Cell phone security lite

Post on 06-Jul-2015

74 views 0 download

Tags:

Transcript of Cell phone security lite

Your Cell Phone is Covered in Spiders

An overview of the cell phone security landscape

Cooper Quintin@cooperq

cooper@radicaldesigns.org

We are becoming increasingly dependent on mobile devices

● We are storing more and more data on them● Pictures● Videos● Contacts● Email● Social Graphs● Location History● Etc

●As the amount of data increases● The complexity increases● The desirability increases● The number of vulnerabilities increases

And there are a lot of vulnerabilities!

Things to Keep in Mind

If an attacker gains physical access phone can and will be completely compromised.

Also, you should assume that your phone will be compromised at some point.

Generally, you will be safest if you just take the attitude that YOU SHOULD NOT TRUST YOUR

PHONE

Security is a Journey Not a Destination

The more hurdles that you put up, the harder you make it for an attacker.

Time to compromise > Determination of attacker

Don't get demoralized! There are many things you can do to improve your security.

Threat Model●Random attacks

● Malicious apps ● Stolen / Lost phone

●Targeted attacker ● Law Enforcement● Corporate Espionage● Personal Enemies

●Signal Interception●Your Phone Company

Burner Phones● No encryption● Trivial for Forensic Investigators● Closed Source● Usually no Screen Lock

iPhoneThe Bad

● Closed source● Very little in the way of security apps● Default screen lock is a four digit number ● Privacy tools that aren't free or open source

The Good● There is a stronger screen lock that can be enabled● A couple of decent privacy apps● Less Malware

BlackBerry● BEST USED IN COMBINATION WITH BES

● Otherwise about as good as any other smartphone

● BBM and Pin to Pin messaging NOT SECURE

– Not encrypted, just 'scrambled'

– RIM can read all of your messages if a govt demands● Your data is only as secure as the company is trustworthy

● RIM admitted to providing backdoors to govt. in India and has helped UK and middle east govts.

● Less Malware

● Without BES, Security on Blackberry is not so good.

Android● IMO The best phone for security● Open source● Lots of security tools● Lots of encryption tools● Full Disk Encryption● Good security options● Guardian Project● Your data is in the hands of google● How much do you trust google?

Lets Talk About Threat Models Again

Law Enforcement Investigators are Looking for:

● Subscriber & Equipment Identifiers ● Contacts ● Appointment Calendar ● SMS, Text Messages, Instant Messages, Email● Call Logs● Photos, Audio and Video● Documents● Location Data

Forensic Methods

● Recovering screen lock ● Recovery Mode● Cellbrite and UFED● JTAG

Solutions●Have a strong screen lock and a short timeout●Don't tell them your password●Encryption (Text Secure, LUKS, Device encryption)

Signal InterceptionThreats●Fake Cellular Towers / Drones●USRP/GNU Radio●Snooping as a Service●Cellular companies will provide wiretaps without even a warrant●Insecure apps like BBM and whatsapp

Solutions● Encrypted Calls (PrivateGSM, Redphone,

SilentCircle )● Encrypted Text on Android (Textsecure)● Talk in Person (This is the Most Secure)

Lost and Stolen Phones● Phone Finding and Remote Wipe

● Android: Lookout, Prey ● BlackBerry Protect● Find My Iphone

● Strong Screen lock● Will not stop a sophisticated attacker

● Report to The Provider?● They probably don't give a damn.

MalwareVendor and Espionage malware

● This stuff is extremely sophisticated● FinFisher● CarrierIQ

● Voodo carrierIQ

Standard, untargeted malware● Personal Data Theft● Premium SMS● The usual suspects (spyware, trojans, phishing)● Facebook, Angry Birds?

Malware Solutions● Be careful what you install!

● Don't install apps from untrusted sources

● Don't run updates when on insecure networks

● Anti Virus won't save you!

● Don't assume that because you have an iPhone or Blackberry that you are immune to malware

● Use the same precautions as you would on any computer.

Other Attacks● NFC● QR Phishing● Baseband Attacks

Disk Encryption●Exists on Android●Exists on Blackberry if you have BES●Does not exist on iPhone●Vulnerable to many different attacks●You should NOT rely solely on disk encryption.

Call Encryption

● SecureGSM ● Android: Redphone, OSTN

To Root or Not to Root(AKA Jailbreaking)

Rooting your phone is the process of gaining super administrator control over your phone.

This means you can doANYTHING YOU WANT

To your phone.

Including mess it up in fantastic ways!

To Root or Not to Root

The Good

● Custom Firmware

● Better Security Tools

● Remove Spyware

● More Cool Apps

● Performance Improvements

● Tinkering is Fun!

The Bad

● Can significantly decrease security

● You can permanently break your phone

● Will Void Your Warranty

In Conclusion...● It's healthy to be paranoid about your phone● Don't loose your phone!● Trust what you install (Open Source)● Root and install custom firmware● Use a stronger screen lock● Audit your phone● Encrypt Everything!

Thank You!

Cooper Quintincooper@radicaldesigns.orgTwitter: @cooperqJabber: cooperq@jabber.ccc.deOTR: 9B3470B9 B1F10651 B5840FEB 026D6CF7 2D949F6FPGP: 75FB9347 FA4B22A0 5068080B D0EA7B6F F0AFE2CA