You are on page 1of 19

A Smart Choice for a

Mobile-Only Era
AhnLab V3 Mobile, a comprehensive mobile security solution

Issue 10
In 2015, mobile devices are
1 expected to make up 78.4
Changes in the Mobile Market percent of worldwide device
and Increase in Mobile Malware shipments. As the number of
mobile device users increases
3 and more personal and critical
AhnLab V3 Mobile and Robust data are saved to mobile devices,
Engine attackers have begun to target
them. Since 2013, there has been
4 a sharp rise in mobile malware,
What makes AhnLab V3 Mobile
and their attack techniques
Engine powerful?
and methods are becoming
increasingly sophisticated. In
6
From the Gartner Files: this regard, detecting mobile threats and protecting mobile devices have become the first
Protecting Mobile Devices priority for security vendors and mobile device users.
Against Malware and
Potentially Unwanted
In this report, you can find not only the latest mobile threat trend but also the reason
why AhnLab V3 Mobile is highly evaluated by global security research and certificate
19 institutions.
About AhnLab
Changes in the Mobile Market and Increase in Mobile Malware
We are now living in a Mobile-Only era. We have shifted beyond the age of
Mobile-First, where people reached for their mobile devices instead of their desktop
computers, to Mobile-Only, where our everyday life becomes increasingly tied to
mobile devices, including shopping, banking and even entertaining. According to
Gartner, the leading global IT research analysts, 77.68 percent of the devices shipped in
2014 were mobile devices (see Table 1).
Table 1. Worldwide Devices Shipments by Device Type, 2014-2017 (Millions of Units)

Device Type 2014 2015 2016 2017


Traditional PCs (Desk-Based and Notebook) 277 251 243 233
Ultramobiles (Premium) 37 49 68 89
PC Market 314 300 311 322
Ultramobiles (Tablets and Clamshells) 226 214 228 244
Computing Devices Market 540 514 539 566
Mobile Phones 1,879 1,940 2,007 2,062
Total Devices Market 2,419 2,454 2,546 2,628
Note: The Ultramobile (Premium) category includes devices such as Microsofts Windows 8 Intel x86 products and Apples MacBook Air.
The Ultramobile (Tablets and Clamshells) category includes devices such as, iPad, iPad mini, Samsung Galaxy Tab S 10.5, Nexus 7 and Acer Iconia Tab 8.
Ultramobiles All Ultramobile Basic and Utility Devices.
Source: Gartner (July 2015)

With this change, security threats short for SMS phishing, has evolved Given that South Korea boasts one
aimed at mobile devices are on in terms of social engineering and of the highest numbers of mobile
the rise, resulting in an increased malware type. SMiShing was first phone users as well as fastest average
number of mobile devices being used for micropayment scams, but internet connection speed, SMiShing
attacked by malware since 2014. recently, cyber criminals are using has the possibility to soon spread
Recently, a mobile ransomware called this technique to cause greater throughout the world. There has
SimpleLocker disguised itself as a financial damage by stealing financial also been a growth in fake banking
message from the FBI and caused information needed for online applications in accordance with the
considerable damage. banking. According to AhnLab rapid increase in mobile banking
Security Response Center, the number transactions in South Korea.
In South Korea, a mobile security
of SMiShing attacks has dramatically
threat called SMiShing became
increased since 2012 (see Fig. 1).
a serious social issue. SMiShing,

Figure 1 Mobile Malware Statics and Trends

Source: AhnLab (March 2015)

2 A Smart Choice for a Mobile-Only Era Issue 10


Not only have these recent SMiShing, repackaging and fake applications been continuously increasing, but memory
fabrication and hackings caused by rooting and jail-breaking have been as well.

Table 2. Mobile Threats and Attack Techniques

Mobile Threats Description


Rooting (Android) Obtaining administrative system root or superuser types of privileged access for mobile devices
Jail-Breaking (iOS) Modifying mobile OS to obtain file system read and write access
Memory Searching Accessing external process memory
Modifying and manipulating data (e.g., financial data)
Repackaging Changing and compromising normal apps (e.g., fake banking app)
File Manipulation Manipulating data or files saved to mobile device storage
Pixel Sampling Manipulating control by obtaining and analyzing the RGB value of screen pixels
Malware Hacking mobile devices using malware to launch another attacks (e.g., DDoS)
Packet Manipulation Manipulating packet sent when communicating from app

Source: AhnLab

AhnLab V3 Mobile and Robust South Korea; AhnLab Safe Message, participated in the tests and been
Engine an anti-SMiShing application; and verified for the 16 times (as of July
In order to protect the mobile AhnLab V3 Mobile Security, an 2015). Furthermore, 8 out of the 10
environment, AhnLab, Inc. provides Android-based mobile security tests from 2014 to July this year, V3
various mobile security products solution that supports malware Mobile engine scored a 100 percent
AhnLab V3 Mobile 2.0, AhnLab scanning and privacy protection. malware detection rate. Furthermore,
V3 Mobile Plus, AhnLab Safe in the latest test conducted in July
These mobile security solutions
Message and AhnLab V3 Mobile 2015, V3 Mobile scored 100 percent
employ AhnLab V3 Mobile
Security; AhnLab V3 Mobile 2.0, both in the protection test and new
engine to provide robust mobile
a mobile anti-virus application for real-time detection test. It also scored
protection. The V3 Mobile engine
the Android-based mobile devices; full marks in the usability test (impact
has received high scores in the
AhnLab V3 Mobile Plus, a mobile of battery life, slowdown of device
protection and performance tests
transaction security solution and traffic generation). It scored 13
of AV-Comparatives and AV-TEST.
that interoperates with financial out of 13 with additional scores from
Ever since AV-TEST started testing
applications and is adopted by more the Features section, and earned the
the mobile environment in 2013,
than 90 financial institutions in AV-Test certification.
AhnLab V3 Mobile engine has

