SlideShare a Scribd company logo
#ACAD-­‐CSIRT	
  
Mobile Security, Mobile
Malware & Countermeasure
IGN Mantra, Chairman
Email: mantra@acad-csirt.or.id, URL: acad-csirt.or.id
Honeynet Seminar 2013
#ACAD-­‐CSIRT	
  
MOBILE TRENDS
#ACAD-­‐CSIRT	
  
Why the mobile phone BOOM
#ACAD-­‐CSIRT	
  
The complex picture of the mobile phone market
But mobile phone market share doesn’t tell the full story
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Smartphones reached 30% market share in 2011
483M units shipped worldwide
Smartphone shipments as a % of total handset shipments
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Smartphone sales vary greatly by region Q2 2011
are the majority of handset sales in North America (63%) and Europe (51%)
Market share
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Android became dominant smartphone OS
Samsung and HTC benefited the most from Android success (Q4 2011)
Smartphone market share by OEM and platform (H2 2011)
Source: VisionMobile
#ACAD-­‐CSIRT	
  
Android turned the tables on handset makers
Samsung and HTC benefited, Nokia, Motorola, Sony were challenged
Beneficiaries:
fast-moving challengers
Efficient cost structure plus ability to differentiate
in software, hardware or both
low cost assemblers
Cost structure optimised for razor-thin margins
Android is a long-term opportunity for global reach
Under pressure:
old guard OEMs
Cost structure requiring high-margins
Commoditising effect of Android makes high-
margins unattainable for OEM without own
ecosystem or meaningful differentiation
No Name source: VisionMobile
#ACAD-­‐CSIRT	
  
MOBILE MALWARE
#ACAD-­‐CSIRT	
  
10 Malware Types 2013
source : boston.com
Droid
KungFu
Geinimi
Plankton Droid
Dream
Android.
Pjapps
Ikee
Zitmo
Hong
TouTou
Timifonica
SymbOS.
Skull
#ACAD-­‐CSIRT	
  
Mobile Malware Statistic 2013
Source : Kaspersky Lab
#ACAD-­‐CSIRT	
  
Mobile Malware
Malware is software with
malicious purpose. It may be
designed to disable your phone,
remotely control your phone, or
steal valueable your information.
Mobile malware uses the same
techniques as a PC malware to
infect mobile devices.
app
pc
#ACAD-­‐CSIRT	
  
The Growth
#ACAD-­‐CSIRT	
  
Malware Samples Library
Source : http://rogunix.com/docs/Android/Malware/
#ACAD-­‐CSIRT	
  
The Real Dangers of Mobile Malware
Bank account
password are
stolen.
Private information
is captured.
Phone data is
deleted.
Device is “bricked”
and need replacing
The phone is
forced to send the
sms premium
numbers. (sedot
pulsa).
Malware infected
devices can be used
by botnet owners to
launch attacks on
digital targets.
#ACAD-­‐CSIRT	
  
How they get you
PHISING
A fake version of real site
gathers your log-in ad other
private informations
SPYWARE
Silently collects information
from users and sends it to
eavesdroppers
EXPLOITING
Some malware will exploit
mobile platform vulnerabilities to
gain control of the device
WORM
A program tha replicates itself
spreading throughout a network
MAN IN THE MIDDLE
The attackers becomes a
middle man in a communication
stream and logs all information
relayed between the
communicating parties
DIRECT ATTACK
Comes from files or viruses sent
right to your cell phone.
#ACAD-­‐CSIRT	
  
PROTECT MOBILE DEVICE
#ACAD-­‐CSIRT	
  
Mobile Malware & Awareness
Of users say that they
are unaware of
security software for
smartphones
Of mobile users bank
from a phone, yet most
don’t have security
measures in place
53%
24%
#ACAD-­‐CSIRT	
  
