SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Three Steps To Combat
Mobile Malware
Sajal Sahay
Senior Director Product Marketing, Mobilisafe
2
Saj Sahay
Sr. Director of Product Marketing,
Rapid7
Presenters
Short for “Malicious Software”, there are
multiple types of malware
• Software that can disrupt device operations, gather
sensitive information or gain undue access to the
device
BYOD explosion is the malware growth story
• Attackers adapting and quickly moving to mobile
• Mostly embedded in apps as they are the primary way
users access information on mobile devices
What Is Malware?
3
Key Types Of Mobile Malware
4
Trojans
• Once installed provide access to the device for the
person who originated the program
• Usually in untrustworthy applications in 3rd party app
stores
• Can exfiltrate information and lead to significant
financial and organizational harm
RootKits
• Activate every time your system boots up
• Can be very difficult to detect
• Can allow the installation of hidden files, hidden
user accounts etc.
Why Is Mobile Malware Growing?
5
Cybercriminals see a rich target given that mobile devices usually have a lot
of personal & financial information on them
Spam/Phishing was very successful on desktops, and attackers feel that end
users are susceptible to the same failings on mobile devices
Most popular apps are from lesser known companies so it’s difficult for
consumers to know which ones to trust
The Growth Is Astounding!*
6
123% growth in malware discoveries in ’12
vs. ‘11
95% of infections on Android given diversity
of OS versions still being used
Common ways to exploit the OS were
through application repackaging, malicious
URLs & SMS phishing
Total of 32.8 million Android devices
infected in ‘12, a 200% growth from ’11
* From NQ Mobile’s Yr 2012 Mobile Security Report
So, What Can You Do?
7
Every company should have
written mobile usage policies for
their employees!
• Make sure they are easy to understand
• Make sure that all employees go through
the necessary training for successful
company-wide implementation
Include the following three
malware focused policies in your
company’s written document
Malware Focused Policy #1
Employees Should Only Download Applications From Trusted Sources
8
Google Play (Android) and the iOS App
Store (iOS) are administered by Google &
Apple
• Strict requirements for applications submitted for
inclusion
• Utilize sophisticated filtering mechanisms to discover
and remove apps that may contain malware
Apps should not be downloaded from
untrustworthy 3rd party app stores
9
Malware Focused Policy #2
Employees Should Always Update Their Mobile Devices To The Latest Firmware
Extend the same patch requirements
for your corporate network to mobile
Updating firmware is the best way to
patch vulnerabilities on mobile
devices
10
Mobile Malware Example: DroidKungFu
This type of malware can be
considered both a Trojan and a
Rootkit
• Unique because it can avoid detection by anti
malware software
• Works by installing a backdoor in the Android
OS
• Gives the attacker full control of the user’s
mobile device
• Mainly affects devices running Android 2.2,
exploiting two vulnerabilities in the OS version
Malware Focused Policy #3
Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail
11
Employees should be very careful
when receiving an SMS or email
containing a link
If the URL of the link seems
suspicious they should not click
the link
Inform the Security Department
instead to investigate the URL
Mobile Malware Example: Zitmo (Zeus in the Mobile)
12
A Trojan that can forward SMS’s with
confidential information from the
device to other phone numbers
• Can steal a user’s username and password
• A SMS is sent with a link to update the ‘security
certificate’, while it actually directs the user to
install Zitmo
• Once the installation is completed and info is
received, attackers usually log-into user’s
confidential sites like bank accounts to initiate
unauthorized transactions
1. Employees Should Only Download Applications From Trusted Sources
2. Employees Should Always Update Their Mobile Devices To The Latest
Firmware
3. Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail
13
Summary - Three Steps To Combat Mobile Malware
Try Moblisafe for yourself - http://information.rapid7.com/mobilisafe-
demo.html
14
Thank you!

