SlideShare a Scribd company logo
If you haven’t heard…
the world has gone mobile.
Attackers follow opportunity
Credit: Google
Data has been leaking for a while
Credit: Forbes
 Account logins & passwords
Email
VPN
Social networks
Banking & shopping
 Services / resources
Internet & VPN
Cellular
sms (premium charges)
 Documents
Email & attachments
File storage services
 Monitoring
Microphone
Camera
GPS/location
Mobile Device Data & Assets
 Communications Networks
Cellular
WIFI
Bluetooth
NFC
 Malicious Apps
 Physical Access
USB
SIM
Dock/Accessory Connector
Lock screen
 Other
QR Code
Attack Surface
Type complex words here
No Thanks
Malicious Pokemon Go app
Source: infosecuritynews. 15 sept 2016
Malicious apps in google play store
Source: infosecurity news , 16 sept 2016
Fake Android apps
Credit: AndroidCentral.com
Fake apple apps
• Hosted on Apple/Google stores, missed by reviews
• Jailbreak markets
• Third-party app stores
• Enterprise app stores & app distribution services
Malicious App Sources
Android sandbox & security layers
Credit: Google
QuadRooter
• Vulnerability exposes 900M devices
• Affects Qualcomm chipsets from manufacturers ranging from HTC to LG
to OnePlus to Google, which contracts with other makers for its own
Nexus devices.
• It’s serious; compromised devices would give bad actors root access,
meaning they could collect any data stored on the phone, control the
camera and microphone, and track its GPS location.
Mitigations:
• Prefer vendors that patch!
• Android: disable installation from unknown sources
• Stick to trusted app sources/markets
Data Theft via Physical Access
Malicious USB Chargers (“Juice Jacking”)
• Free power charging station is really an exploit host
USB Debug Access
• Commercial phones with ADB debugging access on by default
• Blu Dash 4.5 (Android 4.2.1)
• HTC One (original Android 4.1.2)
• ADB debugging access gives you shell access
Mitigations:
• Android: turn off ADB debugging
• Newest IOS, Android prompt you to trust the USB
connection
• MAM, EMM, VDI, containers add extra layer of data
security
Data Theft via WiFi Networks
Non-Secure HTTP Traffic
• Mobile devices & apps sends lots of plaintext traffic
- This is all observable, subject to MITM
• Interesting data seen in the clear
- Android device ID
- IMEI
- GPS lat/long
• MITM attack vectors
- Android webview javascript callback
- IOS SSL verification error
Mitigations:
• Purge old prior networks from mobile device wifi list
- Security apps can automate this
- Android: Bluebox Wifi Cleaner
• Turn off radios (Bluetooth, Wifi) when not using them
- Bonus: saves battery!
- Android: Kismet Smarter Wi-Fi Manager
• Use device VPN & app VPNs to protect traffic on untrusted networks
- Some capabilities exclusive to MAM, EMM, and containers
Going Forward
Fact:
More vulnerabilities will
continue
Challenge:
keep data safe;
Quick detection and recovery
THANK YOU
YOGESH RAUT

More Related Content

PDF
C0c0n 2011 mobile security presentation v1.2
PPT
How BYOD Will Shape Wireless Network Security in 2012
PPT
Smart phone and mobile device security
 
PDF
Dissecting internet of things by avinash sinha
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
PDF
CNIT 128 Ch 1: The mobile risk ecosystem
PPTX
Implementing Enterprise Wireless Security Policy in the BYOD Era
PPTX
Internet of Things (IoT) Security
C0c0n 2011 mobile security presentation v1.2
How BYOD Will Shape Wireless Network Security in 2012
Smart phone and mobile device security
 
Dissecting internet of things by avinash sinha
IoT Security Middleware: evaluating the threats and protecting against them
CNIT 128 Ch 1: The mobile risk ecosystem
Implementing Enterprise Wireless Security Policy in the BYOD Era
Internet of Things (IoT) Security

What's hot (20)

PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PPTX
Onboarding in the IoT
PPTX
Top 5 wi fi security threats
PPTX
Connecting The Real World With The Virtual World
PDF
NewsByte Mumbai October 2017
PDF
Mobile security - Intense overview
PPT
Identity-Defined Privacay & Security for Internet of Things
PPT
You Can't Spell Enterprise Security without MFA
PPTX
IoT Security Risks and Challenges
PDF
Security in the Internet of Things
PPTX
IDENTITY IN THE WORLD OF IOT
PDF
Mobile Security for Smartphones and Tablets
PPTX
IoT security presented in Ada's List Conference
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
CNIT 128 Ch 2: Hacking the cellular network
PDF
Youtube videos might hijack your phone
PDF
Managing Mobile Business Insecurities
PDF
Conquering the Minefield of Soft Rogue APs in the Enterprise
PPTX
IoT Security: Cases and Methods [CON5446]
PPTX
IoT based on cyber security in defense industry and critical infrastructures
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Onboarding in the IoT
Top 5 wi fi security threats
Connecting The Real World With The Virtual World
NewsByte Mumbai October 2017
Mobile security - Intense overview
Identity-Defined Privacay & Security for Internet of Things
You Can't Spell Enterprise Security without MFA
IoT Security Risks and Challenges
Security in the Internet of Things
IDENTITY IN THE WORLD OF IOT
Mobile Security for Smartphones and Tablets
IoT security presented in Ada's List Conference
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
CNIT 128 Ch 2: Hacking the cellular network
Youtube videos might hijack your phone
Managing Mobile Business Insecurities
Conquering the Minefield of Soft Rogue APs in the Enterprise
IoT Security: Cases and Methods [CON5446]
IoT based on cyber security in defense industry and critical infrastructures
Ad