What should You Do and Don’t
DO
•  Make sure the OS and sowftware are
up to date at all times
•  Download apps from reputable sites
and closely review app permission
requests.
•  Make sure to check the feedback
from other users before installing the
program from an app store
•  User strong password
•  User personal firewall
•  Turn off bluetooth and other
connections when not in use
•  Install a mobile security application.
DON’T
•  Download apps from third
party app repositories
•  Jailbreak your phone
•  Leave your “wifi ad hoc
mode on”
•  Accessing banking or
shopping sites over a public
WIFI connection
•  Leave your mobile device
unattended in public places.
#ACAD-­‐CSIRT	
  
References
•  A window into Mobile device security
–  http://www.symantec.com/content/en/us/about/media/pdfs/
symc_mobile_device_security_june2011.pdf
•  http://www.continuitycentral.com/feature0919.html
•  http://www.usatoday.com/tech/news/story/2012-03-22/
lost-phones/53707448/1]
•  US-CERT Resource: Paul Ruggiero and Jon Foote,
“Cyber Threats to Mobile Phones”, http://www.us-
cert.gov/reading_room/
cyber_threats_to_mobile_phones.pdf)
•  Top 10 android Security Riskshttp://
www.esecurityplanet.com/views/article.php/3928646/
Top-10-Android-Security-Risks.htm
#ACAD-­‐CSIRT	
  
TERIMA KASIH
IGN MANTRA
Email : incident@acad-csirt.or.id, info@acad-csirt.or.id

More Related Content

PPTX
Tips and Tricks on Securing your Android Devices
PPTX
Mobile changes everything, no one is safe
PPTX
Securing hand held computing devices
PPTX
cell phone viruses and security
PPT
Smart phone and mobile device security
 
PDF
Mobile Security 101
PDF
The New NotCompatible
PDF
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Tips and Tricks on Securing your Android Devices
Mobile changes everything, no one is safe
Securing hand held computing devices
cell phone viruses and security
Smart phone and mobile device security
 
Mobile Security 101
The New NotCompatible
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...

What's hot (19)

PPT
Cell Phone Viruses & Security
PDF
BETTER- Threat Whitepaper- PoS
PPTX
Mobile Security
PPTX
Mobile security
PDF
Mobile security - Intense overview
PPT
cellphone virus and security
PDF
Samsung KNOX for Dummies
PPTX
T.A.S.C - mobile device secuirty
PDF
A Survey on Communication for Smartphone
PPTX
CS Mobile - Lyckad Mobilstrategi
PDF
Techvorm com-android-security-issues-solutions
PPTX
Communication gadgets and technology
PDF
C0c0n 2011 mobile security presentation v1.2
PPT
Mobilecomputings07
PDF
Wearables show march 2015
PDF
Mobile Security for Smartphones and Tablets
PDF
You can wear it!
PDF
Surfing Safe on the Road
PDF
Securing Mobile Apps - Appfest Version
Cell Phone Viruses & Security
BETTER- Threat Whitepaper- PoS
Mobile Security
Mobile security
Mobile security - Intense overview
cellphone virus and security
Samsung KNOX for Dummies
T.A.S.C - mobile device secuirty
A Survey on Communication for Smartphone
CS Mobile - Lyckad Mobilstrategi
Techvorm com-android-security-issues-solutions
Communication gadgets and technology
C0c0n 2011 mobile security presentation v1.2
Mobilecomputings07
Wearables show march 2015
Mobile Security for Smartphones and Tablets
You can wear it!
Surfing Safe on the Road
Securing Mobile Apps - Appfest Version
Ad

Viewers also liked (10)

PPTX
Attackers Vs. Defenders: Restoring the Equilibrium
PPT
Malicious
PPTX
Concepts of Malicious Windows Programs
PPTX
Malicious Software
PDF
Malicious software
PPT
Lecture 12 malicious software
PPT
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Practical Malware Analysis: Ch 15: Anti-Disassembly
PPT
Malicious software
Attackers Vs. Defenders: Restoring the Equilibrium
Malicious
Concepts of Malicious Windows Programs
Malicious Software
Malicious software
Lecture 12 malicious software
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 15: Anti-Disassembly
Malicious software
Ad

Similar to Mobile security mobile malware countermeasure academic csirt (20)