Figure 2 AhnLab V3 Mobiles Test Result from Global Comparative Tests

Source: AhnLab (March 2015) A Smart Choice for a Mobile-Only Era Issue 10 3
What makes AhnLab V3 Mobile Engine powerful?
What is the secret to AhnLab V3 Mobile being highly evaluated by security researchers? As the largest security vendor in
South Korea with more than 20 years of knowhow, AhnLab has developed exclusive technologies in malware collection,
analysis, categorizing and response. AhnLab V3 Mobile has been designed with AhnLabs exceptional technology and has

Figure 3 AhnLab Mobile Malware Response Process

Source: AhnLab

its own automated analysis program- AhnLabs products, programmed words, it shows the diagnosis result
based mobile response process crawler, 3rd party partners and and sample information by priority in
system. customer inquiries or reports. order to enable a proactive malware
AhnLab Malware Processing (AMP), response.
AhnLab presents AhnLab Malware
a web-based malware collecting
Response Process, which consists In this process, there exists special
system, automatically processes the
of AhnLabs malware response structures that reflect the knowhow
samples submitted by customers.
knowhow and automated analysis of AhnLabs analysts; CANNON
system. With this process, it takes Then, the collected samples are sent is a real-time sample processor that
less than 20 minutes to collect and to IRIS, a mobile heuristic analysis extracts sample information and values
analyze malware samples and update system developed by AhnLab for malicious/non-malicious diagnosis.
signature rules in the V3 Mobile Security Response Center. IRIS The malware analysts at AhnLab
engine [see Fig. 3]. collects and automatically analyzes create rules based on the Android files
the Android apps, extracts malicious extracted from CANNON and save
First, malware samples are collected
traits, categorizes into similar groups them to the DB. CHARKA is a real-
through various routes such as
and makes a final diagnosis. In other time network diagnosis engine that

4 A Smart Choice for a Mobile-Only Era Issue 10


Figure 4 DEVIL: Lifecycle APPs Component as Graph

Source: AhnLab

diagnoses ever-increasing SMiShing Since 2014, AhnLab built its own That is the reason why major
malware. When AhnLab Safe mobile malware response process smartphone manufacturers such
Message collects SMiShing samples, and automated the collection- as Samsung and LG have adopted
the server downloads the samples that categorizing-analysis-response AhnLab V3 Mobile 2.0 as a built-in
will be processed by CHARKA. system. The system provides a fast application in their mobile devices
response by processing 100,000 released in South Korea. AhnLab
The recently developed DEVIL (DEx
malware samples a day. AhnLab has continues its research in diagnosis
VIsuaLizer), is an analyzer that
also minimized false-positives by techniques and in conducting projects
visualizes a mobile apps life cycle
putting default apps and normal apps on automatic categorization to
and the correlation of malicious app
from Android Market in a Whitelist. maintain its number one position in
components. Malicious behaviors can
The diagnosis has been sped up the mobile security area.
be diagnosed by viewing the class the
using the caching and fingerprinting
components are in. Source: AhnLab
techniques.

A Smart Choice for a Mobile-Only Era Issue 10 5


From the Gartner Files:
Protecting Mobile Devices Against Malware
and Potentially Unwanted Applications

Mobile malware numbers are Verify applications are installed worldwide. F-Secure reported
growing. New attack vectors from only from trusted sources. 275 new threat families in 1Q14
mobile devices pose an emerging alone on the Android platform.
Deliver training to drive user
risk to the enterprise. Organizations Kaspersky Lab reported that from
awareness of what permissions
with high security needs must have August 2013 through July 2014,
mobile applications are requesting
a strategy to defend against mobile over 1 million Android users were
to help reduce unwanted
malware and potentially unwanted attacked 3.4 million times. These
applications from being installed.
applications. numbers, compared with the total
number of devices and the PC threat
Comparison landscape, are relatively small.
Key Findings
The mobile attack landscape has Although we dont have evidence of
Mobile malware is leveraging
continued to grow and change with confirmed mobile malware attacks
new attack vectors that may pose
the increase of smartphone and on enterprises, the new types of
increased risk to the enterprise.
tablet sales year over year, and the attacks and vectors should create
iOS and Android devices do not proliferation of bring your own concern with high-security-minded
have to be jailbroken or rooted to device (BYOD) in the enterprise. organizations. Other organizations
be susceptible to attack. Every year, we see new statistics may not need to implement mobile
claiming hundreds of percentage malware solutions yet, but should
Android is currently the largest keep apprised of the threat landscape
growth in mobile malware, but what
target for mobile malware and and have compensating controls to
does that mean to the enterprise IT
unwanted applications, but iOS protect their enterprise resources.
staff? Is mobile malware a risk to the
malware and attacks have begun to
enterprise? And what are potentially
surface. Mobile OSs have been designed to
unwanted applications?
be more resilient against some of the
Some mobile anti-malware traditional attacks, so it becomes
Let us start by defining mobile
solutions only protect after the more difficult for the security
malware as a program or piece of
phone is infected, due to the lack of vendors to have signature-based
code that exploits a vulnerability
access to the kernel. solutions. There is no concept of
to impose a security risk to a users
Windows Phone is still not mobile device and/or information. kernel mode access for the security
targeted by malware authors or Categories of malware include solutions to fully protect against
mobile security solution providers, viruses, rootkits, worms, botnets, malicious attacks. This has driven
partially because of the lower spyware and trojans. Potential alternate methods for mobile security
market penetration. unwanted applications are programs solutions to try to secure the devices.
that have been installed on mobile Furthermore, not all methods of
devices, usually with the users protection are available for all of the
Recommendations
consent, but with unclear intentions different mobile OSs, because of their
E Evaluate the risks and new that can have negative consequences different approaches to architecture.
tactics being leveraged on mobile to privacy or to the performance of For example, Android allows for
devices by malware. the device. more access to configuration, policy
Look to mobile device security settings and other phone resources,
The most attacked mobile platform versus iOS and Windows Phone,
solutions with cloud-based in 2014 was the Android OS. This
application reputation services and which lend themselves to solutions
was due to its openness, multiple based upon behavioral or machine-
integration with current MDM/ versions, numerous app stores and
EMM solution. learning engines to monitor the
device numbers of over 1 billion

