SlideShare a Scribd company logo
SESSION	ID:SESSION	ID:
#RSAC
Yair Amit
Mobile	Containers—The	Good,	the	Bad	
and	the	Ugly
HT-F03
CTO	&	Co-Founder
Skycure
@YairAmit
Adi	Sharabani
CEO	&	Co-Founder
Skycure
@AdiSharabani
#RSAC
Agenda
2
Containers
The	Good
Inherent	Limitations
Android	for	Work
App	in	the	Middle
Demos
Summary	&	Recommendations
#RSAC
Sandboxing	in	Modern	OS
3
Source:	developer.apple.com
#RSAC
Containers
Another	layer	of	separation
Attempts	to	restrain	the	risk
#RSAC
Types	of	Containers
OS-Level	ContainersApp-Based	Containers
Not	available	for	iOS
Narrowed	app-
selection
Limitations
with	iOS
Enhanced	Security	(encrypting	data	in	motion	&	data	at	rest)
Separation	of	Duties	(Providing	IT	policy	on	business	persona)
Better	user	experience
Susceptible	to	kernel	exploits
Tedious	upgrade	process
SDK Wrapping
#RSAC
Containers
Breaking	Container	Security	in	the	Wild
#RSAC
Jailbreaking/Rooting
Common	Jailbreak Detections
• Existence	of	directories/files
• fileExistsAtPath(“/bin/sh”)
• fopen(“/Applications/Cydia.app”,”r”)
• Directory	permissions
• statfs()
• Process	Forking
• fork()>=0
• Cydia scheme	detection
• Check	if	cydia://	is	callable
• Prohibited	commands
• system()==1
Attacks	are much	more	sophisticated
Library	1
Library	2
fopen
“LegitLib.dylib”
Library	3
fopen impl.
Fake	fopen impl.
#RSAC
Malicious	Profiles
Reported	to	Apple	on	March	17,	2013
Problem:	
Attackers	lure	victims	to	install	rogue	root	CAs
Ramifications:
Victim’s	traffic	analyzed	and	seamlessly	decrypted
Some	containers	are	still	impacted!
Solution:	
Certificate	Pinning
Hard	to	be	properly	implemented	in	a	generic	manner
#RSAC
Containers
Breaking	Container	Separation	of	Duties	in	the	Wild
#RSAC
Android	for	Work
Review
10
#RSAC
Android	for	Work
11
Personal	Persona
Business	Persona
Malware
Hacker	Terminal
Android	for	
Work
The	Premise:
Privacy:	Enterprise	IT	do	not	have	access
to	the	personal	space
Security:	Apps	in	the	personal	profile	cannot	
access	or	manipulate	business	activity
#RSAC
Android	for	Work
Where	does	it	break?
#RSAC
The	Main	Problem
13
While	there	are	two	personas,	
there	is	only	one	screen
One	screen	==	employee	satisfaction
One	screen	==	hacker	satisfaction
#RSAC
Android	for	Work	uses
one	screen
with
one	Notification	system
14
#RSAC
App	in	the	Middle	Flow
Leveraging	Notification	Features
Personal	Persona Business	Persona
Malicious	app	uses	the	notification	service:	
BIND_NOTIFICATION_LISTENER_SERVICE
Malicious	app	can	access	
business	notifications
Malicious	app	transmits	
data	to	a	remote	server
Emails,	meetings,	etc – compromised
Reset	password	link	– compromised
Malicious	app	can	trigger	quick	
actions	on	notifications
C&C	Server
App	in	the	Middle
#RSAC
Demonstration
#RSAC
Android	for	Work	uses
one	screen
with
one	Accessibility	system
17
#RSAC
Security	Implications	of	Accessibility	Features
18
Accessibility	frameworks	are	traditionally	good	source	of	trouble:
2007	– Windows	Vista	speech	recognition	exploit
2013	– Siri	allows	to	bypass	iPhone	lock	screen
2014	– Siri	Lets	Anyone	Bypass	Your	iPhone's	Lockscreen -- Feature	or	Bug?
2015 – iOS	9	allows	access	to	photos	and	contacts	on	a	passcode	locked	iPhone
2016	– Accessibility	clickjacking
Android	Accessibility	Framework
✓ Has	full	access	to	content	in	other	apps	(e.g.	read	emails)
✓ Ability	to	monitor	user	activity	and	take	actions	accordingly
Accessibility	services	are	global	and	shared	between	personas!
#RSAC
App	in	the	Middle	Flow
Leveraging	Accessibility	Features
Personal	Persona Business	Persona
User	enables	accessibility	features
(social	engineering,	tapjacking)
Business	activity	captured	
by	the	malicious	app
Malicious	app	transmits	
data	to	a	remote	server
Full	access	(read	&	write)	
No	indication	to	administrator
Two	factor	authentication	– essentially	broken
Malicious	app	performs	actions	
on	the	business	persona
C&C	Server
Different	technology	&	attack,	
same	App	in	the	Middle	concept
#RSAC
Demonstration
#RSAC
Disclosure
21
Reported	to	Google	on	December	21,	2016
Notification	AitM Attack:
— Google	identified	the	behavior	as	intended
Accessibility	AitM Attack:
— Google	identified	the	behavior	as	intended
— Google	recommended	using	this	following	method:
setPermittedAccessibilityServices(…,	List<String>	packageNames)
¡ Whitelists	approved	Accessibility	Services
— We’ve	outreached	leading	EMMs	to	make	sure	they	implement	this	API
#RSAC
Caveats
22
setPermittedAccessibilityServices(…,	List<String>	packageNames)
Sounds	good,	but…
Whitelisting	based	on	a	list	of	Strings	is	weak
— Malware	can	easily	name	itself	as	a	whitelisted	service
From	the	documentation:
Practically,	existence	of	such	a	service	on	the	device	breaks	the	model
#RSAC
App	in	the	Middle
Getting	users	to	grant	permissions
23
#RSAC
Allow	permissions
Social	engineering
24
Users	are	led	to	allow	the	permission	for	seemingly	
good	reasons
Notification	API	examples:
Mirroring	notifications
Unifying	notifications
Accessibility	API	examples:
Text	to	speech	(for	visually	impaired	users)
Translation	services
#RSAC
Allow	permissions
Accessibility	clickjacking
25
Introduced	by	Skycure on	RSA	16’
Victims	can	be	tricked	to	perform	actions	without	their	
knowledge	or	consent
A	tribute	to	Web-Application	security
Should	actually	be	called	“Accessibility	Tapjacking”		
Evolving	research	(Android	4	à 5	à 6+)
#RSAC
A	Few	Benign	Features
26
Draw	Over	Apps
Can	be	presented	on	top	of	other	apps
—SYSTEM_ALERT_WINDOW
Can	be	used	to	pass	touch	events	to	
underlying	apps
—FLAG_NOT_FOCUSABLE
Accessibility	APIs
#RSAC
…	Can	Be	Dangerous	Together
27
Victims	can	be	tricked	to	
perform	actions	without	
their	knowledge
https://youtu.be/4cSRq7_Z26s
#RSAC
What	About	Android	5?
28
Original	technique	
was	believed	to	
extend	till	KitKat
Lollipop	introduced	
an	extra	protection
Tap	propagation	was	
not	allowed	for	the	
“OK”	button.	A	direct	
tap	is	required.
That	is	not	enough…
#RSAC
What	about	Android	6.0+?
Draw	Over	Apps	approval	has	to	be	
done	manually.
Tapjacking is	still	possible:
Full	&	indirect	ramifications	of	approving	
the	permission	are	not	clear	to	the	user
Malware	has	to	lure	the	victim	to	approve	
the	DrawOverApps permission
#RSAC
App	in	the	Middle
Summary
30
#RSAC
App	in	The	Middle	
31
App	in	the	Middle	(AitM)	bridges	access	between	remote	attacker	and	
sensitive	apps
The	two	reported	issues	utilize	key	Android	capabilities	to	break	the	
secure	separation	model	of	Android	for	Work
Security	vs.	user-experience	
The	framework	should	provide	improved	protection	against	AitM
#RSAC
Apply	What	You	Have	Learned	Today
32
Next	week	you	should:
Identify	who	is	in	charge	of	your	corporate	moblie security,	and	
make	sure	they	are	aware	of	threats	such	as	App	in	the	Middle
In	the	first	three	months	following	this	presentation	you	should:
Learn	more	about	advanced	mobile	threats
Understand	your	Mobile	Threat	Landscape	
(Malware,	Network	Threats,	Vulnerability	Exploitation	and	Physical	access)
Gartner,	Frost	&	Sullivan,	SANS	and	others	have	great	papers	on	the	subject	
Within	six	months	you	should:
Select	and	deploy	a	Mobile	Threat	Defense	(MTD)	solution	to	proactively	protect	
and	gain	full	visibility	into	your	mobile	threats
#RSAC
READ	MORE
https://www.skycure.com/blog/app-in-the-middle

