Five Lessons in Mobile Security - Preso for Lunch & Learn

39
Five Lessons in Mobile Security Brian Tokuyoshi – Solution Analyst

description

Guide

Transcript of Five Lessons in Mobile Security - Preso for Lunch & Learn

Page 1: Five Lessons in Mobile Security - Preso for Lunch & Learn

Five Lessons in Mobile Security

Brian Tokuyoshi – Solution Analyst

Page 2: Five Lessons in Mobile Security - Preso for Lunch & Learn

2 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Are mobile users safe?

Page 3: Five Lessons in Mobile Security - Preso for Lunch & Learn

Attacks on the Network Connection

Sniffing on Wi Fi Networks Open Wi-Fi sniffable by everyone Easy-use GUI tools make it easy

to try different attacks on WEP / WPA / WPA2

Fern Cracker from BackTrack 5 / Kali Linux

Page 4: Five Lessons in Mobile Security - Preso for Lunch & Learn

Stealing Session Cookies without a PasswordWireShark Mozilla Add & Edit

Page 5: Five Lessons in Mobile Security - Preso for Lunch & Learn

Attacking Internal WiFi Networks by Snail MailLoad attack

software on cheap, generic prepaid

smartphone

Snail mail the device to victim

Attacker can now perform a local attack on WiFi / bluetooth devices in the

mailroom’s proximity

Page 6: Five Lessons in Mobile Security - Preso for Lunch & Learn

Inserting a Man-in-the-Middle with Reaver

Attacker uses brute force against WiFi Protected Setup (reaver attack) to

get access to admin console

Attacker modifies the hotspot and

sets up DNS spoofing

Social Engineering Toolkit used to

generate copy of legitimate site with an

exploit embedded

Victim is redirected to the

modified web page

21

3

4

Page 7: Five Lessons in Mobile Security - Preso for Lunch & Learn

Man in the Middle - The Pineapple

Low cost wireless pen testing tool

Runs the Jasaeger / Karma attack

Hardware & Accessories Has USB port to run 3G Modem or

a second wifi interface to tether Can use a ethernet connection to

tether New version has dual antennas to

run a bridge to the existing network Optional battery pack

Supports plugins for packet capture, SSL interception

Page 8: Five Lessons in Mobile Security - Preso for Lunch & Learn

Normal Wireless Network Discovery

Normal Wireless Network Discovery

SSID: JoesHome

Probe: “Is JoesHome There?

Probe Response: “Yes”

Client

Probe: “Is ACME_Corp There?

No Response

Probe: “Is CoffeeShop There?

No Response

Page 9: Five Lessons in Mobile Security - Preso for Lunch & Learn

Man in the Middle: The PineappleProbe: “Is ACME_Corp There?

Modified Access Point

Probe: “Is CoffeeShop There?

Probe: “Is JoesHome There?

Probe Response: “Yes”

• Generates a deauth• Pretends to be whatever access point the

beacon wants• Attacker controls ALL of the content the

victim sees

Probe Response: “Yes”

Probe Response: “Yes”Client

Page 10: Five Lessons in Mobile Security - Preso for Lunch & Learn

What’s Wrong with this Page?

This is a FavIcon No HTTPS

This is in the clear!

Page 11: Five Lessons in Mobile Security - Preso for Lunch & Learn

Man in the Middle with SSLstrip

Server sends its Certificate

VictimWebServer

Request SSL Connection Modified

Access Point

SSL Handshake

Session Key

User sees non-encrypted page

Server sends encrypted content

User sends non-encrypted content

Content received

Page 12: Five Lessons in Mobile Security - Preso for Lunch & Learn

iOS7

Small B&W Icon

Traffic Encrypted

Traffic intercepted by the Pineapple

Page 13: Five Lessons in Mobile Security - Preso for Lunch & Learn

13 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Apps Behaving Badly

Page 14: Five Lessons in Mobile Security - Preso for Lunch & Learn

Don’t Depend on the App’s Security

14 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 15: Five Lessons in Mobile Security - Preso for Lunch & Learn

Security Measures and Permissions

Android app permission requests are all or nothing

Android App Ops (in 4.3) removed in 4.4 Had a granular app permission system

Downloaded code (plug ins, ad networks) run with the app’s permissions

Exploits to apps assume the app’s permissions

Some apps upload content to the cloud

Jailbroken devices remove even the basic checks

15 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 16: Five Lessons in Mobile Security - Preso for Lunch & Learn

