Site icon Check Point Blog

Weekly Mobile Security News Roundup

In some ways, this week’s summary somewhat highlights the polarity of the mobile security world. With the year’s biggest security conference in the form of RSA finishing today, we can see that while awareness to the severity and size of the issue of mobile security is growing and evolving, so are the threats.

 

  1. Interception and concealment of incoming and outgoing messages;
  2. The prevention and theft of outgoing messages;
  3. Retrieving telephone data including model, OS version, country, app installation list and IMEI;
  4. Remote Execution of malicious code.

http://www.pcworld.com/article/2102080/android-malware-using-tor-anonymity-network-makes-a-debut.html

Why is this significant?
Using Tor makes tracking the C&C extremely difficult. This is potentially a massive step forward in attacker anonymity. The only potential  upside, is that these concealment methods require a lot more code, and so if an infected mobile device suddenly has an increase in data usage  caused by the large and difficult to download bundle, a user is more likely to realize something is wrong.

Why is this significant?
Until now, many severe threats to iOS required the phone to be Jailbroken in order to work. This, along with several other similar advances in malware and mRATs, proves that attacks on non-Jailbroken devices are just a matter of time.

Android devices prior to version 4.2.1 of the operating system – 70 % of the phones and tablets in circulation – have been vulnerable to a serious and simple remote code execution vulnerability in the Android browser for more than 93 weeks. Although patched in 4.2.2 (released just over a year ago), with carriers and device makers reticent to be quick with updates and security patches, close to 75% of Android users are at risk. Comparatively, reports show that KitKat, the latest version of Android, has yet to hit 2% adoption.

The exploit module, can enable access to the device camera, location data, information stored on a SD card and even the user’s address book. Metasploit presents a simple attack process, which can be triggered by a malicious QR code the victim scans with their device and opens a command shell for the attacker.

http://threatpost.com/70-percent-of-android-devices-exposed-for-93-weeks-to-simple-attack/104359

Why is significant?
Many devices are still running 4.2.1, so this doesn’t need much explaining. Reading between the lines shows that attackers are adopting new ways of accessing the targets, both to initially acquire and then infect the device.

 

Exit mobile version