Weekly Mobile Security News Roundup

 
This week’s summary is a mix of articles that magnify the fact that boundaries between legitimate apps and malware, as well as the gaps between nation states and private hackers - are fading. A new iPhone app invites not just your friends but also strangers to eavesdrop on your conversations and offer advice. Crowdpilot allows the user to invite as many people as they like to provide text based encouragement to their real-life conversations.http://onforb.es/McUlU4 Why is this signigicant? Apart from being a slightly disturbing concept this a perfect example of how a completely legitimate App has adopted ...

The Spy in Your Pocket, Part 3: Cyber Risks to Android-based Devices

 
In this third and last entry in our short series overviewing mRATs, we’ll delve into the risks facing Android-based devices. Generally speaking, it’s possible to map four cyber-risks to Android-based devices: 1. Mobile Remote Access Trojans (mRATs) Distributed via Various Application Markets 2. System Exploits 3. Fragmentation and Patching Cycles 4. Wifi Man-in-the-Middle (MitM) Mobile Remote Access Trojans (mRATs) Distributed via Various Application Markets In our first entry in this series we discussed the general threat of mobile Remote Access Trojans (mRATs) – attack tools that take full controls of the sensors and the hardware of the mobile devices without ...

The Spy in Your Pocket, Part 2: Cyber Threats to iOS

 
In this second entry in our short series overviewing mRATs, we’ll delve into the threats facing iOS. Generally speaking, it’s possible to map five cyber-threats to iOS devices: 1. Jailbreaking Devices and Installing Mobile Surveillance and mobile Remote Access Trojans (aka mRATs) from Alternative Markets 2. Using Distribution Certificates to Sideload Malware without Passing through App Store’s Validation Process 3. Malicious Profiles 4. Wifi Man-in-the-Middle Attacks 5. 0-Day System Vulnerabilities and Webkit Exploits Jailbreaking Devices and Installing Mobile Surveillance and mobile Remote Access Trojans (aka mRATs) from Alternative Markets These attacks ...

Weekly Mobile Security News Roundup

 
What's new on the mobile security front? From an uncovered APT campaign that had been running since 2007, to new Android research unveiled platform issues affecting the permissions, and Snapchat hacks. If you weren’t able to keep up with the news - we did it for you. An APT report named “Careto” (Spanish slang for “Mask” or “Ugly Face”) was released by Kaspersky. According to the report, the “Careto” campaign involved cyber espionage and has been running since at least 2007. In January 2014, its C&C (command and control) servers have been down – and now we have the news of the analysis. ...

AVPasser: When Widespread Malware Adopts Targeted Attack Capabilities

 
We’d like to draw your attention to another new Chinese malware for Android, named AVPasser. AVPasser looks like an advanced mRAT (Mobile Remote Access Trojan) and was first discovered by Chinese researchers. Our own follow-up research revealed a very interesting capability – self uninstall – a feature that is generally considered to be unique to targeted attacks. This self-uninstall capability is one of the first examples of mass malware adopting techniques from advanced targeted attacks. Advanced targeted attacks have always operated very differently to simple malware: • Self-Preservation techniques • Remote ...

The Spy in Your Pocket, Part 1: An Overview of Mobile Remote Access Trojans (mRATs)

 
We’re excited to present at the upcoming RSA 2014 at the end of the month. Our talk “Practical Attacks against MDM Solutions (and What You Can Do About It)” is going to focus on various threats to mobile devices and how mobile Remote Access Trojans (mRATs) are able to bypass current detection solutions. Leading up to the conference, we’d like to provide you with this short series overviewing mRATs. We hope you’ll find this educational series not only interesting, but useful as well when planning your mobile security strategy. Overview As its name implies, a mobile Remote Access Trojan ...

WEEKLY MOBILE SECURITY NEWS ROUNDUP

 
This week’s roundup covers several more data leaks as well as a global outbreak of Wi-fi snooping. The variety of leaks, attacks and involved industries shouldn’t be ignored - it’s a major sign of how big of an issue mobile malware is as well how much more is yet to come. We’ve been going over HP’s Cyber Security Report for 2013 which was released this week. The whole thing is worth a read but here are the most important findings regarding Mobile Security: 46 % of Android and iOS apps used encryption improperly, leaving users' data vulnerable to theft or misuse. 52 % of security problems were due to insecure client-side operations. Insecure data storage and ...

Protecting the Attorney-Client Privilege: Security in a Mobile-driven Legal World

 
When people talk about security in terms of industries, verticals such as finance, retail and healthcare tend to pop up a lot. Surprisingly, legal is placed lower on the security-focus rung even though law firms are recognizing the need for security. Case in point, last week I had the privilege to present at the conference “Securing the Law Firm” in London. These are a series of conferences dedicated to security professionals in the legal sector. In fact, legal has its own set of unique characteristics which require a high level of security. Particularly, when it comes to mobile, the security issues are exacerbated by the ...