02/22/17 Prepared By:ANSHU VASHISTH 1
Trends in Mobility:
Mobile computing era- 3G, 4G, VoLTE
I phone from Apple
Google - Android
02/22/17 Prepared By:ANSHU VASHISTH 2
02/22/17 Prepared By:ANSHU VASHISTH 3
Attack Against 3G mobile network:
1. Malware, virus and worms-
Skull Trojan- target series 60 phones equipped with Symbian mobile OS.
Cabir Worm- First worm for phone and scan mobile device to send copy of data.
Brador Tojan- affects Window OS by creating svchost.exe file in the window start-up
folder which allow full control of device.
2. DoS:
02/22/17 Prepared By:ANSHU VASHISTH 4
3. Overbilling Attack:
Hijacking subscriber IP address to download paid things for Which legitimate user
charged.
4. Spoofed Policy Development Process:
Exploit vulnerabilities in GPRS
5. Signaling- level attacks:
Attack on system which use VoIP
02/22/17 Prepared By:ANSHU VASHISTH 5
Attacks on Mobile/Cell Phones:
1. Mobile Phone Theft:
Reason of Attack on Mobile Device:
Frequent use by person
Enough functionality
Enough Connectivity
02/22/17 Prepared By:ANSHU VASHISTH 6
2. Mobile Viruses:
40 Virus family with 300+ mobile virus
XALAN is a virus which erase yours IMEI and IMSI no due to which new
phone will be disconnected from network.
Motorola and Nokia confirmed this attack and infected 3 Million mobile
phone in the world
02/22/17 Prepared By:ANSHU VASHISTH 7
3. Mishing:
Combination of mobile phone and phishing.
Use of mobile phones for online action like shopping and transaction can
be more vulnerable to Mishing.
When attacker use call termed as Vishing.
When use SMS termed as Smishing.
02/22/17 Prepared By:ANSHU VASHISTH 8
4. Vishing:
Most common information gained through Vishing:
ID theft
Purchasing luxury good s and service
Transferring money/funds
Monitoring the victims bank account
Making applications for loans and credit cards (Steel credit card number)
02/22/17 Prepared By:ANSHU VASHISTH 9
How Vishing works?
Through e-mail, Voicemail, Direct phone call.
How to protect from Vishing Attacks?
Report Incident, Do not give your personal information
02/22/17 Prepared By:ANSHU VASHISTH 10
5. Smishing:
Combination of SMS and phishing.
Send message to victim and ask to click on link that is actually fake and PI will be
sent to attacker.
How Smishing works?
02/22/17 Prepared By:ANSHU VASHISTH 11
How to Protect from Smishing Attacks:
Do not answer the text message.
Never click on link given in message.
Never call those number which are mentioned in Message
02/22/17 Prepared By:ANSHU VASHISTH 12
6. Hacking Bluetooth:
Bluetooth is an open wireless technology.
Tools which are installed on laptop and can scan nearby device.
Can get your photos, contacts and SIM card details.
Works on 2.4GHz frequency with 3Mbps speed (BLUETOOTH 2.0).
Common used tools are BlueBugger, BlueDiving etc.
02/22/17 Prepared By:ANSHU VASHISTH 13
Attacks on Bluetooth Security:
1. Bluejacking- means Bluetooth + jacking: Sending messages like visiting
card with Bluetooth enabled device
2. Bluesnaring: Unauthorized access through Bluetooth to gain the access of e-
mails, calendar, SMS etc.
3. Bluebugging: allow attacker to remotely login to nearby Bluetooth device
without user attention.
4. Car Whisperer: Piece of software allow attacker to send audio and receive
audio from Bluetooth enabled device and could do any serious task link disabling
airbags or break etc.
Research is going on that can attacker can access Phone book through this
attack.

