Happy holidays: mobile maliciousness

2009-11-01

Ken Dunham

iSIGHT Partners, USA
Editor: Helen Martin

Abstract

'Social engineering threats are a notable concern for mobile device users and are always escalated during the holiday period.' Ken Dunham, iSIGHT Partners.


Since the advent of Timofonica in 2000 there has been a buzz about mobile malicious threats. A boom of mobile malicious code development in 2004 resulted in infections in dozens of countries and thousands of devices. While this was troubling, a more significant and worrying trend driven by financial fraud is now exploiting the mobile device vector.

There has been a rapid surge in the adoption of mobile solutions such as Blackberry, iPhone and countless other smartphone devices since 2006. Millions of mobile device users rely on their hand-held solutions not only for voice communications but also to perform online banking, surf the Internet, check their email, and more. The reliance on and trust of such devices by the average consumer presents fraudsters with great opportunity.

Starting with more traditional forms of fraud, many ‘knock-off’ models of mobile devices exist globally, produced and sold in attempts to undercut legitimate market products with cheaper phones which apparently offer increased functionality. This type of brand-based fraud significantly impacts the mobile device market and is difficult for consumers to identify.

Social engineering threats are also a notable concern for mobile device users and are always escalated during the holiday period – targeted attacks are common and are potentially a higher risk at this time of year due to the nature of what and how people communicate with one another at this time. ‘Check this out’ and ‘holiday greetings’ are possible spoofed communication vectors for criminals targeting individuals with mobile malicious code. A multitude of ring-tone-based malcode threats will certainly also exist during the 2009 holiday period, impacting both PCs and mobile devices. Old-school social engineering tricks such as the downloading of porn are still in use to trick users into installing mobile device diallers that make outbound calls to premium lines at the expense of the victim. The social engineering vectors are almost limitless, as are the criminals’ opportunities for financial fraud.

Mobile device users are now receiving phone calls, SMS messages and emails requesting information about their credit card or other sensitive details. Fraudsters often have all the information they need but a CVV number to perform financial fraud and may engineer a call to a victim to acquire their CVV number. In some advanced cases of social engineering fraudsters have been known to call victims for a one-time password (OTP) value generated from a token used by a victim. If the victim gives out the OTP the fraudsters cash out in real time – often while the victim is still speaking with them on the phone.

Vishing attacks are also on the rise, where VoIP technology is exploited to automate out-of-band broadcast calls to large numbers of mobile devices and/or land lines. The goal is to trick users into entering sensitive details over the phone into an interactive voice-recorded and softphone system on a remote VoIP server. Many consumers don’t understand this new type of attack vector and how caller ID can easily be spoofed via VoIP. If reported, these attacks are typically over by the time the authorities attempt to stop and/or investigate them.

As you prepare for the holiday rush, are you planning on purchasing a smartphone device for yourself or as a gift for a loved one? Can you be sure it’s a legitimate phone from a trusted brand? After purchasing the device do you know the common best practices for that device to limit the threat vectors? Are you fully aware of the numerous ways that fraudsters will attempt to compromise your device or trick you into revealing sensitive information for financial fraud?

While VB readers will understand these threats rather well, most average users of smartphone devices do not and will never understand all of the above (nor want to). The security challenges that lie ahead of our industry are great in light of the challenges identified to date for the mobile market.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.