6 A Smart Choice for a Mobile-Only Era Issue 10


Table 1. Mobile Security Solution Effectiveness vs Attacks

Mobile Attacks Anti- Anti-Malware Platform Mobile MDM/EMM Education Network- Safe
Malware Signatureless Protection App Based Browser
Signature Risk Protection
Mgmt

Mobile Malware D, R D, P D, P, R D R D P*
Kernel Level/ D P, R D, R D, P, R P*
Jailbreak/Root
HW/USB D, R P, R D, R

Unwanted Apps D, R D, P, R D, R D, P, R D, P D P*

Network-Based D, R D, P, R D, P*

Malicious Profile D, R R D, P D P*
iOS

Legend: D = Detect, P = Prevent, R = Remediate


*- Will only prevent if the malicious website is known to the back-end service.
Source: Gartner (March 2015)

changes on the device and determine Anti-malware signature-based and iOS. These are recommended
possible risk. One example was the solutions are currently only available when Android or jailbroken
Zeus-in-the-mobile malware that on Android due to the nature of iOS devices are using third-
targeted SMS notifications sent by the access to the OS, but in many cases, party application stores, and IT
banking industry for authentication they can only detect and remediate organizations want to understand the
codes. This malware was successful on the malware after it has been installed risk scores of installed applications.
Android because it was granted access and the signature has been updated Mobile device management/enterprise
to the SMS channel of the device, on the device. The anti-malware no- mobility management (MDM/
whereas iOS does not allow this type signature solutions are based upon EMM) solutions are available
of access by applications. behavioral, device or configuration on Android, iOS and Windows
analysis. They can be more effective Phone, and can be integrated with
Table 1 discusses which types of
than signature-based solutions and some of the anti-malware, mobile
solutions are effective in detecting,
are available on Android and iOS. application reputation solutions
preventing and remediating against the
These solutions have more access to or network-based solutions to
different categories of mobile attacks.
the Android OS due to the openness help with remediation activities.
For more details on the different of the OS, and have more possible Network-based solutions like secure
protection solutions, refer to the visibility into the health of the Web gateways (SWGs) or VPNs
Mobile Security Solution section. device and applications. They are are available on Android, iOS
less mature on iOS due to the lack and Windows Phone, and can be
Some of these solutions are not of access to the system, applications leveraged to secure network traffic on
available on all the platforms due and configurations. Android, iOS fully managed devices to prevent man
to the architecture of the mobile and Windows Phone have built-in in the middle (MITM) attacks. Safe
device, as discussed above. In Table OS platform protections, such as browser solutions are available on all
2, we compare the effectiveness of device encryption, address space three platforms, but only help prevent
the solutions to the mobile OS and layout randomization (ASLR), attacks if the malicious websites
recommended possible solutions to data execution prevention (DEP) have been identified in advance in
prevent the mobile attacks listed in and secure boot, just to name a the Internet Protocol (IP) reputation
Table 1. few. Mobile application reputation portion of the solution.
solutions are available on Android

A Smart Choice for a Mobile-Only Era Issue 10 7


Table 2. Mobile Security Solution Effectiveness per OS

Mobile Security Solutions Android iOS Windows Phone

Anti-Malware Signature Available Partially Not Available (N/A) Not Available


Effective

Anti-Malware Effective Partially Effective N/A Currently Not Required


Signatureless
Platform Protection Available Available Available
Recommended: Recommended: Recommended: Windows Phone 8.x
Android 4.3 or higher iOS 7 or higher
Samsung Knox
MARS Highly Effective Effective N/A Currently Not Required
MDM/EMM Effective Effective Effective
Network-Based Effective Effective Effective
Safe Browser Protection Partially Effective Partially Effective Partially Effective

Source: Gartner (March 2015)

Analysis and therefore do not have visibility mobile devices include SMS sending,
There is a misconception that into what is being installed until after file or app downloading, location
malware is the same on mobile the fact. This is why vendors are tracking, banking fraud, data theft,
devices as in the traditional desktop looking to alternative ways to protect and fee charging, just to name a few.
world. The problem with this mobile devices. Many vendors have Most mobile malware attacks on
statement is that mobile architecture built application reputation services individuals are motivated by profit.
is built to prevent some of the that can be integrated with MDM The mobile security vendors have
attacks that succeed on the desktop. or EMM solutions to help the seen possible trends of attackers
Many of the new mobile operating enterprise manage the applications that are looking to steal personal
systems do not allow access to the installed on the mobile devices. The information for a possible spear-
kernel; they have application-level IT organizations can then set policies phishing attempts. Once infected, the
containerization, secure boot for and actions to take based upon the mobile device could also be leveraged
the system, secure browsers without risk level of the applications. The as a new attack vector to infiltrate the
add-ons and other security features other options for detecting malicious enterprise PCs and networks.
that prevent the common desktop actions are to monitor the network
malware from being effective. Apple, stack, or to force all traffic through New and Expanded Attack
a VPN or secure Web gateway. Vectors
Google and Microsoft have built-in
security features to reduce the attack This allows the security solution to In the recent mobile threat reports
footprint of the mobile device. For gain an understanding of where the from F-Secure, Kaspersky and Cisco,
a deeper dive into the latest security applications are connecting to, and there have been increases across the
features, reference the Gartner then leveraging an IP reputation board for Android and iOS mobile
research on Mobile Device Security: service to compare against known threats. The latest generation of
A Comparison of Platforms. malicious sites. attacks has begun to implement new
attack vectors that IT organizations
In many cases, traditional anti- According to mobile malware
need to be aware of to defend the
malware agents installed on mobile security reports from 2014, the
enterprise. Figure 1 shows a few of
devices cannot prevent malicious majority of malicious attacks are
the most prevalent sources and paths
software from being installed because based upon the trojan category. Some
for mobile malware to attempt to
they do not have access to the kernel, examples of trojan behavior on the
gain access to the enterprise.

