Assessing the State of Mobile App Security
Total Page:16
File Type:pdf, Size:1020Kb
● Assessing the State of Mobile App Security Abhinav Kumar Abstract All IT-enabled businesses today are moving toward Artificial Intelligence (AI) driven personalized digital experiences for their customers. This implies a critical need for customers’ trust in the underlying technology. At the same time, it has been observed that cybercrime is growing at an alarming rate and is shaking customers’ trust in enterprise applications. In the BFSI domain, mobile devices have emerged as soft targets. They often carry high value, confidential data of upper-end users, can be connected to the Internet, and have powerful processors to run the apps. Such attributes make mobile phones easy targets for professional hackers. Organizations must have a robust incident monitoring and response plan to minimize damages and recover from cybersecurity incidents. www.coforgetech.com Cybersecurity: Current State b. Application file system and database (SQLite etc.) c. Configuration profiles, digital certificates etc. As per Identity Theft Resource Center’s (ITRC) report, the total number of reported data breaches increased by 40% from 781 incidents in 2015 to 980 incidents in Major Threats 2016. The number of incidents is already at 1022 as There are primarily three attack vectors for mobile of September 21, 2017. The total number of records apps: Network, OS vulnerabilities, and Malware. These compromised in the financial sector during 2017 is are used to launch attacks on larger groups of targets already touching 2,780,837 from mere 71,912 last year. and have far-reaching implications. Today, malware This clearly indicates that the financial sector is now a programs are the most commonly used mode for focused target for cybercriminals. cyberattacks. Mobile: Hackers’ Prime Focus Threats on Android Cybercriminals today are highly skilled and resourceful. is an Android malware that tampers with They primarily target mobile phone users for data, Hiddad legitimate apps published on third-party stores. Attackers identity, and gaining remote access for further attacks. use it to gain access to user data. The goal of a hacker is to identify logical flaws and weakness in technologies for unauthorized access using HummingBad is another Android malware that uses various techniques including: rootkit method to install malicious applications such as keylogger, and can even penetrate enterprises security 1. Binary Code Analysis to access confidential email. a. Reverse engineering to understand the binary b. Embedded identities and key-generation routines Ztorg is a Trojan that uses privilege escalation to install applications without the user’s knowledge. 2. OS Exploits and Vulnerabilities a. Embedding malware b. Mobile botnets Threats on iOS 3. Network Communication AceDeceiver is an iOS malware developed to exploit a. Data being sent or received from a server design flaw in FairPlay (Apple’s DRM system) and 4. Log Files install malicious apps on iOS devices. This “FairPlay a. Crash logs, network, and system error logs Man-In-The-Middle” attack was initially used in 2013 for 5. Data Storage pirated apps, but has now transformed into a channel for a. Key stores used for encryption spreading malware. Pegasus is an iOS malware that scans the target device and installs additional software for listening to calls, capturing camera, recording login keys, and accessing contacts, emails, and messages. It is like a Swiss army knife for hacking. Its capability can be judged by the fact that it can disguise itself and even destroy itself if it finds the target to be uninteresting. Few Noteworthy Cases of Mobile Data Breach Some of the major data breach incidents on mobile are outlined below, providing a glimpse into the extent of compromised security and underlying threats. ● Gooligan is a variant of the “Ghost Push” family of malware that uses Towelroot and VROOT Android OS exploits to inject malicious code into Android system processes in order to gain root access. It is known to affect various versions of Android OS 4 and 5, which made up 74% of the devices in the market during fall of 2016. ● FalseGuide attack started in November 2016 but became evident in April 2017. It was found embedded in guide applications for popular mobile games, including Pokémon Go, and is known to have affected two million users. Over 600,000 users 2 2 were tricked by it into joining Android botnet that sensitizing users on information security is important, could be used to launch DDOS attacks. it is also necessary to implement mobile application ● BankBot is a banking Trojan that targeted customers security in a way that is both strong and easy to use. of over 400 banks including Citibank, ING, ABN, Rabobank, ASN, RegioBank, and BinckBank, Security vs. Usability among others. BankBot was also able to intercept text messages and delete them from the victim’s The bulk of mobile apps these days has a deficient mobile in order to bypass 2FA security implemented approach to addressing information security, because the by banks. It is reported that BankBot’s