Thoughts on Malware for Mobile Devices
One of the reasons that I love going to conferences is that it really makes me think. Being around some of the best minds in information security. talking to people, listening to thier views and re-evaluating my own opinions based on any new information is a big takeaway for me.
For those who were not at SANSFire this year and didn't otherwise follow the Handler's annual State of the Internet Panel, one of the questions asked of the panel was (and I'm paraphrasing because I can't remember the exact word for word question) "Every year we hear a prediction that this will be the year that mobile malware becomes wide spread. Do you think that will happen this year?"
I remember giving some answer along the lines of "Well, we've already had a few examples" and one of the other Handlers cited the malware infested apps that became available (breifly) from the iTunes Store. The panel concluded and we all went about our business but something was nagging me. Something just didn't feel right.
I started talking to a few friends discussing mobile security and then looked at my own devices.
How would I really know if there was malware on my smart phone?
Malware authors have become increasingly good at hiding the presence of malware on infected systems and I didn't have anti virus on my phone, a problem which has since been corrected. But given the problems with signature based AV protection, do I really have confidence that I'm protected?
How do we really know that mobile malware is not widespread right now?
Please take a moment and answer the poll that I've posted and if you have some creative ways you're protecting your mobile devices, send them in and I'll post them.
While 130 people is not a statistically large sample we do have some interesting preliminary results.
Of 130 people, only 15 are scanning for malware.
Of those 15, 3 (20%) have detected malware.
If you extrapolate that percentage out to the entire sample, 23 people who responded who do not scan would be infected with malware.
For now, I'm filing that under "Things that make you go Hmmmmm."
Christopher Carboni - Handler On Duty
Comments
http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=225402185&cid=RSSfeed
Patrick W. Barnes
Jun 22nd 2010
1 decade ago
Almost every mid size companies in Japan have their mobile web sites. What I see here is, users frequently access mobile sites no less that they access web sites in their PCs.
But I rarely hear any incidents about mobile sites being used to distribute malware or something like that.
One of the reasons is that, mobile browsers support no Javascript or very restricted version.
Maybe "no script" playing a decisive role in this matter?!
Not in Japan
Jun 22nd 2010
1 decade ago
The installation or flash process would have to be possible without using software within the phone OS; a minimal read-only BIOS, or a USB or serial interface that can access onboard storage hardware directly (ie. not via a software USB mass storage emulation) ought to suffice. This way it shouldn't be possible to brick the device, either, because it should be possible to re-flash with a working image if something goes wrong.
I'm not sure why smartphones tend to be so deliberately resistant to this; it seems that telco's, hardware manufacturers, and quite possibly the phone OS distributors conspire to keep the hardware drivers (particularly the GSM/UTMS/HSDPA hardware) proprietary and OS usually locked-down.
The Sharp Zaurus ought to have been great if it had ever evolved into a smartphone. OpenMoko made some progress. I'm hoping the Nokia N900 is a step towards a more mainline Linux distro running on a phone, with hopefully less closed-source code.
Steven Chamberlain
Jun 22nd 2010
1 decade ago
dsh
Jun 22nd 2010
1 decade ago
My problem is trust; I'd rather have absolute control over my device. It's like I probably wouldn't trust a library/cafe computer with private data, passwords etc.; I'd be much more comfortable using my own device, and using crypto on any shared Internet connection provided to me.
An iPhone is therefore like the library/cafe computer where Apple is your (trusted?) sysadmin. And you maybe don't even know how secure the communication is; a lot of private data such as Facebook traffic could be going out plaintext, so you're trusting your telco with that too.
Steven Chamberlain
Jun 22nd 2010
1 decade ago
ashcrow
Jun 22nd 2010
1 decade ago
John Hardin
Jun 22nd 2010
1 decade ago
bcave
Jun 22nd 2010
1 decade ago