FIREEYE AND LOOKOUT MOBILE THREAT LANDSCAPE

FIREEYE AND LOOKOUT
MOBILE THREAT LANDSCAPE
THE CYBER THREAT INTELLIGENCE EXPERTS
Wes Medley, Federal Architect – FireEye
[email protected]
Tim LeMaster, Security Architect – Lookout
[email protected]
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Agenda
•
Threat Actor Attack Trends
•
Mobile Threat Landscape Trends for 2016
•
2
•
Mobile Credential Theft Malware
•
Android Ransomware
•
SMS Phishing
•
Mobile Malware Distribution Methods
Intelligence Led Security
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
FireEye iSIGHT Intelligence Sources
Attack Trends
•
•
Financial Crime - prior to 2013: “Unsophisticated”
•
Loud and straight-forward
•
Opportunistic
•
Rudimentary toolkits
•
(usually) Basic skills
Since 2013, sophistication has been steadily increasing
•
2014 M-Trends: “the lines are blurring between run-of-the-mill cyber criminals and advanced
state-sponsored attackers”
•
Larger infrastructure, better toolsets, increased focus on persistence
4
Copyright © FireEye, Inc. All rights reserved.
Attack Trends
•
2016: “The line between the level of sophistication of certain financial attackers
and advanced state-sponsored attackers no longer exists”
•
Custom backdoors with unique, tailored configurations per target
•
Increased infrastructure resiliency
•
Counter-forensic techniques
•
Increased interest in inter-banking networks & infrastructure
•
ATMs
Attack Trends (cont.)
•
Email has always been a major target
•
2016 showed an increase in interesting ways to
access email
•
Financial attackers tailor phishing email to
specific client, location or employee
•
Call victims to help them
Mobile Threat Landscape Trends for 2016
•
Mobile Credential Theft Malware
•
Android Ransomware
•
SMS Phishing
•
Mobile Malware Distribution Methods
7
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Mobile Credential Theft Malware
•
Observed considerable growth of mobile device focused malware
•
Increase of overall sophistication of mobile device malware
•
Credential theft mobile malware common feature set
8
•
Collect call logs and cell tower information
•
File system access
•
Bowser and search history
•
SMS listening and interception
•
Camera and microphone access
•
Ability to install and remove apps
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Trends in Mobile Credential Theft Malware
•
Proliferation of mobile Automated Transfer System (ATS) scripts
•
•
9
ATS scripts allow threat actors to transfer money from compromised accounts
Threat actors increased interest in malware that allows two-factor
authentication circumvention
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Mobile Ransomware
•
Mobile ransomware attacks increased significantly in
2016
•
Mobile ransomware attacks occur via malicious apps
disguised as legitimate applications
•
Android ransomware popularity increases
•
Mobile ransomware incorporates more sophisticated
features
10
•
Mobile ransomware does not typically encrypted data on the mobile
devices, it primarily just blocks access to the device
•
Simplocker ( May 2014) was the first mobile malware observed to
incorporate encryption
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Mobile Ransomware
•
Mobile ransomware attacks occur via
malicious apps disguised as
legitimate applications
•
Android ransomware popularity
increases in 2016
•
Mobile ransomware is widely
available on underground forums,
mostly Russian language based
11
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Mobile Malware Distribution Methods
•
Mobile malware is distributed through malicious applications available from third-party and legitimate
application stores
•
In January 2017, Checkpoint detected 20 applications on Google Play of an Android malware know
as HummingWhale
In February 2016, researchers reports a threat actor advertising two private keys of an Apple
Enterprise code signing certificate for sale on the dark web
SMS phishing campaigns continue to be a popular distribution method
•
•
•
12
Malware developers often used adult-themed applications as infection vectors, which are then
subsequently leveraged in law enforcement-themed extortive lures
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Intelligence Led Security
•
Threat Intelligence drives operations and decisions
•
Mature from reactive defense to proactive threat hunting
•
Continuously assessing, training, and integrating enables the Intelligence program
to stay aligned and remain ahead of the next threat
Threat Modeling
Threat Profile
Defensive Planning
Automated Workflows
Tactical Prioritization Schemes
Response Efficiency
Hunt Planning
13
Copyright © FireEye, Inc. All rights reserved.
Intelligence Led Security
Cyber Threat Intelligence-led security programs have quickly moved from a
“bleeding edge” practice embraced by a few to a capability sought by
organizations of all sizes
Tips for creating an intelligence led security program
•
Design a strategy with threat landscape awareness
•
Consider capability level of your program and the individuals charged with executing it
•
Expose your resources to the realities they are likely to face in their daily jobs
•
Update strategic plans to align with overall realities
By creating such an innovative environment, you can stay ahead of the threat
14
Copyright © FireEye, Inc. All rights reserved.
THANK YOU
COPYRIGHT © 2016, FIREEYE, INC. ALL RIGHTS RESERVED.
