Top mobile security threats

17
TOP MOBILE SECURITY THREATS Tips on How to remain SAFE

description

Check our Slide Show on Top mobile security threats and tips on how to remain safe from them.

Transcript of Top mobile security threats

Page 1: Top mobile security threats

TOP MOBILE SECURITY THREATS

Tips on How to remain SAFE

Page 2: Top mobile security threats

Introduction of First Mobile Security Threats

The first mobile Malware

Name : Cabir/CaribeType : Computer Worm1st Created : 2004Platform : Mobile Phones

Page 3: Top mobile security threats

Fortunately, the Cabir worm was considered to be less harmful owing to its nature of simply replicating itself and not carrying out any serious damages.

With its contact effort of replicating attempt as well as scanning for Blooth enabled devices, the battery life is often shortened.

Additional Note on Cabir

Page 4: Top mobile security threats

Rapid growth in Smartphone and tablet users has increased the scope of malware threatsReference: BusinessInsider.in

Smartphone & Tablet Users – Rapid Growth

2004 2005 2006 2007 2008 2009 2010 2011 2012 20130

5

10

15

20

25

PCSmartphoneTablet

Page 5: Top mobile security threats

History of malware for mobile devices

•Cabir•First worm affecting symbian series2004•Lkee and Duh•Worms affecting jailbroken phones2009•FakePlayer•1st Android to make money by sending SMS to premium numbers2010•DroidDream•First massive attack on Goggle Play.2011•Zitmo•Designed to steam banking mTANs2012•Masterkey•Designed to disguise as legitimate app2013•DownAPK•Fake banking app which gets connected through infected PC2014

Page 6: Top mobile security threats

Android Vs iPhone – Threats to malware

Malware Threats

Page 7: Top mobile security threats

Reasons for Android Being vulnerable to attacks

1. 79% of mobile market is owned by Android device(Reference: Engadget.com)

2. Unlike Apple, Google Play (Android) doesn’t have walled garden App store to prevent malware infections

3. Loosen Developer’s Agreement always any malware writer to upload the their malicious app to Google Play

Page 8: Top mobile security threats

Android Malware Samples found till 2014

2011 - Nov

2012 - Jan Mar

May JulSe

pNov

2013 - Jan Mar

May JulSe

pNov

2014 - Jan

0

100000

200000

300000

400000

500000

600000

700000Malware

Malware

Page 9: Top mobile security threats

How a Malware writer or a Hacker is Benefited?

1. RamsonwareRestricts the system access of the user and asks for a ransom to access the files.

2. Fake AVDirects the User to the infected websites

3. Botney ActivityControls the IRC channel & sends email spam's

4. GinmasterSteals the confidential information of the user

` from the Smartphone

Page 10: Top mobile security threats

Top 10 discoveries on Android Malware

Android Malware

Andr/Boxer-D

Andr/Opfake-C

Andr/Fakelns-B

Andr/MTK-C

Andr/Fakelns-D

Andr/SMSSend-J

Andr/Opfake-H

Andr/Spy-L

Andr/Wkload-A

Other

Page 11: Top mobile security threats

PUAs – Are they harmful?

PUA doesn’t comes under the category of malware however, they’re Potentially Unwanted Applications which successful in Android Platform.

They too lead to security and other risks

Page 12: Top mobile security threats

Top Android PUAs Discovered

PUAs

Android Airpush

Android Adwo

Android Dowgin

Android Kuguo

Android Apperhand

Android Multi Ads

Android Apperhand

Android LeadBolt

Android Mmarket

Other

Page 13: Top mobile security threats

Malware Vs PUA Growth

2011 -...

2012 -...

MarMay Jul

Sep

Nov

2013 -...

MarMay Jul

Sep

Nov

2014 -...

0

100000

200000

300000

400000

500000

600000

700000

MalwarePUVs

Page 14: Top mobile security threats

Androids Security Measures in 2014

Android 4.3 detached the feature of automatically downloading the 3 party sources from Android Application Packet.

Strict Developer’s Agreement

Identification and Restriction of Several App

Page 15: Top mobile security threats

Mobile Malware Risks to Face this Year

Complexity of malware increasing for new victims

Danger for Personal Data

Additional security needed for financial organizations

1

2

3

Page 16: Top mobile security threats

Top 10 Tips on Preventing Mobile Malware

Mobile Risk Awareness

Say no to accessing Company data via Wi-Fi

BYOD Policies

Prevention of Jailbreaking

Up-to-date OS

Device Encryption

Fitting mobile security policies

Install apps only from trusted sources

Anti-malware installation

Alternatives for cloud-sharing