How Mobile Malware Bypasses Secure Containers

34
How Mobile Malware Bypasses Secure Containers

description

How does mobile malware bypass secure containers, wrappers and MDM?

Transcript of How Mobile Malware Bypasses Secure Containers

Page 1: How Mobile Malware Bypasses Secure Containers

How Mobile Malware Bypasses Secure Containers

Page 2: How Mobile Malware Bypasses Secure Containers

The Mobile Application Sandbox Security Model

Page 3: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Page 4: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Page 5: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Memory

Page 6: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Device Functionalities (GPS,Network, SMS)

Page 7: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Memory

Device Functionalities (GPS,Network, SMS)

Page 8: How Mobile Malware Bypasses Secure Containers

The Mobile Applicaton SandBox Security Model

Storage

Memory

Device Functionalities (GPS,Network, SMS)

Page 9: How Mobile Malware Bypasses Secure Containers

Secure Containers and Wrappers

Page 10: How Mobile Malware Bypasses Secure Containers

Secure Containers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 11: How Mobile Malware Bypasses Secure Containers

Secure Containers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 12: How Mobile Malware Bypasses Secure Containers

Wrappers

Memory

Device Functionalities (GPS,Network, SMS)

Storage

Page 13: How Mobile Malware Bypasses Secure Containers

How Mobile Malware Breaks Secure Containers

Page 14: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 15: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 16: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 17: How Mobile Malware Bypasses Secure Containers

Attack Overview

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 18: How Mobile Malware Bypasses Secure Containers

Step-by-Step

Page 19: How Mobile Malware Bypasses Secure Containers

Step 1: Infection of the Device/ Android

Page 20: How Mobile Malware Bypasses Secure Containers

Step 1: Infecting the Device with Malware/ iOS

Page 21: How Mobile Malware Bypasses Secure Containers

Step 2: Installing a Backdoor Android/“Rooting”

Administrative Every process can run as an administrative (root)

user if it is able to trigger a vulnerability in the OS

Vulnerability Each Android device had/ has a vulnerability Exploit Detection mechanisms don’t look at apps that

exploit the vulnerability

] [ ] [

Page 22: How Mobile Malware Bypasses Secure Containers

Step 2: Installing a Backdoor Android/iOS/ “Jailbreaking”

Community

Jailbroken

xCon

] [ ] [

Page 23: How Mobile Malware Bypasses Secure Containers

Step 3: Bypassing Containerization

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 24: How Mobile Malware Bypasses Secure Containers

Step 3: Bypassing Containerization

Memory

Device Functionalities (GPS,Network, SMS)

Storage

] [ ] [

Page 25: How Mobile Malware Bypasses Secure Containers

There’s More... Android

Page 26: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

Page 27: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

HELLO WORLD

Page 28: How Mobile Malware Bypasses Secure Containers

Alternative Keyboards

HELLO WORLD

Page 29: How Mobile Malware Bypasses Secure Containers

Mitigating the Threat with Lacoon

Mobile Security

Page 30: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Cloud-based virtual execution of applications and payloads to detect exploits

Page 31: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Page 32: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Detection

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device

Page 33: How Mobile Malware Bypasses Secure Containers

Behavioral-Based Malware Detection

Virtual execution

Identification

Detection

Blocking of drive-by attacks

Cloud-based virtual execution of applications and payloads to detect exploits

Identification of malicious behaviors within the applications (such as keyloggers and screencaptures)

Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device

Blocking of drive-by attacks, including exploits of unpatched Web browser vulnerabilities and Jailbreaking attempts

Page 34: How Mobile Malware Bypasses Secure Containers

Thank You.

Contact us:

[email protected]