Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

38
Behind Enemy Lines Practical & Triage Approaches to Mobile Security Abroad

Transcript of Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Page 1: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Behind Enemy LinesPractical & Triage Approaches to Mobile Security Abroad

Page 2: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Presentation Objectives‣ Highlight the threats posed by

traveling abroad with mobile devices

‣ Discuss lessons learned from real world experiences

‣ Provide practical recommendations for reducing these threats

‣ Do it all in 40 mins or less

Page 3: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

About me‣ Justin Morehouse (@mascasa)

‣ Principal Consultant, Stratum Security

‣ CTO of ThreatSim

‣ Security Operations and Consulting

‣ Co-author ‘Securing the Smart Grid’

‣ OWASP Tampa Chapter Founder & Leader

‣ Presented at DEF CON, ShmooCon, OWASP, and more...

Page 4: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

‣ Since 2008 I’ve used and subsequently voided the warranties of the following:

‣ BlackBerry Bold 9700 & 8820

‣ HTC Nexus One (Android 2.3)

‣ iPhone, 3G, 3GS, 4, 4s (All iOS versions)

‣ Motorola Droid (Android 2.1, 2.2, 2.3)

‣ Samsung Galaxy S (Android 2.1)

‣ T-Mobile (HTC) Dash (Windows Mobile 6.5)

My addiction to smartphones

Page 5: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Stratum Security

Why mobile security?

Page 6: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Stratum Security

Because mobile devices are everywhere...

Page 7: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Stratum Security

Smartphones outsold PCs in Q4 of 2010

Page 8: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

1,000,000,000+ smartphone users by 2013

Page 9: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

...and do amazing(ly stupid) things

Page 10: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

and everyone uses them...

Page 11: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

most recently...

Page 12: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Stratum Security

Why international mobile security?

Page 13: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Video Conferencing

My TripIt profile page

Page 14: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Is mobile security a real issue?

Page 15: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Example #1

Page 16: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Example #2

Page 17: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Wikileaks Spy Files

Page 18: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

How you are targeted by threat agents

Page 19: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

...phishing

Page 20: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

evil maid attack

Page 21: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

...and drive-by downloads

Page 22: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Not all threats are created equal...

Page 23: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Advanced Threats

Page 24: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

MinimalThreats

Page 25: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Moderate Threats

Page 26: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Practical mitigation steps

Page 27: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Have a plan...

Page 28: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Make yourself anonymous

(as possible)

Page 29: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Leverage existing technologies...

Page 30: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Case Study

Page 31: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Client Overview

‣ Well-known international retail organization

‣ Executives traveling to hostile countries with moderate threats

‣ Loss of IP would be harmful to organization if obtained by competition

Page 32: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Proposed Solution

‣ Utilize factory unlocked iPhone 4 ‘burner’ phones

‣ Preconfigure with VPN, encryption, PIN, remote wipe, via MDM

‣ Purchase local SIM (with cash) upon arrival

‣ Perform forensics on phone upon return

Page 33: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Solution Issues

‣ Executives often forgot to enable VPN before using data services

‣ Local SIM purchase required detailed information (passport)

‣ Executives used public wireless networks on several occasions

Page 34: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Lessons Learned‣ Utilize configuration utilities to enforce policies

on devices (WiFi, VPN, etc.)

‣ Purchase local SIM cards in advance using anonymous(ish) means (BitCoin)

‣ Disable local syncing in favor of web-based solutions

‣ Require two-factor authentication for all web-based solutions

‣ Tunnel your tunnels (VPN & SSL)

Page 35: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Effective mobile security triage

Page 36: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Keep it simple...

Page 37: Behind Enemy Lines - Practical & Triage Approaches to Mobile Security Abroad

Plan for the Worst

‣ Knowledge is key (DO’s and DON’Ts cheat-sheet)

‣ Rule of 32 (w/ Vodafone UK SIM)

‣ Remote deployment solutions (Wipe & rebuild required)

‣ Overnight INTL shipping