8 A Smart Choice for a Mobile-Only Era Issue 10


Figure 1 Mobile Attack Vectors

Internet SMS/MMS

Enterprise
Cloud Storage

Corp
Malware Storage
Source

Website Remote Enterprise


Access Wi-Fi

Unwanted
Application Source

App Store USB

Malware
Source

Unsecured Public Wi-Fi or


Stingray/Cell Phone Tower Masquerading
Source: Gartner (March 2015)

One of the main sources for to install mobile applications, well. Email, SMS and Multimedia
todays attacks are the nonstandard profiles or certificates on the users Messaging Service (MMS) are
application stores. These are device. Once an iOS user installs a other attack vectors that can
third-party, private or hacker-run malicious profile with an attached have embedded links to malicious
application stores, potentially root certificate, the device can be then applications. Once infected with
filled with malicious or unwanted controlled, and all traffic (encrypted malicious code, the next step is not
applications. Android allows or unencrypted) can be sniffed by always targeting the mobile device,
applications to be installed from the malicious author. Unsecured but possibly targeting the users other
multiple application stores, while iOS public Wi-Fi networks or stingray devices through USB connections, or
devices must be jailbroken to leverage (cell tower masquerading) tactics can over the carrier network or Wi-Fi to
third-party stores. One common also pose a network-based threat for cloud storage or corporate resources.
practice for the malicious actors is to MITM-style attacks. These attacks For example, there were Android
get popular applications, repackage allow for unencrypted IP traffic games that would create an infected
them with malicious code and submit for the Wi-Fi and voice traffic for PDF, HTML or other file type, and
them to third-party app stores. the stingray device to be sniffed. then sync it up to a cloud file store.
Sometimes they can be combined Then when the user opened the file
Another source of malware comes
with other forms of malware that on a Mac or PC, it had code targeting
from malicious websites that try
allow for decryption of traffic as the desktop OS.

A Smart Choice for a Mobile-Only Era Issue 10 9


Table 3. Mobile Attacks Discovered and Targeted by Operating System trojans included chargeware and
ransomware attacks. Chargeware
Mobile Attacks Android iOS Windows Phone is defined as software that allows
Mobile Malware Yes Yes No an attacker to leverage personal
devices to incur some type of fee or
Kernel Level/Jailbreak/Root Yes Yes No
charge, without the knowledge of
HW/USB Yes Yes No
the user until the bills begin to
Unwanted Apps Yes Yes Yes arrive. According to F-Secures 1Q14
Network Yes Yes No Mobile Threat Report, the SmsSend
Mobile Websites Yes Yes No trojan that sent texts to premium
Malicious Profile iOS N/A Yes N/A rate services accounted for 34% of
the detected threats on Android.
Source: Gartner (March 2015)
Ransomware restricts users from
accessing their devices until a fee is
Table 3 compares the categories of devices. Once the devices are in this paid to the creator of the malware.
mobile attacks and the operating elevated privilege mode, malicious ScareMeNot and ScarePakage, two
systems on which they have been applications will be able to modify mobile ransomware packages, were
discovered in the wild. the systems with admin-level access detected by Lookout in 2014 and
in some cases, not even prompting finished in the top five mobile threats
Jailbroken and Rooted Devices the user. Most MDM/EMM solutions for the U.S., U.K. and Germany.
Another common misperception claim to provide jailbreak/root
is that malware can only affect detection, but are not always effective Mobile Application Stores
jailbroken or rooted devices. This is due to the nature of the attack Nonstandard mobile application
not true. targeting the kernel of the OS. If the stores are among the largest sources
agents are running in standard user of mobile malware today. The
In recent years, there have been mode, they could be misled if the major OS providers have built
numerous malicious attacks on devices are rooted or jailbroken. application-vetting practices to help
nonjailbroken or nonrooted devices. defend against malware, which have
One example on iOS was the Android: The Largest Target dramatically reduced the number
WireLurker malware that began by of malicious programs in their
Android is currently the most
infecting Mac OS X systems and stores. But there are many users
targeted mobile operating system.
then waited for an iOS device to who leverage alternative mobile
Some of the factors that make it
be connected via USB. It then was application stores for Android
such a large target are the number
able to install additional malicious or iOS that do not have the same
of devices worldwide, the openness
software onto nonjailbroken devices. dedication to privacy. This practice
of the OS and the ability to run apps
On Android, researchers discovered is more common for users who
from multiple sources. One report
vulnerabilities in the base OS that have jailbroken or rooted devices,
from Kaspersky estimated 98.05%
would allow the malware to silently and some devices in markets where
of mobile malware was detected on
install and elevate privileges during the devices are purchased unlocked
the Android platform. They detected
system updates; these were called and then taken to the carrier for
175,442 unique malicious programs
pileup exploits. activation. Some of these carriers
in the first half of 2014.
The risks to mobile devices then install smaller or less-curated
One of the main motivations for application stores where the
increase if the devices have been
mobile attacks is profit. Along those applications may have a higher rate
jailbroken or rooted. Enterprise IT
lines, premium SMS-based attacks of infection.
organizations should consider this
continue to be in the top lists of most
before letting these types of personal
of the major threat reports. In 2014,
devices onto corporate networks,
the category of trojans were the most
or putting corporate information
detected type of attack on Android.
and applications on jailbroken
Some of the tactics leveraged by

10 A Smart Choice for a Mobile-Only Era Issue 10


Figure 2 Android Mobile Store Malware Infection Rates

Source: F-Secure

This problem does not only pertain In the Mobile Threat Report from Even though the Google Play
to Android. There are third-party F-Secure for 1Q14, 275 new threat and Apple Store have built highly
application stores for iOS as well. families were discovered for Android, functional mobile application
Cydia is the most popular alternative which made up 91% of all the curation, potentially unwanted
to Apples App Store. It requires discovered malware. Google has applications still exist in each
the device to be jailbroken for done a good job on monitoring the store. The 2014 Appthority App
the applications to be installable. security of their Play Store, but some Reputation Report revealed that
Cydia offers applications that Apple of the third-party stores such 78% of the top Android paid apps
has rejected for violating their as the ones in Asia and the Middle and 87% of the top iOS paid apps
curation processes or competing East (Mumayi, AnZhi, Baidu) that had at least one of the top 10 risky
with their applications, as well as repackage applications do not behaviors detected. This shows that
applications that allow for additional have the same stringent security even though Apple and Google are
configurations that Apple has blocked practices. Figure 2, from F-Secure,1 removing malicious applications
to mainstream users. This practice is shows that less than 0.1% of the from their application stores, mobile
more common in Asia, as it allows samples received from the Google developers are still able to create
users there to operate their devices Play Store were infected, versus up to applications that mine personal and
more effectively. 8% of samples from stores like Baidu possibly corporate data, and have
and even 33% from the small, private them published in the main stores.
Android159 store.

