SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
© 2015 IBM Corporation
IBM Security
1© 2015 IBM Corporation
X-Force Security Intelligence Findings:
Vulnerabilities in Mobile Dating Applications
Tom Mulvehill
Caleb Barlow
Eitan Worcel
IBM Cloud & Mobile Security Teams
© 2015 IBM Corporation
IBM Security
2
Today’s Agenda
• Overview of Mobile Security Risks
• Mobile Dating App Vulnerabilities: A Closer Look
• Mobile Dating App Vulnerabilities: Methodology &
Impact of Vulnerabilities
• Questions-and-Answers Session
3 © 2015 IBM Corporation
Overview of Mobile Security Risks
© 2015 IBM Corporation
IBM Security
4
 Data leakage
– Attack from malware
– Account info. on
mobile device
 Cracking mobile apps
– Easy access to
applications
– Reverse engineering
 Little to no App control
– BYOD
– Consumer devices
User vs. Enterprise Risk
 Threat from Malware
- Trojans and Spyware
 Phishing
 Fake Android marketplace
- Malware bundled with app
 Unauthorized Use of:
- Contact DB
- Email
- SMS (text messages)
- Phone (placing calls)
- GPS (public location)
- Data on device
User Enterprise
© 2015 IBM Corporation
IBM Security
5
Mobile Security Concerns
• Mobile security is broader than device management.
© 2015 IBM Corporation
IBM Security
6
Risk from Mobile Malware’s Real & Growing
© 2015 IBM Corporation
IBM Security
7
Reverse Engineering & IP Theft Risk
• 97% of top paid Android apps have been hacked
• 87% of top paid iOS apps have been hacked
• 80% of the most popular free Android apps have been hacked
• 75% of the most popular free iOS apps have been hacked
Source: State of Security in the App Economy
- “Apps Under Attack” (Dec 2014)
© 2015 IBM Corporation
IBM Security
8
 Sophistication of attacks increasing
 New versions of Android OS helping to reduce risk, but…
 … Android market is still very fragmented.
Android & Platform Risk
Android – February 2015 iOS – February 2015
https://developer.apple.com/support/appstore/
https://developer.android.com/about/dashboards/index.
html?utm_source=ausdroid.net
2014 1.6%
2013
2012 2010
2014
© 2015 IBM Corporation
IBM Security
9
Mobile Permission Risk
 Permissions vary by
OS & release
 Users don’t
understand
 Developers over
permission
Android
Pileup Flaw
© 2015 IBM Corporation
IBM Security
10
OWASP Mobile Top 10 Risks (RC 2014 V1)
https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks
11 © 2015 IBM Corporation
Mobile Dating App Vulnerabilities:
A Closer Look
© 2015 IBM Corporation
IBM Security
12
Key Findings in IBM’s Analysis of Mobile
Dating Apps on Android Devices
About the Organizations:
 50% of enterprises have popular apps present on devices that
accessed confidential business data.
About the Applications:
 73% of popular apps can access users’ current and past GPS
information.
 60% of apps are vulnerable to cyber-attacks that could put
personal information & organizational data at risk.
 49% of popular apps access to users’ billing information,
potentially jeopardizing credit card information in mobile wallets.
 34% of popular apps have access to users’ cameras or
microphones.
12
Blog: "A Perfect
Match: Uniting
Mobile Security With
Online Dating Apps"
© 2015 IBM Corporation
IBM Security
13
Protecting Yourself Against Mobile Threats
Blog: "A Perfect
Match: Uniting
Mobile Security With
Online Dating Apps"
14 © 2015 IBM Corporation
Mobile Dating App Vulnerabilities:
Methodology & Impact of Vulnerabilities
© 2015 IBM Corporation
IBM Security
15
History of Mobile Application Vulnerabilities
July 2013 December 2013 March 2014
July 2014 August 2014
© 2015 IBM Corporation
IBM Security
16
Risk of Malware for Mobile Apps
http://grahamcluley.com/2014/12/the-interview-android-app-malware/
© 2015 IBM Corporation
IBM Security
17
Uploading A Mobile Application on AppScan Mobile Analyzer
© 2015 IBM Corporation
IBM Security
18
App
Exposed
activity
parameters
Non-exposed
Activity
parameters
Public
Intent
Service
Receiver
Data store
Content
Provider
Manifest
Imitating A Hacker
Private
intent
App
© 2015 IBM Corporation
IBM Security
19
HIGH
MEDIUM
What were we looking for?
• Android Fragment
Injection
• Android Class Loading
Hijacking
• Buffer Overflow
• Client-side SQL Injection
• Crash in Native Code
• Cross-Site scripting
via Man in the
Middle
• Cross-Application
Scripting (XAS)
• Debug Flag Enabled
on Release Version
• Broken
Cryptography
• File Manipulation
• Insecure File
Permissions
• Insecure Pending Intent
• Phishing via Man in
Middle
• Unsafe Reflection
• Weak Random
Number Generators
• Activity Hijacking
• Backup Flag
Enabled
• Service Hijacking
• UI Spoofing
• Unhandled Java
Exception
• Unstripped Binary
• Broadcast Theft
• Debug Version
Severities - Based on X-Force research
LOW
INFORMATIONAL
© 2015 IBM Corporation
IBM Security
20
Reviewing the Results
© 2015 IBM Corporation
IBM Security
21
Man in The Middle Attacks
• You don’t really know who’s on
the other end of the line.
• You cannot trust the application
that runs on your own device.
• Your sensitive information and
privacy are at risk.
© 2015 IBM Corporation
IBM Security
22
Broken Cryptographic and Weak Random Number Generators
• Encrypted communication can be
decrypted by a hacker.
• Your “secrets” are not well-hidden.
• Your sensitive information and
privacy are at risk.
© 2015 IBM Corporation
IBM Security
23
2 Applications Left Debug Flag Enabled
• Information that flows into the
application can be hijacked and
modified.
• Malicious code can run in the context
of the app with access to anything the
app can access.
• Your sensitive information and
privacy are at risk.
© 2015 IBM Corporation
IBM Security
24
Learn How to Improve Your Mobile Security
Blog: "A Perfect Match: Uniting Mobile Security With Online Dating Apps"
24
YouTube Video: Digital Dating - It's Not You, It's Me
IBM News Room- IBM Security Finds Over 60 Percent of
Popular Dating Apps Vulnerable to Hackers
Share the Love!
Digital Dating – “It's
Not You, It's Me’
25 © 2015 IBM Corporation
Questions-and-Answers Session
About the Research: IBM Security analysts from IBM’s Application Security Research team used
its new IBM AppScan Mobile Analyzer tool to analyze the top 41 dating apps available on Android
devices to identify vulnerabilities that can leave users open to potential cyberattacks and threats.
These apps were also analyzed to determine the granted permissions, unveiling a host of
excessive privileges. To understand enterprise adoption of these 41 dating apps, app data was
analyzed from IBM MobileFirst Protect™, formerly MaaS360. In advance of releasing this research
to the public, IBM Security has disclosed all affected app vendors identified with this research.
© 2015 IBM Corporation
IBM Security
26
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Contenu connexe

