Top Banner
SESSION ID: #RSAC John Miller Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware MBS-W03F Director, ThreatScape Cyber Crime iSIGHT Partners
29

Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

May 25, 2018

Download

Documents

vunhi
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

SESSION ID:

#RSAC

John Miller

Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware

MBS-W03F

Director, ThreatScape Cyber CrimeiSIGHT Partners

Page 2: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Agenda

2

Introduction

Evolution of mobile credential theft malware

Evolution of mobile ransomware

Outlook and implications

Application

Page 3: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Introduction | Scope

3

Cyber crime: abuses of computer systems for profit

Our focus: cyber criminal mobile malware

Page 4: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Introduction | Mobile Threat Taxonomy

4

Page 5: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Introduction | Mobile Malware Taxonomy

5

Page 6: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Introduction | Focus

6

Mobile Credential Theft Malware

Compromises user accounts with online banking and other services

Mobile Ransomware

Blocks access or functionality,

demands ransom to restore

Page 7: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Introduction | Focus

7

Why this focus?

Recent emergence

Rapid maturation

Significant threats

Page 8: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Mobile Credential Theft Malware

Page 9: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | History

9

Page 10: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Current State

10

Campaigns affecting 100s – 1,000s of victims likely regular

Market leaders observable; competitors regularly emerge

Target increasingly numerous banks & other organizations in multiple regions

Compromises multiple authentication factors simultaneously

Infects Android devices

Page 11: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Injects

11

Windows malware “injects”

Modify victim’s experience of online service or interact with service

Emerged following online banking security enhancements

Diverse implementations created: circumvent MFA, record or modify displayed data, automate transfers…

Android malware “injects”

Modify victims’ experience of device

in general or specific app

Emerged following mobile banking

and payment apps

Current implementation is primarily

credential solicitation w/ other

features used for MFA circumvention

Page 12: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Case Study

12

Mazar: Latest Tool from Established Developer

Credential theft / “injects”

Overlay legitimate app or standalone window

Multiple triggers

Page 13: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Case Study

13

Identified targets

Services: Online banking, payment cards, eCommerce, social media, communications

Regions: North America, Europe, Asia-Pacific

Additional targets likely resulting from on-demand development efforts

Page 14: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Case Study

14

Data gathered

Online Banking: Username, Password, MFA information

Payment Card: Number, Expiration, CVV, Name, PIN, 3-D Secure

eCommerce: Username, Password

Page 15: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Case Study

15

Additional compromise vectors

Page 16: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Credential Theft | Monetization

16

Page 17: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Mobile Ransomware

17

Page 18: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Ransomware | History

18

Page 19: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Ransomware| Current State

19

Accounts for large share of recent mobile infections

Primarily block device functionality; some encryption

Linked to affiliate programs in eCrime marketplace

Victims selected by country; increasingly global problem

Primarily infects Android devices

Similar tactics applied to iOS through non-malware tools

Page 20: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Ransomware| Case Study

20

Simplocker: First identified mobile ransomware to encrypt victims’ files

Distribution

Disguised as legitimate applications, often adult-themed

Hosted on fake Google Play sites

Page 21: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Ransomware| Case Study

21

Extortive Behavior

Displays locked-device warning

Encrypts files on SD card: images, videos, documents

Other Features

Collects device information, likely for campaign management

Jabber/XMPP-based C&C

Page 22: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Ransomware | Monetization

22

Estimated average ransom amounts: $300 to $500 per victim device

Commercial ransomware kits and services enable campaign operators to customize ransom amounts

Victims forced to contribute to laundering process via payment in easily-handled currency

Page 23: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Outlook

23

Page 24: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Outlook | Credential Theft

24

Geographic and sector scope of targeted services to expand

Likely development focus: manipulating legitimate apps

Interact with specific apps

Steal credentials users enter legitimately

Modify app behavior

Page 25: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Outlook | Ransomware

25

Effects likely to remain focused on blocking functionality

Encryption of uncertain value

Tools moving into commoditization stage potentially rapid growth in distribution and use

Page 26: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Outlook | Cyber Criminal Mobile Malware

26

Capabilities increasingly mirror conventional computer malware

Increasing specialization leading to growing incidents

Effective distribution tactics to be a focus

Device targeting to expand slowly

Conflict over maximizing malware functions and utility

Pros: Greatest benefit from overcoming installation challenges

Cons: Increased support difficulty and likelihood of remediation

Page 27: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Application

27

Page 28: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Application

28

Maintain mobile device replacement capability or workaround to avoid productivity and accessibility disruptions

Ensure regular OS updates to maintain security posture

Develop mobile device investigation capability to assess incidents

Avoid isolated data on mobile devices to limit impact of functionality loss

Achieve standalone, service-side fraud detection measures to address account compromise without discernable client-side anomalies

Page 29: Upwardly Mobile: Looking at Evolving Cybercrime … Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware ... Emerged following mobile banking ... Geographic and sector

#RSAC

Questions?