More Related Content

DOCX
Pegasus
PDF
What is a Mobile Threat?
PPTX
Mobile security
PDF
Smartphone Ownage: The state of mobile botnets and rootkits
PPTX
Surf smart
 
PDF
Mobile Security
PDF
Malicious android-applications-risks-exploitation 33578
Pegasus
What is a Mobile Threat?
Mobile security
Smartphone Ownage: The state of mobile botnets and rootkits
Surf smart
 
Mobile Security
Malicious android-applications-risks-exploitation 33578

What's hot (19)

PPTX
mSpy Review - Android Keylogger
PPTX
Cyber warfare
PPTX
What’s in your computer
PDF
Global Botnet Detector
PDF
UNDERSTANDING HACKING
PPTX
Cyber crime and security threads
PPTX
Internet Security IT
PDF
What is wanna cry ransomware attack
PPTX
2 2 the dangers of computer crime
PDF
Newsbyte
DOCX
What is Malware?
PPTX
Botnets
PPTX
yoda at rotary_pune_club
PPTX
Cyber security
PPT
Wannacry-A Ransomware Attack
PPTX
Ethical hacking
PPTX
Nanu
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PPTX
Underground malware economy
mSpy Review - Android Keylogger
Cyber warfare
What’s in your computer
Global Botnet Detector
UNDERSTANDING HACKING
Cyber crime and security threads
Internet Security IT
What is wanna cry ransomware attack
2 2 the dangers of computer crime
Newsbyte
What is Malware?
Botnets
yoda at rotary_pune_club
Cyber security
Wannacry-A Ransomware Attack
Ethical hacking
Nanu
Class 11 ca chapter 17 computer ethics and cyber crime
Underground malware economy
Ad

Viewers also liked (20)

PPTX
Discriminacion de la homosexualidad en Mexico 2016
PDF
7 Awesomely Techie Jobs
PPTX
Trabajo segundo a
PPTX
Sanchez y chicaiza
PPTX
Correo Electronico.
PPTX
Diapositivas pptxaborto-091108182713-phpapp02
PPTX
Pobreza en méxico
PDF
Lindsey-Thomas
PPTX
Exposición2
PPTX
How to become a successful actor
PPTX
Instant cash money transfer in ndia
PPTX
Correo Electronico.
PDF
Manual de orden_cerrado15
PPTX
La Naturaleza.
PPSX
Rodrigo loramúsica(2)
PPT
Although though eventhough
Discriminacion de la homosexualidad en Mexico 2016
7 Awesomely Techie Jobs
Trabajo segundo a
Sanchez y chicaiza
Correo Electronico.
Diapositivas pptxaborto-091108182713-phpapp02
Pobreza en méxico
Lindsey-Thomas
Exposición2
How to become a successful actor
Instant cash money transfer in ndia
Correo Electronico.
Manual de orden_cerrado15
La Naturaleza.
Rodrigo loramúsica(2)
Although though eventhough
Ad

Similar to Int509 lec 7-8 (20)

PPTX
Cp3201 mobile security final
DOCX
Report of android hacking
PDF
P01761113118
DOCX
Smart Phone Security
PDF
“Design and Detection of Mobile Botnet Attacks”
PPTX
Treads to mobile network
PPTX
Computer and network security
ODP
Mobile security 8soft_final_summercamp2011
PDF
BLURRING BOUNDARIES
PDF
Security issues vs user awareness in mobile devices a survey
DOCX
HinDroid
PDF
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
PDF
L017326972
PDF
Hacking 04 2011
DOCX
8 threats that even antivirus cannot catch
PDF
RSA Monthly Online Fraud Report -- February 2014
 
PDF
The Current State of Cybercrime 2014
 
PPT
Information security in todays world
PPTX
Smartphone
Cp3201 mobile security final
Report of android hacking
P01761113118
Smart Phone Security
“Design and Detection of Mobile Botnet Attacks”
Treads to mobile network
Computer and network security
Mobile security 8soft_final_summercamp2011
BLURRING BOUNDARIES
Security issues vs user awareness in mobile devices a survey
HinDroid
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
L017326972
Hacking 04 2011
8 threats that even antivirus cannot catch
RSA Monthly Online Fraud Report -- February 2014
 
The Current State of Cybercrime 2014
 
Information security in todays world
Smartphone

Recently uploaded (20)

PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
introduction to high performance computing
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
Current and future trends in Computer Vision.pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Software Engineering and software moduleing
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
737-MAX_SRG.pdf student reference guides
PPT
Total quality management ppt for engineering students
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Soil Improvement Techniques Note - Rabbi
introduction to high performance computing
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Current and future trends in Computer Vision.pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Software Engineering and software moduleing
Amdahl’s law is explained in the above power point presentations
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
737-MAX_SRG.pdf student reference guides
Total quality management ppt for engineering students
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...