More Related Content

PDF
Expert mobility managing wi-fi wearables sensors iot for availability quality...
PPTX
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
PDF
IoT Testing Services- Uncover All Critical Issues
PDF
IoT Testing by Robins Abraham
PDF
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
PPTX
IoT Panel, Part II: Security for Silicon, Software, and Sensors
PDF
SnW: Internet of Things and enabling technologies
PPTX
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
Expert mobility managing wi-fi wearables sensors iot for availability quality...
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT Testing Services- Uncover All Critical Issues
IoT Testing by Robins Abraham
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
IoT Panel, Part II: Security for Silicon, Software, and Sensors
SnW: Internet of Things and enabling technologies
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors

What's hot (20)

PDF
TOP 6 Security Challenges of Internet of Things
PPTX
Internet of things architecture perspective - IndicThreads Conference
PPTX
IoT Security Risks and Challenges
ODP
Internet Of Things
PDF
Internet of Things: Challenges and Issues
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
Understanding the Internet of Things Protocols
PDF
Atagg2015 iot internet of things - get ready to test the connected future ata...
PDF
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
PPTX
Internet of things –
PDF
IoT Introduction Architecture and Applications
PPTX
Securing Internet of Things
PDF
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
PDF
IoT Security Challenges and Solutions
PPTX
Keynote Session : Internet Of Things (IOT) Security Taskforce
PDF
Will Internet of Things (IoT) be secure enough?
PDF
The Internet of Things is Here: Implementing IoT in Your Facility
PDF
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
PPTX
Practical IoT Security in the Enterprise
PPTX
Presentation on IOT (Internet Of Things)
TOP 6 Security Challenges of Internet of Things
Internet of things architecture perspective - IndicThreads Conference
IoT Security Risks and Challenges
Internet Of Things
Internet of Things: Challenges and Issues
A survey in privacy and security in Internet of Things IOT
Understanding the Internet of Things Protocols
Atagg2015 iot internet of things - get ready to test the connected future ata...
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
Internet of things –
IoT Introduction Architecture and Applications
Securing Internet of Things
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
IoT Security Challenges and Solutions
Keynote Session : Internet Of Things (IOT) Security Taskforce
Will Internet of Things (IoT) be secure enough?
The Internet of Things is Here: Implementing IoT in Your Facility
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
Practical IoT Security in the Enterprise
Presentation on IOT (Internet Of Things)
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Ad

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation

Mobile containers - The good, the bad and the ugly