30
The Commoditization of Mobile Banking Malware Jean-Ian Boutin ESET

Mobile banking commoditization

Embed Size (px)

DESCRIPTION

Slides from my CARO2014 presentation

Citation preview

Page 1: Mobile banking commoditization

The Commoditization of Mobile Banking

Malware

Jean-Ian Boutin

ESET

Page 2: Mobile banking commoditization

Outline

• Historical Background

• Forums

• Technical Part

• Android

• Conclusion

2

Page 3: Mobile banking commoditization

Historical Background

Page 4: Mobile banking commoditization

The Beginnings

• ZitMo appearance in 2010

• Commands received through

SMS

• One purpose: intercept mTAN

4

Page 5: Mobile banking commoditization

New and Exciting

• Woah, a new C&C

number!

5

Page 6: Mobile banking commoditization

Old and Boring

• Mobile banking malware is

now common

• Android market share

increase brought some

advantages to the cyber

criminals

6

Page 7: Mobile banking commoditization

Forums

Page 8: Mobile banking commoditization

Installation Through Social Engineering

8

Page 9: Mobile banking commoditization

Installation Through Social Engineering

9

Page 10: Mobile banking commoditization

Perkele

• Appeared in 2013• Sold in semi-private

forums• Single use application:

1000$• Universal kit: 15000$

10

Page 11: Mobile banking commoditization

iBanking

11

Page 12: Mobile banking commoditization

iBanking

12

Page 13: Mobile banking commoditization

iBanking Source Code “Leak”

• In February 2014, someone posted that iBanking source code was

leaked

• In fact, the control panel code was leaked, but not the Android

source code.

• A builder is available that can change C&C address/phone number

and application skin

13

Page 14: Mobile banking commoditization

Other offerings

14

Page 15: Mobile banking commoditization

Other offerings

15

Page 16: Mobile banking commoditization

Other offerings

16

Page 17: Mobile banking commoditization

Mobile Banking Malware Bundled With Webinject Kit

• A perkele variant included in well known webinject framework sold

by yummba

17

Page 18: Mobile banking commoditization

Technical Aspects

Page 19: Mobile banking commoditization

Perkele SMS Divert – How to?

19

Page 20: Mobile banking commoditization

Perkele SMS Divert – How to?

20

Page 21: Mobile banking commoditization

iBanking Permissions

• Having more capabilities requires a lot more permissions

• Persistence without user interaction is done through RECEIVE_BOOT_COMPLETED

21

Page 22: Mobile banking commoditization

iBanking Commands

# sms start

# sms stop

# call start

# call stop

# change num

# sms list

# call list

# start record

# stop record

# sendSMS

# contact list

# wipe data

# ping

/android/sms/ping.php

/android/sms/index.phpInitialization/Heartbeat calls

/android/sms/sync.php

/android/sms/saveSMS.php

/android/getList.php

/android/sendFile.php

Command receive

Data Upload

22

Page 23: Mobile banking commoditization

23

Page 24: Mobile banking commoditization

iBanking SMS Divert – How to?

• Commands can be sent over HTTP or SMS

• SMS commands are accepted only if they are coming from known

telephone numbers

24

Page 25: Mobile banking commoditization

iBanking Analysis Thwarting Tricks

• Checks for default Android emulator values

• IMEI• IMSI• Operator• Telephone #

• JAVA obfuscation

25

Page 26: Mobile banking commoditization

Android Remediation

Page 27: Mobile banking commoditization

Android Platform Remediation

• Starting with KitKat, no longer possible to bypass Default Messaging app using the aforementioned technique

27

Page 28: Mobile banking commoditization

Source: wikipedia.com

28

Page 29: Mobile banking commoditization

Conclusion

• Commoditization led to

• Wider distribution

• Specialization

29

Page 30: Mobile banking commoditization

Special thanks to

Anton Cherepanov

Questions ?

@jiboutin

Thank You!