cellphone virus and security

31
CELLPHONE VIRUS AND CELLPHONE VIRUS AND SECURITY SECURITY By By R.Sindu Sree R.Sindu Sree

description

 

Transcript of cellphone virus and security

Page 1: cellphone virus and security

CELLPHONE VIRUS AND CELLPHONE VIRUS AND SECURITYSECURITY

ByByR.Sindu SreeR.Sindu Sree

Page 2: cellphone virus and security

INTRODUCTION

2

Page 3: cellphone virus and security

Smart Phone GrowthSmart Phone Growth

The day when everyone has a PC in their pocket has arrived –

Three things driving growth – Increasing amount of time we spend online Instant gratification Lifestyle patterns and social networking

3

Page 4: cellphone virus and security

Smart Phones ‘R Pocket Smart Phones ‘R Pocket Computers Computers Most commonly used phones, as defined

by operating system (OS) – Android (Android OS) BlackBerry (RIM OS) iPhones / iPod touch (iPhone OS) PalmPre (WebOS) Windows Mobile (WinMobile OS)

4

Page 5: cellphone virus and security

Current threats by mobile malwareCurrent threats by mobile malware

For financial gain / loss

Unnecessary calls / SMS / MMS Send and sell private information

Cause phones to work slowly or crash

Wipe out contact books and other information on the phone

Install “false” applications

Page 6: cellphone virus and security

Internet, Bluetooth, and MMSInternet, Bluetooth, and MMS

In all of these transfer methods, the user has to agree at least once to run the infected file

But smart phone virus writters get you to open and install their product the same way computer virus writers do: The virus is typically disguised as a game,

security patch or other desirable application

6

Page 7: cellphone virus and security

Viruses and Smart PhonesViruses and Smart Phones How smart phone viruses spread – Internet downloads Bluetooth

Multimedia Messaging System (MMS) Only smart phones susceptible to viruses Phones that can only make and receive calls are

not at risk

7

Page 8: cellphone virus and security

8

HISTORY

iPhone SMS attack first took place in July 2009

We trust smart phones & think they are safe We have the mistaken sense they are immune

to security threats

Smart phones typically lack security features, like antivirus, found on other computers

Page 9: cellphone virus and security

Smart Phones Difficult to ProtectSmart Phones Difficult to Protect

Easily stolen: theft is single largest problem

Protection options not well known Eavesdropping options are available More types of smart phones = complications

9

Page 10: cellphone virus and security

Differences with PCDifferences with PC

Although similar OSes are being used, differences exist:

Mobiles are always “connected” and switched on

“Environment” keeps changingSeveral variants of phones exist

A malware for one type of phone may not necessarily be able to infect other

Mobile malware not yet causing critical harm At most

they increase the user's billing, or cause the mobile phone to stop working.

Page 11: cellphone virus and security

Classification ofMobile Worms and Viruses

Page 12: cellphone virus and security

ClassificationClassification

Behaviour Virus Worm Trojan

Environment Operating System Vulnerable Application

Page 13: cellphone virus and security

31st October 2006Mobile Worms and Viruses

Classification (examples)Classification (examples)Source:

Kas

pers

ky L

abs

Page 14: cellphone virus and security

Case Studies

Page 15: cellphone virus and security

Case Study – CABIRCase Study – CABIR

First mobile worm Spread vector – Bluetooth Infected file – caribe.sis 15 new variants exist

Page 16: cellphone virus and security

Case Study - ComWarCase Study - ComWar

Second landmark in mobile worms Spread vector - Bluetooth and MMS Large spread area due to MMS Not as proof of concept – Intention to harm by

charging the mobile user Multiple variants detected

Page 17: cellphone virus and security

Case Study - CardTrapCase Study - CardTrap

First cross-over mobile virus found Can migrate from mobile to PC Propogates as infected mobile application as well

as Windows worm 2 variants found

Page 18: cellphone virus and security

Futuristic Threats

Page 19: cellphone virus and security

Futuristic DevelopmentsFuturistic Developments

Location Tracking Camera and Microphone Bug Leaking Sensitive Information

Page 20: cellphone virus and security

Protective Measures

Page 21: cellphone virus and security

Securing against attacksSecuring against attacks

System level security MOSES

Network Level Security Proactive approach

Page 22: cellphone virus and security

Basic Protection All Smart Basic Protection All Smart PhonesPhones Passcode

Enable at least 4 digits but this also depends upon IT policies

Exceeding the number of allowed password attempts deletes all data

Auto-Lock Locks the screen after a pre-set time period

of non-use (consider 30 minutes or less) Passcode-lock enhances auto-lock By itself not exactly a security feature

but combined with passcode protection,it’s essential security

22

Page 23: cellphone virus and security

Eavesdropping Eavesdropping

Last year Karsten Nohl, a UVa PhD graduate, cracked the secret code used on 80% of the world’s phones

Mobile interception, as a result, is now within the reach of “any reasonable well-funded criminal organization”

You and I cannot fix this problem, but it’s not likely to affect us individually

23

Page 24: cellphone virus and security

EavesdroppingEavesdropping

Anyone can install eavesdropping software on your smart phone, as long as they have access to your phone even for a few minutes

Subtle signs that could suggest someone is secretly tapping your cell phone – Cell phone battery is warm even when your phone

has not been used Cell phone lights up at unexpected times,

including occasions when phone is not in use Unexpected beep or click during phone

conversation

24

Page 25: cellphone virus and security

Jealous Husband ScenarioJealous Husband Scenario

Install SpyPhone, and send the report Delete the report from sent emails,

Delete SpyPhone

25

Page 26: cellphone virus and security

Lock Down Bluetooth!Lock Down Bluetooth!

Bluetooth is default-on Wastes your battery Leaves you open to Bluetooth-based attacks

– most common at this time

26

Page 27: cellphone virus and security

Defense-in-DepthDefense-in-Depth

Get latest firmware and software your mobile device manufacturer provides

Maintain situational awareness when carrying any electronic device

Watch your mobile device as you go through airport security Known bad location for device theft Save important transmissions until you can

connect to a secure environment

27

Page 28: cellphone virus and security

Secure an iPhoneSecure an iPhone

Auto-Lock locks the touch screen for a preset time period after not being used for one, two, three, four or five minutes. Turned on by default but can be disabled altogether

Password-protect the SIM card on a 3G The Erase Data function lets you completely

wipe your iPhone after 10 failed passcode attempts

28

Page 29: cellphone virus and security

Social Engineering ThreatsSocial Engineering Threats The best security in the world will not help you

if – You click on an phishing email and give your

personal information You click on a SMS/text message that

appears to come from your carrier You respond to a vishing phone call*

Never give information via email or by phone or on the web, unless you initiate the exchange

29

Page 30: cellphone virus and security

Threats to Smart Phones Threats to Smart Phones Attackers will exploit our social conditioning

entering Personally Identifiable Information (PI/PII), while interacting with phone voice response to commit vishing and identity theft.1

We demand more and better availability from phone service than we would from an ISP, “so the threat of a DoS attack might compel carriers to pay out on a blackmail scam.”1

“At this point, mobile device capability is far ahead of security… We’ll start to see the botnet problem infiltrate the mobile world in 2012.”2

30

Page 31: cellphone virus and security

Questions?Questions?

31