Lookout
Mobile Threat Landscape…
Tim LeMaster
April 2017
[email protected]
Your mobile device is a gold mine for hackers
ENTERPRISE EMAIL
CREDENTIALS
Stored, Soft Tokens
ENTERPRISE NETWORK
VPN, WiFi
ENTERPRISE APPS
SaaS, Custom Apps
PHOTO ALBUM
Whiteboard Screenshots, IDs
SENSORS
GPS, Microphone, Camera
Agenda
https://pages.nist.gov/mobile-threat-catalogue/application.html#page
Multiple attack vectors utilized
End user jailbreak/root
Malicious jailbreak/root
OS vulnerabilities exploitation
Data on stolen devices
Apps
OS
Network
Malicious apps
Non-compliant apps
App vulnerability exploits
Data leakage
Malicious MitM attacks
Anomalous Root CA
Mobile OS Summaries
Android
Android Patches
• 102 patched CVEs in Apr
•
79 high or critical
• 104 patched CVEs in Mar
•
78 high or critical
• Android Security Advisory 2016-03-18
•
Rooting app – Kernel vuln
• Deployment challenges
• Older devices not getting updates
https://source.android.com/security/bulletin/2017-03-01.html
iOS
iOS Patches
iOS Status
• iOS version 10.3.1 released 3 Apr
• WiFi chip vulnerability patch
• iOS version 10.3 released 27 Mar
• 91 CVEs patched
• Scareware for Ransom
• Safari browser pop-ups loop
• iOS version 10.2.1 released 23 Jan
• 22 CVEs patched
• Need employees to update…
https://support.apple.com/en-us/HT207617
Configuration Profile Change
iOS 10.3 Behavior Change
1. Click on link to profile
2. Install profile (which contains VPN and
root CA)
3. Ignore scary warnings
4. Navigate to Settings -> General ->
About -> Certificate Trust Settings ->
find the newly installed root CA and
turn it "on”
5. Traffic is now decrypted/analyzed by
attacker
Mobile Risk Highlights…
•
Alternative App stores
•
Fraudulent/Fake Apps
•
Pegasus for Android AKA Chrysaor
•
PluginPhantom
•
ViperRAT–surveillanceware
•
App take downs
Lots of alternative app stores…
Pegasus/Chrysaor Spyware
Pegasus for Android
•
Worked jointly with Google
•
Lookout app corpus analysis
•
Unique IOCs
•
APK based malware
•
Doesn’t require root
•
•
Does try privilege escalation
May use WAP for infection
PluginPhantom
DroidPlugin Dynamic Loader
•
Used for targeted surveillanceware
•
Repackaged Android Apps
•
None on Google Play
•
Dynamically Load Malicious APK
•
Extract files, access mic/camera, track
location, receive files… (Sounds familiar)
•
DES encrypted C2
ViperRAT
Surveillanceware
•
Social media for targeting
•
Fake Profile as young women
•
Build trust
•
Install app for easier communication
•
Multi-stage malware
•
•
Dropper for profiling
•
2nd stage is more capable
Extract files and Photos
210 Lookout-discovered threats in the
Google Play Store (2016)
1
4
13
3
1
2
167
July 15
August 4
September 7
September 30
October 19
October-November
November 25
BouncerBounce
OverSeer
DressCode
DressCode
TcemuiPhoto
Uploader
WakefulApp
Download
XRanger
Malware that works
around Google’s
review process to
plant malicious apps
in Play Store.
Spyware targeting
foreign travelers
searching for
Embassy locations.
Steals contact
and location data
Can make the
device a proxy for
network traffic on
corporate networks.
We discovered
more apps on Play
injected with this
trojan.
Lookout discovered
this malware family
in fake versions of
popular apps on
Play.
= Discovered by Lookout in Play Store and subsequently removed by Google.
Malware hidden in
"File Explorer" app
that had gotten into
Play, downloads
and launches
additional apps.
167 apps in Play
infected with this
app dropper.
Apps that exhibit sensitive behaviors
ACCESS TO SENSITIVE DATA
Apps that access sensitive corporate or employee
data, including PII
DATA EXFILTRATION
Apps that upload sensitive data to external
servers
DATA SOVEREIGNTY VIOLATIONS
Apps that violate data sovereignty regulations or
send data to risky geographies
USE OF CLOUD SERVICES
Apps that access cloud storage providers, social
networking services, or peer-to-peer networks
INSECURE DATA HANDLING
Apps that don’t use proper encryption when
storing or sending data
VULNERABILITIES
Applications with known vulnerabilities
What can we do about all of this?
Gartner Market Guide for Mobile Threat Defense Solutions
”It is becoming increasingly important that security leaders look at
the anti-malware, mobile threat defense solutions market, the
products available and how they should be used.”*
This Gartner report is available upon request from Lookout
Lookout Mobile Endpoint Security meets all four functional capabilities, including:
Behavioral Anomaly Detection
Vulnerability Assessment
Network Security
App Scan
Source: Gartner Market Guide for Mobile Threat Defense Solutions, John Girard and Dionisio Zumerle, July 2016
*Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of
Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
What about Data Protection?
Data privacy controls limit what Lookout can see
MDM
Device ID
THREAT DETECTED
MDM
MDM Device ID:
ID101519905000
USERNAME:
JOHN SMITH
EMAIL:
[email protected]
PHONE NUMBER:
+1 (555) 455-0000
IMEI:
0150880990440000
LOOKOUT CONSOLE
THREAT DETECTED
FedRAMP
How is it applicable to Mobile
•
Data analysis and correlation
•
Data Protection
•
Privacy
•
Cloud Provider protection
•
SaaS provider
•
SSP, 2FA, Logging, patching,
encryption…
Six platform principles for securing mobility
Global endpoint presence
Powered by the cloud, not the device
Over 100M mobile sensors worldwide have sent security
telemetry to Lookout.
Lookout customers carry a powerful security cloud in their
pocket that won’t affect device battery or performance.
Machine-intelligence driven
Low TCO with no heavy lifting
Machine intelligence drives predictive security
detections that evade signatures and behavioral
analysis.
We’re non disruptive to install, no additional headcount needed,
and we’ve trained people within an hour
Privacy by design
Delightful end-user experience
Personal data stays personal by analyzing the underlying
software, not the user. FedRAMP compliant.
We know how to build products that people love – we have
millions of happy customers.
Questions