Mais conteúdo relacionado

Mais de Rapid7

Mais de Rapid7 (13)

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL Injection
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Three Steps to Combat Mobile Malware

  • 1. Three Steps To Combat Mobile Malware Sajal Sahay Senior Director Product Marketing, Mobilisafe
  • 2. 2 Saj Sahay Sr. Director of Product Marketing, Rapid7 Presenters
  • 3. Short for “Malicious Software”, there are multiple types of malware • Software that can disrupt device operations, gather sensitive information or gain undue access to the device BYOD explosion is the malware growth story • Attackers adapting and quickly moving to mobile • Mostly embedded in apps as they are the primary way users access information on mobile devices What Is Malware? 3
  • 4. Key Types Of Mobile Malware 4 Trojans • Once installed provide access to the device for the person who originated the program • Usually in untrustworthy applications in 3rd party app stores • Can exfiltrate information and lead to significant financial and organizational harm RootKits • Activate every time your system boots up • Can be very difficult to detect • Can allow the installation of hidden files, hidden user accounts etc.
  • 5. Why Is Mobile Malware Growing? 5 Cybercriminals see a rich target given that mobile devices usually have a lot of personal & financial information on them Spam/Phishing was very successful on desktops, and attackers feel that end users are susceptible to the same failings on mobile devices Most popular apps are from lesser known companies so it’s difficult for consumers to know which ones to trust
  • 6. The Growth Is Astounding!* 6 123% growth in malware discoveries in ’12 vs. ‘11 95% of infections on Android given diversity of OS versions still being used Common ways to exploit the OS were through application repackaging, malicious URLs & SMS phishing Total of 32.8 million Android devices infected in ‘12, a 200% growth from ’11 * From NQ Mobile’s Yr 2012 Mobile Security Report
  • 7. So, What Can You Do? 7 Every company should have written mobile usage policies for their employees! • Make sure they are easy to understand • Make sure that all employees go through the necessary training for successful company-wide implementation Include the following three malware focused policies in your company’s written document
  • 8. Malware Focused Policy #1 Employees Should Only Download Applications From Trusted Sources 8 Google Play (Android) and the iOS App Store (iOS) are administered by Google & Apple • Strict requirements for applications submitted for inclusion • Utilize sophisticated filtering mechanisms to discover and remove apps that may contain malware Apps should not be downloaded from untrustworthy 3rd party app stores
  • 9. 9 Malware Focused Policy #2 Employees Should Always Update Their Mobile Devices To The Latest Firmware Extend the same patch requirements for your corporate network to mobile Updating firmware is the best way to patch vulnerabilities on mobile devices
  • 10. 10 Mobile Malware Example: DroidKungFu This type of malware can be considered both a Trojan and a Rootkit • Unique because it can avoid detection by anti malware software • Works by installing a backdoor in the Android OS • Gives the attacker full control of the user’s mobile device • Mainly affects devices running Android 2.2, exploiting two vulnerabilities in the OS version
  • 11. Malware Focused Policy #3 Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail 11 Employees should be very careful when receiving an SMS or email containing a link If the URL of the link seems suspicious they should not click the link Inform the Security Department instead to investigate the URL
  • 12. Mobile Malware Example: Zitmo (Zeus in the Mobile) 12 A Trojan that can forward SMS’s with confidential information from the device to other phone numbers • Can steal a user’s username and password • A SMS is sent with a link to update the ‘security certificate’, while it actually directs the user to install Zitmo • Once the installation is completed and info is received, attackers usually log-into user’s confidential sites like bank accounts to initiate unauthorized transactions
  • 13. 1. Employees Should Only Download Applications From Trusted Sources 2. Employees Should Always Update Their Mobile Devices To The Latest Firmware 3. Employees Shouldn’t Click Unfamiliar Links Sent Via SMS Or E-mail 13 Summary - Three Steps To Combat Mobile Malware
  • 14. Try Moblisafe for yourself - http://information.rapid7.com/mobilisafe- demo.html 14 Thank you!