code was apps offer neither reliable protection nor an aesthetically leaked through an underground forum, and experts pleasing interface. According to Verizon, 63% of the fear a spike in the number of mobile attacks based attacks in 2016 involved compromised passwords. We on enhanced versions of the leaked code. see that, passwords can turn problematic as they can be stolen in scalable attacks. As an alternative, stronger security methods like OTP are safe but inconvenient. Implications of Data Breach The divide between security and UX can be addressed It is hard to put a dollar figure against any data breach by mobile device’s hardware features like fingerprint because the loss is more than monetary. It includes scanner. This implies that users are compelled to trust associated intangible losses such as those of reputation, original equipment manufacturers (OEMs) like Apple brand value, and customer trust. Experts are of the and Google. This may be debatable from a privacy opinion that less-obvious costs like increased insurance perspective because Google gathers a good deal of our premium start showing up a little late. data for monetization, whereas Apple’s business model relies on selling phones rather than data, thus allowing better balance of security in its design. The security Case of Sony Data Breach challenge then moves to taking reliability to the service The Sony data breach included employee login details, provider authentication at the backend. e-mails exchanged between employees that revealed their viewpoint on prominent personalities, information about executive salaries in the company, and critical App Security by Design details on company strategy. Two employees also filed Mobile apps must have security in the design and this a Federal court complaint against Sony Pictures for not must be built earlier in the development cycle, not as an taking enough precautions to keep employee data safe. aftermath of penetration testing result. Mobile developers Analysts at Macquarie Research put the estimated cost should adapt to secure coding practices and leverage of the data breach at USD 83 million, but the loss that the recommended approach to deliver trustworthy apps. went unaccounted was Sony’s strained relations with The goal of mobile app design for the enterprise must people and businesses that it worked with. be focused on mitigating the risk of exposing sensitive data through a compromised mobile app. This can be Case of Yahoo Data Breach achieved by minimizing the amount of data exposed through the functionality delivered to the user. “Secure In the last quarter of 2016, Yahoo reported that over yet easy to use” is a crucial ingredient of great mobile 500 million user accounts were compromised, causing apps. a major embarrassment for the company. Following the breach discloser, Yahoo’s valuation dropped from USD In order to eliminate the risk, designers can always list 4.8 billion to USD 4.48 billion during its sale agreement down the design choices in code—protocols, algorithms, with Verizon. data formats—and prepare a security implementation checklist mapped with identified mobile vulnerabilities. Mobile Security Trends Mobile App Security: Some Best practices According to Gartner, mobile attacks are increasing and the biggest concern is mobile malware, as a majority of Countering cybersecurity threats requires an such attacks is attributed to malicious software. Mobile understanding of vulnerabilities in the current technology users often visit compromised websites and install apps and in the ways in which people use that technology. from sources other than Apple and Google stores. While Listed below are some best practices for building secure 3 mobile apps: ● Minimum Privilege Policy ● Developer Awareness A mobile app must always obtain the minimum Mobile developers must be trained and sensitized privilege level necessary to execute its functions. about implications of an app security breach. They Higher-level privileges must be denounced must remain cognizant of security controls like immediately after the use is over. Cryptography, TLS, and Keychain storage. ● Secure Coding Practices ● Secure Data Storage All application code review processes must include Sensitive data must be identified and not stored a checklist for secure coding practices for Android anywhere unless necessary. If it becomes as well as iOS. necessary to store sensitive information, it must first ● Binary Hardening be encrypted using password-based algorithms, Third-party tools like Arxan—Application Protection and the password should be combined with salt and for Mobile—or IBM Security Trusteer Mobile SDK pepper and kept in a different data store than the must be considered for binary protection. secure information itself. ● Code Obfuscation ● Secure Communication Code obfuscation tools must be used to prevent Any data exchange over the network must be reverse engineering. executed using protocols like TLS 3 or later. When ● Security Audit communication is with a known server, certificate Code auditors must be employed to help identify pinning check must be implemented.