PPTX
Smartphone
PDF
Article on Mobile Security
PPT
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
PPTX
Ms810 assignment viruses and malware affecting moblie devices
PPT
Lumension Security - Adjusting our defenses for 2012
PDF
10940 img sytr12_mobile_malware
PDF
Mobile security article
PDF
Mobile Malware
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
WEEK5 Mobile Device Security 31032022.pdf
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
PDF
Malware detection techniques for mobile devices
PDF
Droidcon2013 security genes_trendmicro
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PDF
Rpt repeating-history
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PDF
2012 nq mobile_security_report
PDF
CNIT 128 5: Mobile malware
PDF
Mobile threat report_q3_2013
Smartphone
Article on Mobile Security
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Ms810 assignment viruses and malware affecting moblie devices
Lumension Security - Adjusting our defenses for 2012
10940 img sytr12_mobile_malware
Mobile security article
Mobile Malware
Can You Steal From Me Now? Mobile and BYOD Security Risks
WEEK5 Mobile Device Security 31032022.pdf
ISACA CACS 2012 - Mobile Device Security and Privacy
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
Malware detection techniques for mobile devices
Droidcon2013 security genes_trendmicro
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Rpt repeating-history
Malware on Smartphones and Tablets - The Inconvenient Truth
2012 nq mobile_security_report
CNIT 128 5: Mobile malware
Mobile threat report_q3_2013

More from IGN MANTRA (20)

PDF
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
PDF
Acad csirt cyber security rtik bali 22 july 2020
PDF
Ign mantra ppt menulis artikel dan buku ict
PDF
2020 07-16 aspek security n hukum cctv-ign mantra
PDF
2020 07-16 data security lokal-internet it up pancasila
PDF
2020 07-02 cyber crime n data security-ign mantra
PDF
2020 06-30 cyber security kbk kkni aptikom-ign mantra
PDF
2020 06-20 data security lokal-internet ngampooz
PDF
2020 06-22 cyber security career competence-iaii-ign mantra
PDF
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
PDF
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PDF
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
PDF
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
PDF
2018 11-12 acad-csirt updated cyber security pemda bssn
PDF
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
PDF
SEMINAR Computer & Cyber Security Career in the World, IT UP
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
Acad csirt cyber security rtik bali 22 july 2020
Ign mantra ppt menulis artikel dan buku ict
2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 data security lokal-internet it up pancasila
2020 07-02 cyber crime n data security-ign mantra
2020 06-30 cyber security kbk kkni aptikom-ign mantra
2020 06-20 data security lokal-internet ngampooz
2020 06-22 cyber security career competence-iaii-ign mantra
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
2018 11-12 acad-csirt updated cyber security pemda bssn
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
SEMINAR Computer & Cyber Security Career in the World, IT UP

Recently uploaded (20)

PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Open Quiz Monsoon Mind Game Prelims.pptx
Open Quiz Monsoon Mind Game Final Set.pptx
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Week 4 Term 3 Study Techniques revisited.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
GDM (1) (1).pptx small presentation for students
Anesthesia in Laparoscopic Surgery in India
O5-L3 Freight Transport Ops (International) V1.pdf
Cell Structure & Organelles in detailed.
TR - Agricultural Crops Production NC III.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Mobile security mobile malware countermeasure academic csirt