Viewers also liked (20)

PPTX
EAN Partner Summit 2011: A theory of content strategy
PPTX
Bespak - Working with Business
PDF
Practical iOS App Security
PDF
09. traits of a trainer
PDF
Addressing extremism
PDF
Science Through Technical Understanding
PPTX
090408 Modeling
PPTX
Predictive Analytics
PPTX
Transforming Lives in Partnership - Ilgun Yusuf
PPTX
Research - Oral Presentation
PPTX
Safeguarding training
PDF
Assessing risk in sexting - FE
PDF
Government Data Exchange and Open Government Data Platform
PPT
Branding and communication
PPTX
Ev681 session 1 sue
PDF
Presentation brighton uni september 16 (3)
PPTX
Keeping Children Safe in Education 2016
PPTX
Safeguarding Children - Tallis CPD 2015
PPT
Streetscape & Urban Design Concept
EAN Partner Summit 2011: A theory of content strategy
Bespak - Working with Business
Practical iOS App Security
09. traits of a trainer
Addressing extremism
Science Through Technical Understanding
090408 Modeling
Predictive Analytics
Transforming Lives in Partnership - Ilgun Yusuf
Research - Oral Presentation
Safeguarding training
Assessing risk in sexting - FE
Government Data Exchange and Open Government Data Platform
Branding and communication
Ev681 session 1 sue
Presentation brighton uni september 16 (3)
Keeping Children Safe in Education 2016
Safeguarding Children - Tallis CPD 2015
Streetscape & Urban Design Concept
Ad

Similar to ANDROID SECURITY (20)

PDF
Info security - mobile approach
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
Securing hand held computing devices
PPT
Emerging Threats and Attack Surfaces
PDF
The New Mobile Landscape - OWASP Ireland
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PPTX
Ms810 assignment viruses and malware affecting moblie devices
PPT
The Consumerisation of Corporate IT
PDF
iScan Online - PCI DSS Mobile Task Force
PDF
AITP Presentation on Mobile Security
PPTX
CS_UNIT 2(P3).pptx
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PPTX
18-mobile-malware.pptx
ODP
Confraria Security & IT - Mobile Security
PPT
Lumension Security - Adjusting our defenses for 2012
PPTX
Defending Behind the Mobile Device
PDF
Social and Mobile and Cloud OH MY!
PDF
Mobile Defense-in-Dev (Depth)
PDF
Andrew Jaquith SOURCE Boston 2011
Info security - mobile approach
Can You Steal From Me Now? Mobile and BYOD Security Risks
Malware on Smartphones and Tablets - The Inconvenient Truth
Securing hand held computing devices
Emerging Threats and Attack Surfaces
The New Mobile Landscape - OWASP Ireland
ISACA CACS 2012 - Mobile Device Security and Privacy
Ms810 assignment viruses and malware affecting moblie devices
The Consumerisation of Corporate IT
iScan Online - PCI DSS Mobile Task Force
AITP Presentation on Mobile Security
CS_UNIT 2(P3).pptx
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
18-mobile-malware.pptx
Confraria Security & IT - Mobile Security
Lumension Security - Adjusting our defenses for 2012
Defending Behind the Mobile Device
Social and Mobile and Cloud OH MY!
Mobile Defense-in-Dev (Depth)
Andrew Jaquith SOURCE Boston 2011

Recently uploaded (20)

PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Cost to Outsource Software Development in 2025
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
history of c programming in notes for students .pptx
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Website Design Services for Small Businesses.pdf
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Cost to Outsource Software Development in 2025
iTop VPN Crack Latest Version Full Key 2025
Complete Guide to Website Development in Malaysia for SMEs
Wondershare Filmora 15 Crack With Activation Key [2025
history of c programming in notes for students .pptx
Download FL Studio Crack Latest version 2025 ?
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Monitoring Stack: Grafana, Loki & Promtail
Website Design Services for Small Businesses.pdf
Oracle Fusion HCM Cloud Demo for Beginners
CHAPTER 2 - PM Management and IT Context
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
AutoCAD Professional Crack 2025 With License Key
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Designing Intelligence for the Shop Floor.pdf
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency

ANDROID SECURITY

  • 1. If you haven’t heard… the world has gone mobile.
  • 3. Data has been leaking for a while Credit: Forbes
  • 4.  Account logins & passwords Email VPN Social networks Banking & shopping  Services / resources Internet & VPN Cellular sms (premium charges)  Documents Email & attachments File storage services  Monitoring Microphone Camera GPS/location Mobile Device Data & Assets
  • 5.  Communications Networks Cellular WIFI Bluetooth NFC  Malicious Apps  Physical Access USB SIM Dock/Accessory Connector Lock screen  Other QR Code Attack Surface
  • 6. Type complex words here No Thanks
  • 7. Malicious Pokemon Go app Source: infosecuritynews. 15 sept 2016
  • 8. Malicious apps in google play store Source: infosecurity news , 16 sept 2016
  • 9. Fake Android apps Credit: AndroidCentral.com
  • 11. • Hosted on Apple/Google stores, missed by reviews • Jailbreak markets • Third-party app stores • Enterprise app stores & app distribution services Malicious App Sources
  • 12. Android sandbox & security layers Credit: Google
  • 13. QuadRooter • Vulnerability exposes 900M devices • Affects Qualcomm chipsets from manufacturers ranging from HTC to LG to OnePlus to Google, which contracts with other makers for its own Nexus devices. • It’s serious; compromised devices would give bad actors root access, meaning they could collect any data stored on the phone, control the camera and microphone, and track its GPS location.
  • 14. Mitigations: • Prefer vendors that patch! • Android: disable installation from unknown sources • Stick to trusted app sources/markets
  • 15. Data Theft via Physical Access Malicious USB Chargers (“Juice Jacking”) • Free power charging station is really an exploit host
  • 16. USB Debug Access • Commercial phones with ADB debugging access on by default • Blu Dash 4.5 (Android 4.2.1) • HTC One (original Android 4.1.2) • ADB debugging access gives you shell access
  • 17. Mitigations: • Android: turn off ADB debugging • Newest IOS, Android prompt you to trust the USB connection • MAM, EMM, VDI, containers add extra layer of data security
  • 18. Data Theft via WiFi Networks Non-Secure HTTP Traffic • Mobile devices & apps sends lots of plaintext traffic - This is all observable, subject to MITM • Interesting data seen in the clear - Android device ID - IMEI - GPS lat/long • MITM attack vectors - Android webview javascript callback - IOS SSL verification error
  • 19. Mitigations: • Purge old prior networks from mobile device wifi list - Security apps can automate this - Android: Bluebox Wifi Cleaner • Turn off radios (Bluetooth, Wifi) when not using them - Bonus: saves battery! - Android: Kismet Smarter Wi-Fi Manager • Use device VPN & app VPNs to protect traffic on untrusted networks - Some capabilities exclusive to MAM, EMM, and containers
  • 20. Going Forward Fact: More vulnerabilities will continue Challenge: keep data safe; Quick detection and recovery

Editor's Notes

  • #8: Researchers have discovered a rogue Pokémon Go app on the Google Play Store that has been downloaded over 500,000 times, and infected over 6,000 Android smartphones. The app, called Guide for Pokémon Go, can seize root access rights on Android devices and use that power to install and uninstall apps and display unwanted adverts. It was first discovered by researchers at Kaspersky Lab, who notified Google. The app has now been removed from the Play Store.
  • #9: This data includes: The user’s contacts, including name, phone number, email, and times contacted; all user accounts on a compromised device; precise location, including latitude, longitude, network ID, and location area code; free internal and external memory; Device IMEI, IMSI, MCC, MNC, phone type, network operator, device and Android information; and details of installed packages, Lookout researchers outlined in a blog.
  • #14: It’s like giving someone the keys to your house, then holding the door open for them while they make off with the jewels.
  • #18: Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. MDM MDM stands for mobile device management and consists of configuration and policy management tools that are implemented using application programming interfaces (APIs) released by mobile operating system providers such as Apple, Google and Microsoft to control and manage mobile devices. The typical functionality of an MDM software includes: Hardware and application inventory Configuration of security policies such as password policy, device encryption, WiFi settings, detection of jailbroken devices and so forth Execution of actions such as partial or remote wipe, remote lock, device location mapping and passcode clearing Access to self-service portals to enable users to protect personal and enterprise data MAM MAM stands for mobile application management software, which can apply policy controls to and provision mobile applications, both internally developed apps and apps that are commercially available in stores such as the Apple App Store and Google Play. MAM solutions usually have an enterprise app store that enables application control and delivery to mobile devices. MAM solutions provide control over mobile applications either through app wrapping or the use of a software development kit (SDK). EMM EMM stands for enterprise mobile management and typically consists of the following capabilities: Mobile device management Mobile application management Mobile content management Mobile content management products provide a secure container that enables enterprise data to be secured while preserving the mobile experience on the mobile device, whether it’s corporate supplied or employee owned. Users can access their email, contacts, calendars, apps, documents and web browsing from within the secure container installed on their mobile device.