00) ▶  79067 (£5.01)

Page 16: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans – Hiding Their Tracks

▶ Package names ▶  com.software.update ▶  opera.updater ▶  lbjwhhtdin.veuenar ▶  com.arche.NEED_FOR_SPEED_Shift

▶ Rogue market places ▶  Reviews, forums

▶  In!ltrate Google Play ▶  RuFraud

Page 17: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

SMS Trojans – Hiding Their Tracks

Page 18: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Privacy

▶ Functionality used by legit, gray and malicious apps ▶ Monitor behaviors

▶  Voice ▶  SMS ▶  Location ▶  Contacts ▶  Camera ▶  Browser

Page 19: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Commercial Spyware

▶ Tracks usage: phone, location, SMS, mic, camera ▶ Hidden from device owner, runs as a service, no icon

Page 20: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Blackhat Spyware

▶ NickiSpy, FinSpy, GoManag, GGTracker

Page 21: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

▶ ZitMo (Zeus) ▶ SpitMo (SpyEye)

Man-in-the-Mobile (MitMo)

Page 22: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Botnets

▶ Adds device to bot network ▶ Botnet activities:

▶  Spam ▶  Click-fraud ▶  SMS ▶  Data leakage ▶  DDoS

Page 23: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Botnets - Then

▶ Geinimi – discovered December 2010

▶ Command & control, steals personal info

▶ Found on Google Play

Page 24: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Botnets - Now

▶ Foncy IRC bot – January 2012 ▶ Rooter, command & control, SMS

Page 25: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Botnets - Now

▶ Mdk/Simple Temai – Spetember 2012 – January 2013 ▶ Comand & control, SMS, spam, downloader

Page 26: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Advertising - Then

▶ Accepted ▶ Supports free apps ▶ Non-intrusive ▶ No extra permissions

Page 27: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Advertising - Now

▶ Aggressive advertising ▶ Noti!cation bar, shortcuts, bookmarks

Page 28: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Advertising – Google Takes Action

Page 29: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Advertising - Now

▶ Misleading advertisements

Page 30: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Future Predictions

Page 31: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Future Predictions

▶ SMiShing (SMS-phishing): Consumers continue to get tricked by texts that appear as urgent, legitimate calls-to-action

▶ Ransomware: These Trojans block access to device functionality as a method to exploit users

▶ Premium-SMS Trojans: These pro!table Trojans secretly call or text premium numbers

▶ Banking attacks: Expect an increase on banking attacks in the form of man-in-the-middle attacks and capturing SMS messages

▶ Drive-by-downloads: Expect exploit kits to include modules speci!cally for smart devices

Page 32: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Q & A

Page 33: Android Malware Exposed - An In-depth Look at its Evolution

#RSAC

Thank  you!  Grayson Milbourne

Webroot, Inc. @gmilbourne

[email protected] www.webroot.com