File Binders

Malware PayloadBinders hide the malware to bypass app verification

“Legitimate App”

Source: Symantec

Page 17: Five Lessons in Mobile Security - Preso for Lunch & Learn

Commercial Spying Software Dual-purpose software (Can be used for good/bad)

Monitors just about everything (calls, email, text, photos, video)

Not detectable by the user

Can be used for remote surveillance

Page 18: Five Lessons in Mobile Security - Preso for Lunch & Learn

18 | ©2012, Palo Alto Networks. Confidential and Proprietary.

The Threat Landscape Continues to Evolve

Page 19: Five Lessons in Mobile Security - Preso for Lunch & Learn

The Basics on Threats

Threat What it is What it does

Exploit Bad application input usually in the form of network traffic.

Targets a vulnerability to hijack control of the target application or machine.

Malware Malicious application or code.

Anything – Downloads, hacks, explores, steals…

Command and Control (C2)

Network traffic generated by malware.

Keeps the remote attacker in control ands coordinates the attack.

Page 20: Five Lessons in Mobile Security - Preso for Lunch & Learn

Today’s Threats Use Blended Techniques

Bait theend-user

1

End-user lured to a dangerous application or website containing malicious content

Exploit

2

Infected content exploits the end-user, often without their knowledge

DownloadBackdoor

3

Secondary payload is downloaded in the background. Malware installed

EstablishBack-Channel

4

Malware establishes an outbound connection to the attacker for ongoing control

Explore & Steal

5

Remote attacker has control inside the network and escalates the attack

20 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 21: Five Lessons in Mobile Security - Preso for Lunch & Learn

The Webview Exploit

21 | ©2012, Palo Alto Networks. Confidential and Proprietary.

• Website Javascript opens a shell to the attacker• Affects all Android devices < 4.2• Big question on whether affected devices will be patched• Added to Metasploit last week

Page 22: Five Lessons in Mobile Security - Preso for Lunch & Learn

Android Master Key Vulnerability

Android Application Package (APK)

META-INFlibresAssetsAndroidManifest.XML

Signature of the original file is fine

AndroidManifest.XML

Modified file does not get checked and overwrites the original

Page 23: Five Lessons in Mobile Security - Preso for Lunch & Learn

23 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Why is Malware Targetting Android?

Page 24: Five Lessons in Mobile Security - Preso for Lunch & Learn

Malware by Platform

Page 25: Five Lessons in Mobile Security - Preso for Lunch & Learn

Why isn’t there more iOS malware?

iOS has a limited number of ways to install software App Store Ad Hoc Provisioning Profile for

software testing Otherwise the device has to be

jailbroken

Effectively App Store acts as A whitelist for vetting apps A choke point for updates

No system is invulnerable, however

Page 26: Five Lessons in Mobile Security - Preso for Lunch & Learn

Why is Malware Focusing on Android?

Android app sources Can support multiple App

Stores, some of dubious quality

Does not need to be jailbroken to run unsigned code

Users can turn off app store restrictions

People want to turn off the app store restrictions

Android Verify App feature added in 4.2 does app profiling

Page 27: Five Lessons in Mobile Security - Preso for Lunch & Learn

DPlug Android Malware TTPod App in Google Play

In App Purchase

Attacker

Mobile Ad Network Code

DPlug

Sends IMSI / IMEI via SMS

Prem

ium

SM

S

Forged SubscribeConfirm?

Victim

Accept

Premium SMS Billing

Page 28: Five Lessons in Mobile Security - Preso for Lunch & Learn

28 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Rethinking Mobile Security

Page 29: Five Lessons in Mobile Security - Preso for Lunch & Learn

Unlocking The Potential of Mobile Depends On Security

Intranet

Running Your Business on

Mobile Devices

Ben

efits

to B

usin

ess

Mobile Maturity

Email

Accessing Business Apps

29 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 30: Five Lessons in Mobile Security - Preso for Lunch & Learn

Existing Approaches for Mobile Security Don’t Work

Approach Exposure to Risk

Block mobile devices People will still use mobile devices, except without your control