A Smart Choice for a Mobile-Only Era Issue 10 11


Mobile Security Solutions user, request device administration are very basic levels of protection
privileges, enable USB debugging compared with the capabilities
Mobile security solutions began with
mode, or enabling unvalidated app of server and desktop endpoint
basic anti-malware solutions based
mode. Any of these modifications protection solutions, largely due to
on signatures to detect malicious
can introduce more risk to the device the agents being at the kernel level to
applications primarily aimed at
in the longer term. On iOS, these detect threats.
the consumer market. There are
options do not exist, and Apple
a few vendors beginning to build Figure 3 maps out various mobile
blocks applications that require
enterprise offerings that allow for security solutions to provide
any type of elevated privilege,
corporate reporting, management protection for the mobile attack
so the mobile security vendors
and integration with MDM/EMM vectors discussed above.
focus on process monitoring, OS
solutions. With the lack of access to
version checking, theft prevention,
kernel mode, access or the lack of
basic security setting and profile Built-In Platform Protection
visibility into the different containers
monitoring, network monitoring, Modern mobile platforms, including
scanning for malware happens after
and safe Web browsing. Currently on iOS, Android and Windows, have
the install has occurred, which is
Windows Phone, the only third-party strong native controls that protect
too late. On Android, some of the
mobile solutions available target safe against initial infection and limit the
options to enable more visibility are
Web browsing applications. These impact of malware on the device.
to root the device and become a super

Figure 3 Mobile Security Solutions

Internet SMS/MMS

Network Service Enterprise


Cloud Storage
Corp
Storage

Antivirus Anti-
virus

Education Anti- MDM


and Training Malware Agent Enterprise
Security MDM/
Gateway EMM Wi-Fi

App Store App Risk USB


Mgmt Srvcs Antivirus

Unsecured Public Wi-Fi or


Stingray/Cell Phone Tower Masquerading

Source: Gartner (March 2015)

12 A Smart Choice for a Mobile-Only Era Issue 10


For more details on native security App signatures and app runtimes: Mobile Anti-Malware
controls for the most popular All code on mobile devices is Mobile anti-malware exists in many
mobile platforms, see Mobile signed. In some cases (such as flavors, yet all solutions have one thing
Device Security: A Comparison of iOS), the signature is placed by in common: The isolation between
Platforms. the device vendor, but in most apps does not allow any sensible in-
cases signatures are used to memory, third-party, anti-malware
In summary, native controls that may
uniquely identify the author. Some scans that are common in desktop OSs.
protect against initial installation of
platforms (BlackBerry, Microsoft) For most users, mobile anti-malware
malware include:
only allow access to sensitive solutions do not add sufficient value
App vetting: The major app stores resources if the app is signed by on top of native platform controls.
validate the security of apps before the vendor, while others allow Mobile anti-malware solutions can be
they are placed for download. the sharing of data between apps considered for high-risk environments
Moreover, when malicious signed by the same signature. or in situations where deployment
behavior is first detected after being channels other than the native app
Boot and OS integrity checks:
placed on the store, the application stores are used.
Most modern mobile platforms
may be removed from the store
check the integrity of the boot Two technologies have emerged on the
and, in some cases, removed from
files at boot time. Some mobile mobile device anti-malware market:
mobile devices.
platforms (for example, Samsung signature-based and signatureless
In-OS reputation check: In Knox devices) have implemented solutions.
Android, the Google Play service runtime integrity checks that
can check the reputation of any continuously validate the
Signature-Based Mobile Anti-Malware
Android app installed on a device authenticity of OS components
against a known good state. Mobile devices have different
(note that users may disable
approaches to anti-malware clients.
this). The app verification service
Isolation: With large differences Windows Phone includes Windows
checks apps independent of the
in implementations (through Defender, which cannot be replaced.
deployment channel, and supports
runtimes or OS separation), iOS does not allow for traditional
both install and periodical scans.
modern mobile devices isolate signature-based anti-malware solutions.
In Apple, Windows Phone and
apps from each other and limit This leaves Android, for which the
other mobile devices, third-party
access to sensitive and critical number of malware samples and the
solutions are required for checking
platform services. This limits number of market players have grown
the reputation of installed apps
the impact of a nonprivileged rapidly over the past three years.
(various EMM and app reputation
(malicious) app to access other Signature-based Android anti-malware
solutions offer this).
apps memory and storage. solutions are limited to static scans of
Even after users or devices have the Android application package (APK)
Native security controls in modern
downloaded a malicious app, the files on the device, which are restricted
mobile devices have been shown
following common native platform in storage size and generally cannot be
to be very successful in mitigating
controls limit the impact of the event: expected to have broadband Internet
malware risk. Native controls suffice
access for downloading millions of
Kernel security: OSs use kernel for protection against malware for
signatures. Some vendors are replacing
security features such as ASLR the most security-conscious users
the Android installer to help detect
and DEP to complicate privileged (no jailbreak, vendor app store,
malware before it is actually running
access after exploiting software up-to-date OS and apps, awareness
on the device. These solutions cannot
vulnerabilities. Some platforms, to detect VPN profiles, protection
access memory or network traffic, so
such as Android, move to against risky networks, etc.).
are reduced to the most basic scanning
mandatory access control. imaginable. Even with heuristics,
malware can easily evade detection by
using polymorphism.

