200 likes | 214 Views
Explore the risks in mobile financial services including malware, fraud, and compliance issues. Learn about examples like ZeuS botnets and how to protect against them.
E N D
Privacy & Trust in Mobile Financial Services Gavin McWilliamsEngineering Manager
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Threats to Mobile Financial Services • Compliance & RegulationCustomer data loss, mandatory public disclosure, reputational damage • Market FailurePoor user adoption rates, resurgence of existing technology • Mobile MalwareBanking virus infection, mule accounts, money laundering • Technology FailuresCracked crypto keys & hardware security modules • FraudEnd user and/or retail fraudulent use of services
Mobile Malware • 75% new malware targetted at Android • RIM now porting Android Apps to Blackberry • 36% SMS Trojans • Premium rate message services • Relatively unsophisticated • Limited attempts at code obfuscation • 42,000 reported cases of fraud in 2011 • Official Marketplaces are Protected • Google Bouncer • iTunes commercial chain • Off-piste danger…
Mobile Malware Eco-System (UK) Mobile Handset Manufacturers RegulatorOfcomPhonePayPlus Law Enforcement Agencies Mobile System Software Anti-Virus Vendors Mobile Marketplaces Content Aggregators PRS Resellers Information Commisioner’s Office AppDevelopers Mobile Network Operators
Mobile Malware Eco-System (UK) PCSystemSoftware SoftwareDevelopers Broadband NetworkOperators Law Enforcement Agencies Anti-Virus Vendors Mobile Marketplaces Content Aggregators PRS Resellers PCManufactures Information Commisioner’s Office RegulatorOfcom
Learning Points from Broadband http://www.dataprotectioncenter.com/security/web-threats-trends-and-statistics, 2011
Example Botnet – ZeuS • Trojan first observed in middle 2007 • HTTP as command and control mechanism • Targets mostly financial institutions (online banking) • Spreads through social engineering attacks e.g. spam campaigns and phishing • Polymorphic: signature-based detection difficult • Suicide-trojan: able to self-destruct • Activity increased by 130% between 2009 and 2010
Example Botnet - ZeuS • Recently merged with SpyEye, dubbed the ZeuS killer! • Ice IX botnet based on ZeuS’ older source code • January 2012: ‘Gameover’ malware traced to maker of ZeuS • More distributed C&C (P2P) • Launch DDoS attack against targets (e.g. bank, financial institutions) immediately after stealing money • Diversion: while target deals with attack, criminals launder money (e.g. by purchasing jewelry)
Broadband ISP response to Botnets • US Anti-Bot Code of Conduct for Internet Service Providers (A Voluntary Code) March 2012 • …an ISP will engage in at least one activity in each of the following general areas: • EducationIncrease end-user education and awareness of botnet issues • DetectionIdentify botnet activity in the ISP’s network • NotificationNotify customers of suspected bot infections • RemediationProvide information or assist end-users in remediating bot infections • CollaborationShare with other ISPs feedback and experience learned
The Botnet Challenge • Can Mobey Forum do better ? • 5 billion mobile handsets • Much bigger problem than ISPs • One clear target for malware developers • Windows XP all over again • Customer base who don’t understand Android Manifest files • Can’t judge what services are appropriate for an App • Big Advantage: Handsets are portable and can be brought to a remediation service • Detection of malicious traffic in Mobile Operator Networks
C&C Periodicity 1 XP SP3 GET requests every 3600s (default) POST requests every 1200s (default) C&C Periodicity 2 XP SP2 Packet size GET/POST requests sizes constant within host Pattern observed: x, x-1, x-1, x-1, x-1 (XP SP2); x, x+1, x+1 (XP SP3) ZeuSTraffic Detection
Gavin McWilliams Questions? Questions?