Your Most Vulnerable Attack Surface Is… MOBILE CHRIS BOYKIN CHIEF TECHNOLOGY OFFICER

©2015 Check Point Software Technologies Ltd. 1 WE ARE EXPOSED

©2015 Check Point Software Technologies Ltd. 2 TRUTH BYOD is on the rise…

According to IDG,

36 percent of businesses fully support employee-owned mobile devices in the workplace

46 percent of workers use their personal mobile devices for work

Mobile Devices increase Security Risks

©2015 Check Point Software Technologies Ltd. 3 MOBILE THREATS are ESCALATING in frequency and sophistication

Man-in-the-Middle attacks affecting any mobile wireless devices, regardless of OS

EnPublic Apps on iOS pose a serious threat Malicious iOS Profiles

96% of mobile attacks target Androids 5.6% of 500 most downloaded apps leak data

Sophistication of mobile threats on the rise: , Masque Attack, Wirelurker. Pangu, , xSSer mRAT, and more

4 ©2015 Check Point Software Technologies Ltd. ©2014 Check Point Software Technologies Ltd. 4 HOW MOBILE DEVICES GET INFECTED?

©2015 Check Point Software Technologies Ltd. 5 3 MAIN VECTORS OF ATTACK

Network Attacks Infected Apps OS Exploits

©2015 Check Point Software Technologies Ltd. 6 Network Attacks

©2015 Check Point Software Technologies Ltd. 7

MAJOR Hummingbad Trident MOBILE ATTACKS (Pegasus) Infected Apps VikingHorde Turkish Clicker DressCode

2016

©2015 Check Point Software Technologies Ltd. 9 CAN YOU TRUST 3rd PARTY APP STORES?

25PP.com vShare.com more than 40M users, 40M users, 25% iOS. 8M downloads a day 15,000 iOS apps ©2015 Check Point Software Technologies Ltd. 10 HUMMINGBAD: 10M INFECTED DEVICES Malaysia, 113096 Ukraine, 117287 Algeria, 130129 Colombia, 137131 Vietnam, 137328 Egypt, 140007 China, 1606384 Romania, 147632 Nepal, 172327 Pakistan, 188758

Russia, 207940

Bangladesh, 209706

Thailand, 260128

United States, 286800 India, 1352772

Mexico, 325208

Brazil, 366566

Turkey, 448285 Indonesia, 489336 Philippines, 520901

©2015 Check Point Software Technologies Ltd. 11 POKEMON GO Recompiled with

©2015 Check Point Software Technologies Ltd. 12 Organizations experienced a security breach 39% through mobile 24% Downloaded Mobile devices have mobile malware connected to

©2015 Check Point Software Technologies Ltd. Source: 2016 BYOD and Mobile Security Report, Crowd Research Partners malicious Wi-Fi 13 TRIDENT- THE NEXT LEVEL OF iOS THREATS • Researchers from revealed an attack on a UAE human rights activist’s iPhone. • A spear phishing SMS leveraging three Zero-Day vulnerabilities. • When clicked, the device is automatically Jailbroken and installs Pegasus . • Affects iOS 7.x – 9.3.4 OS Exploits

©2015 Check Point Software Technologies Ltd. 14 USE CASES

©2015 Check Point Software Technologies Ltd. 16 BUSINESS MANAGER HAD A MALICIOUS APPLICATION. What could a cyber attacker do?

Extract emails, contacts, calendar

Turn on microphone during strategic partner meeting

Turn on the Camera

©2015 Check Point Software Technologies Ltd. 17 RESEARCHER HAD A CREDENTIAL STEALER ON HER DEVICE. What could a cyber attacker do?

Steal username and password of VPN

Extract data typed in corporate applications

©2015 Check Point Software Technologies Ltd. 18 EXECUTIVE WAS MAN-IN-THE-MIDDLE ATTACKED WHILE AT CAFÉ. What could a cyber attacker do?

Capture corporate emails

Intercept VDI sessions

©2015 Check Point Software Technologies Ltd. 19 WHEN CYBERCRIMINALS GET IN WHAT’S THE WORST THAT COULD HAPPEN?

Extract Information Track Device Location (phone & text logs, contact lists, (follow comings and goings) browser history, etc.)

Turn on the Microphone Send Email and SMS Messages (eavesdrop into conversations) (impersonate the user)

Turn on the Camera Change PIN and Lock Device (look around, steal images) (hold device for ransom)

©2015 Check Point Software Technologies Ltd. 20 How can it happen?

©2015 Check Point Software Technologies Ltd. 21 ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 22 ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 23 ©2015 Check Point Software Technologies Ltd. User (CEO) 24 [Restricted] ONLY for designated groups and Hacker User ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 25 Hacker User ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 26 Hacker User ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 27 Protect Yourself… Don’t jailbreak or root your devices Use Apps from Official Stores Keep your OS Updated Avoid “free Wi-Fi”

©2015 Check Point Software Technologies Ltd. 28 Corporate Protection Enterprise Mobility Management (EMM) Network Access Control (NAC) Mobile Threat Prevention (MTP)

©2015 Check Point Software Technologies Ltd. 29 Enterprise Mobility Management Mobile Device Management (MDM) Mobile Application Management (MAM) Mobile Content Management (MCM)

©2015 Check Point Software Technologies Ltd. 30 Network Access Control Visibility Control Orchestration

©2015 Check Point Software Technologies Ltd. 31 Mobile Threat Prevention MITM Detection/Avoidance Identify and Block Malicious Apps Cloud Sandboxing of Apps Threat Scores for Apps Behavioral Analytics

©2015 Check Point Software Technologies Ltd. 32 Thank You

CHRIS BOYKIN CHIEF TECHNOLOGY OFFICER

©2015 Check Point Software Technologies Ltd. 33