A Smart Choice for a Mobile-Only Era Issue 10 13


Many Android anti-malware attack. Various solutions, such as Enterprise Mobility Management
solutions primarily target consumers Lacoon and Skycure, focus on these Even though EMM solutions do
and often combine anti-malware configuration-style attacks. not include anti-malware controls
with antitheft and privacy scanning themselves, their use is key in the
Another type of solution focuses on
features (like AVG). Nevertheless, detection and remediation of mobile
detecting the state of the device, which
some vendors (like Kaspersky) have malware. First, EMM agents may
version of the OS is installed, whether
enterprise support and integrate their include rootkit detection functionality
the device has a passcode, whether
solutions with EMM solutions or that can determine whether the
the device is rooted and what type of
as part of their enterprise endpoint mobile device was compromised
network sites are being visited. An
protection platform (EPP) solution. using a known rooting or jailbreak
example solution here is NowSecure.
Unfortunately today, most enterprise technique. Note that the detection
anti-malware offerings for mobile of unknown privileged malware is
devices only integrate with the Mobile App Risk Management
as difficult on a mobile device as it is
vendors own EMM, rather than The previous section showed that on- detecting rootkits on a desktop PC,
with the independent EMM leading device scanning is effectively reduced and most EMM agents will be limited
vendors. The trend seems to be to the most basic of signature scans: in their protection capabilities. Any
changing as the vendors see the value A verdict is based on a complete rooted or jailbroken device may be
of integrating with established players file (in Androids case) or even less denied access to corporate resources
to augment their solutions. information (in iOS). Other solutions or even remotely wiped through the
may use a cloud-based service, such as EMM platform.
Signatureless Mobile Anti-Malware solutions from Appthority or FireEye.
Another critical capability of EMM
Some vendors have acknowledged Cloud services provide security is the control and management of
the uselessness of signature-based information about specific applications. EMM may provide
scanning on mobile devices to protect applications, and most often provide inventories of all installed mobile
against unknown malware, and are more than just a malware verdict. applications and integrate with
exploring new detection methods to They also often include reputation a mobile app risk management
overcome these limitations. information (prevalence, age, risk solution to determine the risk level
score, privacy score). Once the for a specific device. The capability of
The first method focuses on the
application ID is determined (by EMM to manage applications beyond
detection of malware by machine
analyzing the binary, using an agent on inventories (that is, the installation
learning. The idea is that by
the device; or by integrating with an and deinstallation of applications)
building a model of known good
EMM application inventory feature), greatly differentiates between mobile
and known bad, and feeding it with
the app is compared to the cloud- platforms. Often, application control
all intelligence available, previous
based service list for a risk score. If is limited to managed applications
unknown malware can be detected by
the application is new to the service, (applications that are installed
observing the system state. Example
then the application is installed on a through the EMM), which are often
solutions in this space are Lacoon
virtual instance of the mobile OS in of limited use for detecting and
Mobile Security, Lookout and
the cloud, then analyzed for security removing malware. On supported
Zimperium.
issues. Based upon the analysis, a new platforms, EMM may be used to
Other solutions focus on detecting risk score is assigned and sent back deinstall malicious or potentially
compromised machines that may to the management console. In pure unwanted programs. For details on
not be due to malicious apps. For isolation, mobile app risk management the capabilities of app monitoring
example, an attacker may have cloud reputation services are not and controls per mobile platform,
focused on subverting DNS, or immediately usable for enterprise see Mobile Device Security: A
redirecting all traffic to their own users. Most often, they integrate with Comparison of Platforms.
server (VPN configuration on proxy mobility management and/or security
setting) or adding trusted root solutions, such as EMM or SWG for
certificates for a man-in-the-middle policy enforcement.

14 A Smart Choice for a Mobile-Only Era Issue 10


Network-Based Security support the management of app Awareness and education should
In many organizations, a constant deployment channels for more open teach users three things:
challenge is corporate-owned devices environments, such as Android
What not to do: Even in managed
versus BYOD. As malicious attackers (in practice, this often entails the
environments, users of mobile
target corporations, there is a real restriction to the official app store).
devices have various ways to evade
threat from outside mobile devices Apple, Google and Microsoft have
or disable security technology.
coming on to the enterprise network. programs and procedures in place
Users may try to change
An additional layer of defense to curate the applications in their
(corporate) proxy settings, install
to help mitigate some of the new stores. These vendor sites may still
new (potentially malicious) security
mobile attacks can entail network contain malicious applications,
profiles, remove corporate security
segregation by creating mobile-only but the time to remove them is
profiles, sideload applications,
wireless networks connected directly generally faster than the smaller
or even jailbreak or root a device
to the Internet, and not allowing third-party application stores. If
(see the Details section below for
access to the corporate virtual LANs your corporation uses enterprise
more information). Users should be
(VLANs). For more information on application stores for internal
made aware of the individual and
network access control, see Gartners mobile application development,
corporate risks for their actions.
Using NAC to Reduce Risk Related it is important to establish mobile
There is a broad spectrum of ways
to BYOD and Unmanaged Devices. app security verification procedures.
to accomplish this, from helping
Third parties such as Veracode, HP
Mobile devices used on the corporate employees protect themselves,
and IBM Security AppScan can scan
network via corporate gateways can recommending remediation actions
enterprise mobile applications for
be protected based on the observed or mandating policy upon access to
possible threats and vulnerabilities
network traffic. The same holds the enterprise.
before release to the enterprise
for managed mobile devices, where application store. For more What events to watch for: Educate
traffic can be redirected to cloud- information, see Gartners Six users to detect events that may
based SWGs such as Zscaler. Principles of Comprehensive Mobile indicate malware or unwanted
App Security Testing. applications, such as requests for
SWGs or next-generation firewalls
(NGFWs) expand their support for excessive permissions, unexpected
mobile devices. Gateways will be able Education and Training pop-ups and messages with
to identify mobile apps based on the Users are critical agents for detecting suspicious links. Users should
observed traffic or the download of any type of security breach, also understand the approved
applications, add risk scores to these potentially unwanted applications sources for applications, such as an
apps, and block specific functionality and mobile malware. Users often are enterprise repository or the main
for apps (for example, to allow seen as the detection agent of last vendors application store.
the use of a file sync solution but resort, but awareness and education
How to respond to events: A
block the upload of files). For the can transform users into a detection
concise, documented and tested
detection of malware in unknown agent of first resort. It becomes
process for incident management
applications, some solutions include critical to educate users to the risk
and response must be part of any
network sandboxes that can detonate to themselves and the separate risk
user education process. Help desk
unknown mobile apps. to the company by their actions on
contacts should be at the fingertips
their mobile devices. For example,
of all users on each of their devices.
Mobile Application Stores if a user installs a highly rated
Incident response greatly depends
flashlight application that has every
Managing and monitoring which on the mobile platforms: Some will
possible access on the mobile device,
application stores are enabled on only allow for user notification
what is the risk to their personal
mobile devices becomes critical (please deinstall that malicious
information and then the possible
to reducing the unwanted and app), while others allow for full
impact if the user brings that device
malicious apps installed and remote management of the mobile
into the enterprise? A basic flashlight
possibly propagated into the device (sit back and wait while we
application should only have access
enterprise. EMM solutions typically fix the issues).
to turning the flash on and off.