Int509 lec 7-8

  • 1. 02/22/17 Prepared By:ANSHU VASHISTH 1 Trends in Mobility: Mobile computing era- 3G, 4G, VoLTE I phone from Apple Google - Android
  • 3. 02/22/17 Prepared By:ANSHU VASHISTH 3 Attack Against 3G mobile network: 1. Malware, virus and worms- Skull Trojan- target series 60 phones equipped with Symbian mobile OS. Cabir Worm- First worm for phone and scan mobile device to send copy of data. Brador Tojan- affects Window OS by creating svchost.exe file in the window start-up folder which allow full control of device. 2. DoS:
  • 4. 02/22/17 Prepared By:ANSHU VASHISTH 4 3. Overbilling Attack: Hijacking subscriber IP address to download paid things for Which legitimate user charged. 4. Spoofed Policy Development Process: Exploit vulnerabilities in GPRS 5. Signaling- level attacks: Attack on system which use VoIP
  • 5. 02/22/17 Prepared By:ANSHU VASHISTH 5 Attacks on Mobile/Cell Phones: 1. Mobile Phone Theft: Reason of Attack on Mobile Device: Frequent use by person Enough functionality Enough Connectivity
  • 6. 02/22/17 Prepared By:ANSHU VASHISTH 6 2. Mobile Viruses: 40 Virus family with 300+ mobile virus XALAN is a virus which erase yours IMEI and IMSI no due to which new phone will be disconnected from network. Motorola and Nokia confirmed this attack and infected 3 Million mobile phone in the world
  • 7. 02/22/17 Prepared By:ANSHU VASHISTH 7 3. Mishing: Combination of mobile phone and phishing. Use of mobile phones for online action like shopping and transaction can be more vulnerable to Mishing. When attacker use call termed as Vishing. When use SMS termed as Smishing.
  • 8. 02/22/17 Prepared By:ANSHU VASHISTH 8 4. Vishing: Most common information gained through Vishing: ID theft Purchasing luxury good s and service Transferring money/funds Monitoring the victims bank account Making applications for loans and credit cards (Steel credit card number)
  • 9. 02/22/17 Prepared By:ANSHU VASHISTH 9 How Vishing works? Through e-mail, Voicemail, Direct phone call. How to protect from Vishing Attacks? Report Incident, Do not give your personal information
  • 10. 02/22/17 Prepared By:ANSHU VASHISTH 10 5. Smishing: Combination of SMS and phishing. Send message to victim and ask to click on link that is actually fake and PI will be sent to attacker. How Smishing works?
  • 11. 02/22/17 Prepared By:ANSHU VASHISTH 11 How to Protect from Smishing Attacks: Do not answer the text message. Never click on link given in message. Never call those number which are mentioned in Message
  • 12. 02/22/17 Prepared By:ANSHU VASHISTH 12 6. Hacking Bluetooth: Bluetooth is an open wireless technology. Tools which are installed on laptop and can scan nearby device. Can get your photos, contacts and SIM card details. Works on 2.4GHz frequency with 3Mbps speed (BLUETOOTH 2.0). Common used tools are BlueBugger, BlueDiving etc.
  • 13. 02/22/17 Prepared By:ANSHU VASHISTH 13 Attacks on Bluetooth Security: 1. Bluejacking- means Bluetooth + jacking: Sending messages like visiting card with Bluetooth enabled device 2. Bluesnaring: Unauthorized access through Bluetooth to gain the access of e- mails, calendar, SMS etc. 3. Bluebugging: allow attacker to remotely login to nearby Bluetooth device without user attention. 4. Car Whisperer: Piece of software allow attacker to send audio and receive audio from Bluetooth enabled device and could do any serious task link disabling airbags or break etc. Research is going on that can attacker can access Phone book through this attack.