  • 1. #ACAD-­‐CSIRT   Mobile Security, Mobile Malware & Countermeasure IGN Mantra, Chairman Email: mantra@acad-csirt.or.id, URL: acad-csirt.or.id Honeynet Seminar 2013
  • 3. #ACAD-­‐CSIRT   Why the mobile phone BOOM
  • 4. #ACAD-­‐CSIRT   The complex picture of the mobile phone market But mobile phone market share doesn’t tell the full story Source: VisionMobile
  • 5. #ACAD-­‐CSIRT   Smartphones reached 30% market share in 2011 483M units shipped worldwide Smartphone shipments as a % of total handset shipments Source: VisionMobile
  • 6. #ACAD-­‐CSIRT   Smartphone sales vary greatly by region Q2 2011 are the majority of handset sales in North America (63%) and Europe (51%) Market share Source: VisionMobile
  • 7. #ACAD-­‐CSIRT   Android became dominant smartphone OS Samsung and HTC benefited the most from Android success (Q4 2011) Smartphone market share by OEM and platform (H2 2011) Source: VisionMobile
  • 8. #ACAD-­‐CSIRT   Android turned the tables on handset makers Samsung and HTC benefited, Nokia, Motorola, Sony were challenged Beneficiaries: fast-moving challengers Efficient cost structure plus ability to differentiate in software, hardware or both low cost assemblers Cost structure optimised for razor-thin margins Android is a long-term opportunity for global reach Under pressure: old guard OEMs Cost structure requiring high-margins Commoditising effect of Android makes high- margins unattainable for OEM without own ecosystem or meaningful differentiation No Name source: VisionMobile
  • 10. #ACAD-­‐CSIRT   10 Malware Types 2013 source : boston.com Droid KungFu Geinimi Plankton Droid Dream Android. Pjapps Ikee Zitmo Hong TouTou Timifonica SymbOS. Skull
  • 11. #ACAD-­‐CSIRT   Mobile Malware Statistic 2013 Source : Kaspersky Lab
  • 12. #ACAD-­‐CSIRT   Mobile Malware Malware is software with malicious purpose. It may be designed to disable your phone, remotely control your phone, or steal valueable your information. Mobile malware uses the same techniques as a PC malware to infect mobile devices. app pc
  • 14. #ACAD-­‐CSIRT   Malware Samples Library Source : http://rogunix.com/docs/Android/Malware/
  • 15. #ACAD-­‐CSIRT   The Real Dangers of Mobile Malware Bank account password are stolen. Private information is captured. Phone data is deleted. Device is “bricked” and need replacing The phone is forced to send the sms premium numbers. (sedot pulsa). Malware infected devices can be used by botnet owners to launch attacks on digital targets.
  • 16. #ACAD-­‐CSIRT   How they get you PHISING A fake version of real site gathers your log-in ad other private informations SPYWARE Silently collects information from users and sends it to eavesdroppers EXPLOITING Some malware will exploit mobile platform vulnerabilities to gain control of the device WORM A program tha replicates itself spreading throughout a network MAN IN THE MIDDLE The attackers becomes a middle man in a communication stream and logs all information relayed between the communicating parties DIRECT ATTACK Comes from files or viruses sent right to your cell phone.
  • 18. #ACAD-­‐CSIRT   Mobile Malware & Awareness Of users say that they are unaware of security software for smartphones Of mobile users bank from a phone, yet most don’t have security measures in place 53% 24%
  • 19. #ACAD-­‐CSIRT   What should You Do and Don’t DO •  Make sure the OS and sowftware are up to date at all times •  Download apps from reputable sites and closely review app permission requests. •  Make sure to check the feedback from other users before installing the program from an app store •  User strong password •  User personal firewall •  Turn off bluetooth and other connections when not in use •  Install a mobile security application. DON’T •  Download apps from third party app repositories •  Jailbreak your phone •  Leave your “wifi ad hoc mode on” •  Accessing banking or shopping sites over a public WIFI connection •  Leave your mobile device unattended in public places.
  • 20. #ACAD-­‐CSIRT   References •  A window into Mobile device security –  http://www.symantec.com/content/en/us/about/media/pdfs/ symc_mobile_device_security_june2011.pdf •  http://www.continuitycentral.com/feature0919.html •  http://www.usatoday.com/tech/news/story/2012-03-22/ lost-phones/53707448/1] •  US-CERT Resource: Paul Ruggiero and Jon Foote, “Cyber Threats to Mobile Phones”, http://www.us- cert.gov/reading_room/ cyber_threats_to_mobile_phones.pdf) •  Top 10 android Security Riskshttp:// www.esecurityplanet.com/views/article.php/3928646/ Top-10-Android-Security-Risks.htm
  • 21. #ACAD-­‐CSIRT   TERIMA KASIH IGN MANTRA Email : incident@acad-csirt.or.id, info@acad-csirt.or.id