A Smart Choice for a Mobile-Only Era Issue 10 15


Guidance Another option is to leverage a User awareness training will not
network isolation strategy for solve the issue completely, but
Protect against these new types of
mobile devices for example, it will help at the root of the
attacks and deal with the challenges
a mobile-only wireless network problem. Most users do not ever
of the mobile operating systems by
with Internet-only access. Another read the access requirements when
taking the following steps:
option would be to leverage a installing applications on their
1 Evaluate the risks and new tactics SWG or NGFW between the mobile devices. One way of gaining
being leveraged on mobile devices mobile and corporate networks. understanding of the risk is to
by malware. These network-based options do position the training as beneficial
not eliminate the mobile malware to both the individual and the
The first step is to better or unwanted application problems, enterprise. As users become aware
understand how the new mobile but they can provide a buffer to the of the personal risks that many of
attacks can gain access to enterprise. The other connectivity their favorite applications have
corporate resources. The attack vectors should also be considered to their own privacy, position the
vectors and effectiveness vary when planning the mobile security possible risk their applications can
by mobile OS, user behavior, strategy, such as USB connections, have to the enterprise. An educated
applications installed, state of the public cloud synchronization, email user can help reduce the risks to
device and the networks the device and other collaboration solutions. themselves and to the enterprise if
has connected to. This is where other compensating they do not install, for example,
controls will help reduce the risk of the flashlight application that has
The next step is to understand the the mobile device attack vectors. full access to their devices.
business requirements for mobile
2 Verify applications are installed
devices and what type of access The Details
only from trusted sources (Google
they require. There can be
different strategies and solutions
Play, Apple Store, Windows Store Jailbreak, Rooting, Device
for BYOD versus fully managed
or eEnterprise apps stores). Administration and Sideloading
corporate devices. Jailbreaking, rooting and sideloading
As we have seen, mobile are processes for bypassing access
2 Look to mobile device security applications from third-party controls and elevating account
solutions with cloud-based application stores have a higher privileges. These actions are
application reputation services and rate of infection. To help reduce employed to change carriers without
integration with current MDM/ the risk, look for ways to permission, to activate tethering
EMM solutions. determine the application sources. without permission from a carrier, to
On Android, configuration settings install unauthorized and/or pirated
Next, map out the strategy and can verify that applications are apps and services, and to change
solutions required to defend against installed from the Play store. On the user experience. File systems
the new types of attack vectors. iOS, the device must be jailbroken on altered devices may be left in a
Unfortunately, as we have seen to use a third-party app store. vulnerable access state, and unwanted
in Table 1, there are no complete There are solutions that can processes may be active. For example,
solutions to defend against all manage these settings and report Secure Shell (SSH) may be running
the new attack vectors. It takes on the configuration of the devices with a default password.
a combination of new mobile and installed applications.
security solutions and integration Jailbreaking Jailbeaking is
4 Deliver training to drive user modifying iOS to allow file
with existing device management
awareness of which permissions system read/write access, as well
and endpoint protection solutions.
mobile applications are requesting. as to bypass various safeguards,
This approach can help reduce including protected APIs and code
unwanted applications from being verification. Jailbroken devices can
installed. run applications and services not
approved by Apple, from sources
outside of Apples App Store.

