Why Phishing is Different on Mobile
Aaron Cockerill
Gartner Security & Risk Management Summit 2018
Why Phishing is Different on Mobile Aaron Cockerill Gartner - - PowerPoint PPT Presentation
Why Phishing is Different on Mobile Aaron Cockerill Gartner Security & Risk Management Summit 2018 1 The world has changed The corporate data center is in the cloud Starbucks is the new corporate Wi-Fi Employees have all gone mobile
Why Phishing is Different on Mobile
Aaron Cockerill
Gartner Security & Risk Management Summit 2018
Time on mobile, vs 42% on PC
Of devices connected to the Internet use Android, vs 37% use Windows
Mobile internet traffic surpassed desktop internet traffic
Time in apps, not the browser
Experienced a security incident directly attributable to a mobile device in the past year
Enterprises software interactions on mobile by 2022
Hey Aaron, check out the new KTM 500 EXC. http://ktm500exc.iamges.com.au/link
attacks were followed by the installation of software
more susceptible to phishing attack on mobile
year-on-year increase in social media and SaaS targeted phishing
phishing or social engineering
CORPORATE FIREWALL SECURE EMAIL GATEWAY ENDPOINT ANTI-VIRUS
CORPORATE EMAILCORPORATE FIREWALL SECURE EMAIL GATEWAY ENDPOINT ANTI-VIRUS
CORPORATE EMAILCORPORATE FIREWALL SECURE EMAIL GATEWAY ENDPOINT ANTI-VIRUS
CORPORATE EMAILPegasus for iOS
August 2016 Discovery: Citizen Lab & Lookout Exploited: three zero-day vulns (Trident)
Pegasus for Android
April 2017 Discovery: Lookout & Google Exploited: known/patched vulns (Framaroot)
Encryption Kernel
Encryption Kernel Pegasus
data
Dark Caracal
THE FIRST GLOBALLY ACTIVE MOBILE APT (mAPT)
with global scope & scale
mobile devices in over 21 countries
and OS X
information, Screenshots, Recordings, Financial transactions, Other sensitive data
Dark Caracal mobile kill chain
Gain Access
Dark Caracal relies on social engineering via posts on a Facebook groups and WhatsApp messages.
Social Engineer
The goal is to drive victims to a ”watering hole” controlled by Dark Caracal that provides trojanized versions of popular messaging apps.
Perform Espionage
Dark Caracal uses at least 9 unique Android surveillanceware apps to activate a mobile device’s camera, microphone, GPS, or steal data from up to 15 different locations on the device.
ViperRAT
Sophisticated surveillanceware targeting the Israeli Defense Forces.
FrozenCell
APT C-23 targeting Palestinian individuals and organizations with trojanized education and social media apps including facebook, WhatsApp, Messenger, and LoveChat.
xRAT
Initially used against pro-democracy activists in Hong Kong in 2014, targets iOS and Android. Targets suggests state sponsored
BancaMarStealer
BANKING TROJAN
Fake Real
Fake Real
Fake Real
Phishing is the #1 cybersecurity risk globally
| CONFIDENTIAL AND PROPRIETARY
Lookout Phishing Statistics
2011 2012 2013 2014 2015 2016
0.9 0.5 0.4 0.2 0.1 0.1
1.00 0.75 0.50 0.25
PHISHING SITE ENCOUNTER RATE
| CONFIDENTIAL AND PROPRIETARY
Lookout Phishing Statistics
Phishing URLs has increased 85% YoY since 2011.
training 56% of Lookout users received and clicked
phishing URLs per year over that same time.
* 2014-2016
PHISHING SITE ENCOUNTER RATE
CORPORATE FIREWALL SECURE EMAIL GATEWAY ENDPOINT ANTI-VIRUS
CORPORATE EMAILCORPORATE FIREWALL SECURE EMAIL GATEWAY ENDPOINT ANTI-VIRUS
Deb Hey Aaron, check out these pics from the picnic! http://www.picserver.net/picnicPhishing Attack Blocked
More Info Proceed Anyway CORPORATE EMAILDevice remediation Mobile Endpoint Security Threat Detail
MOBILE RISK MATRIX
Apps Risks
rootkits
due to poor coding
that leak data
bypass app stores
Device Risks
compromise (Pegasus)
configurations
jailbreak/root
Network Risks
attacks
hijacking
downgrades
Web & Content Risks
attacks
Stagefright)
(e.g. Trident)
websites
Lookout Mobile Endpoint Security
COME AND TALK TO US AT BOOTH 250