32
Anatomy of a Targeted Attack against Mobile Device Management (MDM) Solutions Ohad Bobrov, CTO and co-founder [email protected]

IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Anatomy of a Targeted Attack against Mobile Device Management (MDM) Solutions

Ohad Bobrov, CTO and co-founder [email protected]

Page 2: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Collapse The collapse of the corporate perimeter

Targeted devices Why mobile devices are targeted

Demo How mobile malware bypasses current security solutions

Mitigation Detection, remediation & building a secure BYOD/HYOD architecture

Agenda

Page 3: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

•  Protecting organizations from mobile threats

•  Protecting tier-1 financial, manufacturing, legal and defense organizations

•  Cutting edge mobile security research team

About Lacoon Mobile Security

Page 4: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

The Collapse Of The Corporate Perimeter

> 2011

Page 5: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

The Collapse Of The Corporate Perimeter

“More than

60% of organizations enable BYOD” Gartner, Inc. October 2012

Page 6: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

TARGETED MOBILE THREATS

Page 7: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Mobile Devices: Attractive Attack Target

Eavesdropping

Extracting contact lists, call &text logs

Tracking location

Infiltrating internal LANs

Snooping on corporate emails and application data

Page 8: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Recent High-Profiled Examples

Page 9: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Commercial mobile surveillance tools

Page 10: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Data sample •  1 GB traffic sample of spyphone targeted traffic,

collected over a 2-day period

•  Collected from a channel serving ~650K subscribers

•  Traffic constrained to communications to selected malicious IP address

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 11: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Infection rates:

June 2013:

1 / 1000 devices

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 12: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 13: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Mobile Device Management

(MDM) & Secure

Containers

Page 14: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

MDMs and Secure Containers

3 features:

l  Encrypt business data l  Encrypt communications to the

business l  Detect Jailbreak/ Rooting of

devices

Page 15: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

HOW ATTACKERS BYPASS

MDM SOLUTIONS

Page 16: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

DEMO

Let’s Test…

Page 17: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Overview

Infect the Device

Install Backdoor

Bypass Containerization

Exfiltrate Information

Page 18: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Step 1: Infect the device

Page 19: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Step 2: Install a Backdoor / aka Rooting

Administrative Every process can run as an administrative (root) user if it is able to triggr a vulnerability in the OS

Vulnerability Each Android device had/ has a public vulnerability

Exploit Detection mechanisms don’t look at apps that exploit the vulnerability

Page 20: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Step 3: Bypass Containerization

Jo, yjod od sm r,so;

Storage

Page 21: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Jo, yjod od sm r,so;

Storage

Step 3: Bypass Containerization

Page 22: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Jo, yjod od sm r,so;

Hi, This is an email

Storage Memory

Step 3: Bypass Containerization

Page 23: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Jo, yjod od sm r,so;

Hi, This is an email

Storage Memory

Exfiltrate information

Step 3: Bypass Containerization

Page 24: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

CURRENT SECURITY SOLUTIONS

Page 25: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Current Solutions: FAIL to Protect

Page 26: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Mitigation: Current Controls

Mobile Device Management (MDM)

Multi-Persona

Wrapper

Active Sync

NAC

Page 27: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Mitigation: Current Controls

Mobile Device Management (MDM)

Multi-Persona

Wrapper

Active Sync

NAC

Page 28: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Detection: Adding Behavior-based Risk

Malware Analysis

Threat Intelligence

Vulnerability Research

Page 29: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Detection: Adding Behavior-based Risk

Malware Analysis

Threat Intelligence

Vulnerability Research

Application Behavioral

Analysis

Device Behavioral

Analysis

Vulnerability Assessment

Page 30: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Detection: Adding Behavior-based Risk

Malware Analysis

Threat Intelligence

Vulnerability Research

Application Behavioral

Analysis

Device Behavioral

Analysis

Vulnerability Assessment

Page 31: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Lacoon Mobile Security

Page 32: IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions

Thank You.

Stop by: Stand A50 Email me: [email protected] Twitter: @LacoonSecurity