30
Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Embed Size (px)

DESCRIPTION

In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDM’s memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem. Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks Recognise the shortcoming of MDM as a wholesome security solution Enhance mobile attack mitigation techniques through mobile activity visibility

Citation preview

Page 1: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Anatomy of a Targeted Attack

against Mobile Device

Management (MDM)

Page 2: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

MDM: Penetration in the Market

Gartner, Inc. October 2012

Page 3: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

TARGETED

MOBILE THREATS

Page 4: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Mobile Remote Access Trojans (aka Spyphones)

Page 5: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Recent High-Profiled Examples

Page 6: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Commercial mRATS

Page 7: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Survey: Cellular Network 2M Subscribers Sampling: 250K

October 2012:

1 / 1000 devices

Page 8: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Survey: Cellular Network 2M Subscribers Sampling: 250K

Page 9: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

BYPASSING

MOBILE DEVICE

MANAGEMENT

(MDM) SOLUTIONS

Page 10: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

MDMs and Secure Containers

Page 11: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Demo

Let’s Test These Assumptions…

Page 12: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Overview

Page 13: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 1: Infect the device / Android

Page 14: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 1: Infect the device / iOS

Page 15: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 2: Install a Backdoor / Android: Rooting

Page 16: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 2: Install a Backdoor / iOS: Jailbreaking

Page 17: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 3: Bypass Containerization

Page 18: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 3: Bypass Containerization

Page 19: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 3: Bypass Containerization

Page 20: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Step 3: Bypass Containerization

Page 21: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

MITIGATION

TECHNIQUES

Page 22: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

MDM

Page 23: Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Page 24: Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Page 25: Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Page 26: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Mitigation Steps (1)

Page 27: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Mitigation Steps (2)

Page 28: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Mitigation Steps (3)

Page 29: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

March 26 2013 → Android Trojan Found in Targeted Attack

A combination of e-mail hacking, "spear phishing," and a Trojan built specifically for Android smartphones to spy on Tibetan activists

Inside of Mobile Targeted Attack

C&C Server

View the software installed on the phone to facilitate customer software hijacking / tool to get software such as QQ, Email, MSN password

Page 30: Anatomy of a Targeted Attack against Mobile Device Management (MDM)

Thank You.