an overview of mrats

28
An Overview of Mobile Remote Access Trojans (mRATs) and Targeted Mobile Attacks

Upload: lacoon-mobile-security

Post on 05-Dec-2014

930 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: An Overview of mRATs

An Overview of Mobile Remote Access Trojans (mRATs) and Targeted Mobile Attacks

Page 2: An Overview of mRATs

Agenda

●  The Collapse of the Corporate Perimeter ●  Mobile Remote Access Trojans (mRATs)

What do they do?

What types are there?

●  Real-Life mRAT statistics ●  Infection vectors ●  Follow up videos

Page 3: An Overview of mRATs

The Collapse Of The Corporate Perimeter

Page 4: An Overview of mRATs

The Collapse Of The Corporate Perimeter

Page 5: An Overview of mRATs

The Collapse Of The Corporate Perimeter

“More than

60% of organizations enable BYOD” Gartner, Inc. October 2012

Page 6: An Overview of mRATs

The Collapse Of The Corporate Perimeter

Page 7: An Overview of mRATs

MOBILE REMOTE

ACCESS TROJANS (mRATs)

Page 8: An Overview of mRATs

mRAT Capabilities

Snooping on corporate emails and application data

Page 9: An Overview of mRATs

mRAT Capabilities

Eavesdropping

Snooping on corporate emails and application data

Page 10: An Overview of mRATs

mRAT Capabilities

Eavesdropping

Extracting contact lists, call &text logs

Snooping on corporate emails and application data

Page 11: An Overview of mRATs

mRAT Capabilities

Eavesdropping

Extracting contact lists, call &text logs

Tracking location

Snooping on corporate emails and application data

Page 12: An Overview of mRATs

mRAT Capabilities

Eavesdropping

Extracting contact lists, call &text logs

Tracking location

Snooping on corporate emails and application data

Infiltrating internal LANs

Page 13: An Overview of mRATs

TYPES OF mRATS

Page 14: An Overview of mRATs

The mRAT Threat-scape

mRATs / Spyphones

High End: Government / Military grade

Mid Range: Cybercrime toolkits

Low End: Commercial surveillance toolkits

Page 15: An Overview of mRATs

HIGH END: GOV / MIL mRATs

High End Mid Range Low End

Page 16: An Overview of mRATs

High-Profiled Example

Page 17: An Overview of mRATs

MID: CYBERCRIME TOOLKITS

High End Mid Range Low End

Page 18: An Overview of mRATs

High-Profiled Example

Page 19: An Overview of mRATs

LOWER END: COMMERCIAL

SURVEILLANCE TOOLKITS

High End Mid Range Low End

Page 20: An Overview of mRATs

Commercial mobile surveillance tools

Page 21: An Overview of mRATs

REAL-LIFE STATISTICS

Page 22: An Overview of mRATs

Infection rates:

June 2013:

1 / 1000 devices

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 23: An Overview of mRATs

Survey: Cellular Network 2M Subscribers Sampling: 650K

Page 24: An Overview of mRATs

Android iOS-based devices

Infection Vectors

Page 25: An Overview of mRATs

Infection Vectors

For more Information: Coming soon…

“Cyber-Threats to Android-Based Devices” “Cyber-Threats to iOS-Based Devices”

Lacoon Mobile Security YouTube Channel

Page 26: An Overview of mRATs

MOBILE DEVICE MANAGEMENT

(MDM) SOLUTIONS DO NOT

ADDRESS THIS THREAT

Page 27: An Overview of mRATs

An Anatomy of an Attack against MDMs

For more Information:

“Bypassing Secure Containers on Mobile”

Lacoon Mobile Security YouTube Channel