16 A Smart Choice for a Mobile-Only Era Issue 10


Rooting Rooting refers to Mobile Attack Examples by OS NotCompatible This is a
obtaining administrative, system trojan that creates an encrypted
root or superuser types of privileged Android proxy capability that, once run
access for the Android OS, in a In 2014, there were a number of new inside a corporate network,
manner similar to Linux. The OS and families of mobile malware detected could enumerate networks or
device firmware may be replaced or on the Android OS. F-Secure reported communicate and infect others in
significantly modified on a rooted the following examples: a large-scale C&C network. This
device. malware is spread on Android
Droidpak This trojan targets devices that have the unknown
Device administration mode the mobile banking industry source option enabled.
Android 2.2 introduced support for by leveraging Windows PCs to
enterprise applications by creating transfer the malware via USB to TowelRoot and TowelExploit
specific APIs to manage security Android devices. Variants included These are root exploits that contain
policies, prompt for net password Trojan-Spy:Android/Smforw.H or elevation of privilege code that will
setting, lock the device and perform Trojan:Android/Gepew.A or .B. grant device administrator access
remote wipe. Mobile security and then allow bypassing of a
vendors and EMM solutions may Tor Trojan Torsm.A is the devices security settings.
request this level of elevated access. first trojan to leverage the Orbot
open-source client of the Tor BasicSystemSpy This is a
If a malicious application achieves
anonymizing network to connect to surveillance malware that collects
this level of permission, it can then
the Command and Control (C&C) device information. It can also
attempt to hide itself from the device
server. activate the microphone of the
administrator list of applications,
compromised device and record
which can make it very difficult to
Oldboot.A This is believed to audio.
remove without a full wipe.
be the first detected Android boot
kit. This malware was mainly There were also instances of more
Sideloading Sideloading is the
detected in China and spread sophisticated trojans that combined
practice of installing programs
through firmware updates to affect different types of attacks into one
onto a device outside of the control
the earliest parts of the device boot malware package. Kaspersky detected
and restrictions of an authorized
process. Backdoor.AndroidOS.Obad.a in
app store. Sideloading originally
2013. This malware can send SMS
referred to apps loaded by a direct
Dendroid.A This is a toolkit to premium rate numbers, and
connection, such as a memory
for creating remote access trojan download and install other pieces of
card or a USB drive, but has been
(RAT) that allows malicious malicious code, while propagating
generalized to refer to installations
users to create trojans that can to other devices via Bluetooth and
from unauthorized sources, such as
remotely infect the audio and video remote console code execution
a designated app store. For Apple
functions on Android devices. capabilities. Once the malware is
devices, jailbreaking is usually a
This back door was able to evade on a device, it tries to obtain device
prerequisite for sideloading apps.
Google Play Store security checks. administrator privileges and hide
Android has a user-selectable setting
itself from the device admin list
that allows apps from unknown 2014 saw the increase of enterprise-
by exploiting some Android OS
sources. Access to that feature may be specific mobile malware attacks. The
vulnerabilities.
modified by the device maker. following attacks were discovered
[See the Wikipedia entry for Sideloading and by Lookout, targeting enterprises in
the Open Web Application Security Projects the U.S. They estimated 6.4 million
Mobile Jailbreaking Cheat Sheet for further
discussion.]
Android devices were possibly
affected by these attacks:

A Smart Choice for a Mobile-Only Era Issue 10 17


iOS Windows Phone Windows Phone, they were focusing
In November of 2014, Palo Alto Currently, no confirmed mobile on Android and iOS. Some of them
Networks published a paper on malware affects the Windows Phone stated that if there were changes in
WireLurker, a family of malware 8.x platform. This is not to say there numbers and customer demands, they
that leveraged the Mac OS X USB will not be in the coming years. would start investigating possible
channel to attack connected iOS There are a few possible explanations solutions for the Windows Phone
devices. The malware monitors for this statement. Windows Phone platform.
the USB port for any iOS device devices are currently a distant third
connections and then installs a third- place to Android and iOS in sales
Evidence
party application onto the device. figures. Since there are billions of
1
F-Secure Threat Report, H2 2013
This exploit will work even if the Android and iOS devices in use, it
F-Secure Mobile Threat Report
iOS device is not jailbroken. This makes sense that malicious attackers
Q1 2014
was initially detected in 467 OS X will spend more time developing
applications in the Chinese Maiyadi malware for those platforms. As Cisco 2014 Annual Security Report
Mac application store. for unwanted applications, there
are instances of applications, such Fortinet Threat Landscape 2014
iPhoneOS/Adthief.A This
as flashlight apps, that request Lookout: Enterprise Mobile Threats,
is an adware-based trojan that
more permissions than should be 2014
leveraged a suspicious library
necessary to work. Microsoft has
in a popular app development
built Windows Defender into the Source: Gartner Research Note G00271349,
framework. This malware Patrick Hevesi, Mario de Boer, 4 March 2015
Windows Phone 8.x architecture,
required the iOS device to be
and has announced that a version
jailbroken. It then hijacked
of Windows 10 will be available on
advertising modules to display its
the phone, based upon the Windows
own ads.
NT kernel architecture. It will be
FinFisher mobile remote access interesting to see how many of
trojan (mRAT) This leverages the security features will become
a stolen developer certificate to available on the phone, and whether
exploit its attack. any of the desktop EPP solutions
could be leveraged on the phone
iOS leverages profiles to store platform.
enterprise settings and certificates. If
a malicious attacker gains access to The mobile security solutions
a valid Apple developer or enterprise developed for Windows Phone center
certificate, they can use phishing around secure Web browsing, as
techniques to have nonjailbroken there is limited access to the kernel
devices install malicious profiles space from non-Microsoft developers
from websites. The attacker can to add anti-malware solutions. There
then embed signed root certificates are numerous other security features
in these new profiles. Once installed built into Windows Phone for
by the end user, they will give example, when attached through a
the attacker full control of the USB port to a Windows PC, access
iOS device along with decryption is limited to only the user portions
capabilities to all the network traffic. of the file system and blocked
These types of attacks are very from the root directories. At the
dangerous and can allow full remote time of this research, many mobile
execution of applications on the security vendors stated that due to
infected devices. lower worldwide sales numbers for

18 A Smart Choice for a Mobile-Only Era Issue 10


About AhnLab, Inc.
AhnLab creates agile, integrated internet security solutions for corporate
organizations. Founded in 1995, AhnLab, a global leader in security, delivers
comprehensive protection for networks, transactions, and essential services.
AhnLab delivers best-of-breed threat prevention that scales easily for high-speed
networks, by combining cloud analysis with endpoint and server resources.
AhnLabs multidimensional approach combines with exceptional service to
create truly global protection against attacks that evade traditional security
defenses. Thats why more than 25,000 organizations rely on AhnLabs award-
winning products and services to make the internet safe and reliable for their
business operations.

A Smart Choice for a Mobile-Only Era is published by AhnLab. Editorial content supplied by AhnLab is independent of Gartner analysis. All Gartner research is used with Gartners permission,
and was originally published as part of Gartners syndicated research service available to all entitled Gartner clients. 2015 Gartner, Inc. and/or its affiliates. All rights reserved. The use of Gartner
research in this publication does not indicate Gartners endorsement of AhnLabs products and/or strategies. Reproduction or distribution of this publication in any form without Gartners prior written
permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of
such information. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice
or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in
Gartner research. Gartners Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence
from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website,
http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp.

A Smart Choice for a Mobile-Only Era Issue 10 19

You might also like