Hope existing security protects mobile

devicesDon’t know if existing measures will be effective

for mobile devices

Use basic mobile security like ActiveSync

Doesn’t address mobile threats and won’t secure apps and data

30 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 31: Five Lessons in Mobile Security - Preso for Lunch & Learn

New approach to safely enabling mobile devices

Protect the Device Control the DataManage the Device

Ensure devices are safely enabled while simplifying deployment & setup• Ensure proper settings

in place, such as strong passcodes and encryption

• Simplify provisioning of common configuration like email and certificates

Protect the mobile device from exploits and malware• Protecting the device

from infection also protects confidential data and unauthorized network access

Control access to data and movement of between applications• Control access by app,

user, and device state• Extend data movement

controls to the device to ensure data stays within “business apps”

31 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 32: Five Lessons in Mobile Security - Preso for Lunch & Learn

GlobalProtect Mobile Security Solution

GlobalProtect App

GlobalProtect GatewayDelivers mobile threat prevention and policy

enforcement based on apps, users, content and device

state

Enables device management, provides device state information,

and establishes secure connectivity

GlobalProtect Mobile Security Manager

Provides device management, malware

detection, and device state

32 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 33: Five Lessons in Mobile Security - Preso for Lunch & Learn

Manage The Device

Manage device settings• Enforce security settings such as passcode

• Restricts device functions such as camera

• Configure accounts such as email, VPN, Wi-Fi settings

Understand device state• Monitor and report device state for policy

enforcement, such as:

• Whitelisted / blacklisted apps

• Rooted / jailbroken

Perform key operations• Ex: lock, unlock, wipe, send a message

Detect Android Malware• Detect and react to the presence of

malware

GlobalProtect Mobile Security Manager

GlobalProtect App

33 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 34: Five Lessons in Mobile Security - Preso for Lunch & Learn

Protect The Device

Consistent security everywhere• IPsec/SSL VPN connection to a purpose

built next generation security platform for policy enforcement regardless of the device location

Mobile threat prevention• Vulnerability (IPS) and malware (AV)

protection for mobile threats

• URL filtering for protection against malicious websites

• WildFire static and dynamic analysis for advanced mobile threats

Threats

GlobalProtect Gateway

34 | ©2014, Palo Alto Networks. Confidential and Proprietary.

GlobalProtect App

Page 35: Five Lessons in Mobile Security - Preso for Lunch & Learn

Control The Data Control access to applications and data• Granular policy determines which

users and devices can access sensitive applications and data

• Policy criteria based on application, user, content, device, and device state for control and visibility

• Identify device types such as iOS, Android, Windows, Mac devices

• Identify device ownership such as personal (BYOD) or corporate issued

• Identify device states such as rooted/jailbroken

• File blocking based on content and content type

Control data movement between apps on the device• Solution provides the foundation for

future developments in data protection

Applications and Data

35 | ©2014, Palo Alto Networks. Confidential and Proprietary.

GlobalProtect Gateway

GlobalProtect App

Page 36: Five Lessons in Mobile Security - Preso for Lunch & Learn

How the integrated solution works

Page 37: Five Lessons in Mobile Security - Preso for Lunch & Learn

Why Palo Alto Networks for Mobile Security

Integrates the necessary technologies – VPN, policy, threat prevention, management

Uniquely capable of protecting the device by leveraging WildFire, IPS, and app policy

Rich security platform that can protect all traffic, devices, applications and data – in the network

38 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 38: Five Lessons in Mobile Security - Preso for Lunch & Learn

GlobalProtect Mobile Security Manager Ordering, Licensing and Availability

Mobile Security Manager runs on the new GP-100 appliance

GP-100 comes with support for up to 500 mobile devices Additional capacity licenses (perpetual) to support additional devices

1K, 2K, 5K, 10K, 25K, 50K, and 100k WildFire subscription (optional add-on) for Android malware detection

Price varies based on underlying capacity license

Orders and shipments expected February 2014

GP-100 is not designed to be sold as a stand alone product Requires other GlobalProtect components for full functionality (app, portal,

gateway)

39 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Page 39: Five Lessons in Mobile Security - Preso for Lunch & Learn

40 | ©2012, Palo Alto Networks. Confidential and Proprietary.