Plus de IBM Security

How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 

Plus de IBM Security (20)

How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

X-Force Security Intelligence Findings: Vulnerabilities in Mobile Dating Applications

  • 1. © 2015 IBM Corporation IBM Security 1© 2015 IBM Corporation X-Force Security Intelligence Findings: Vulnerabilities in Mobile Dating Applications Tom Mulvehill Caleb Barlow Eitan Worcel IBM Cloud & Mobile Security Teams
  • 2. © 2015 IBM Corporation IBM Security 2 Today’s Agenda • Overview of Mobile Security Risks • Mobile Dating App Vulnerabilities: A Closer Look • Mobile Dating App Vulnerabilities: Methodology & Impact of Vulnerabilities • Questions-and-Answers Session
  • 3. 3 © 2015 IBM Corporation Overview of Mobile Security Risks
  • 4. © 2015 IBM Corporation IBM Security 4  Data leakage – Attack from malware – Account info. on mobile device  Cracking mobile apps – Easy access to applications – Reverse engineering  Little to no App control – BYOD – Consumer devices User vs. Enterprise Risk  Threat from Malware - Trojans and Spyware  Phishing  Fake Android marketplace - Malware bundled with app  Unauthorized Use of: - Contact DB - Email - SMS (text messages) - Phone (placing calls) - GPS (public location) - Data on device User Enterprise
  • 5. © 2015 IBM Corporation IBM Security 5 Mobile Security Concerns • Mobile security is broader than device management.
  • 6. © 2015 IBM Corporation IBM Security 6 Risk from Mobile Malware’s Real & Growing
  • 7. © 2015 IBM Corporation IBM Security 7 Reverse Engineering & IP Theft Risk • 97% of top paid Android apps have been hacked • 87% of top paid iOS apps have been hacked • 80% of the most popular free Android apps have been hacked • 75% of the most popular free iOS apps have been hacked Source: State of Security in the App Economy - “Apps Under Attack” (Dec 2014)
  • 8. © 2015 IBM Corporation IBM Security 8  Sophistication of attacks increasing  New versions of Android OS helping to reduce risk, but…  … Android market is still very fragmented. Android & Platform Risk Android – February 2015 iOS – February 2015 https://developer.apple.com/support/appstore/ https://developer.android.com/about/dashboards/index. html?utm_source=ausdroid.net 2014 1.6% 2013 2012 2010 2014
  • 9. © 2015 IBM Corporation IBM Security 9 Mobile Permission Risk  Permissions vary by OS & release  Users don’t understand  Developers over permission Android Pileup Flaw
  • 10. © 2015 IBM Corporation IBM Security 10 OWASP Mobile Top 10 Risks (RC 2014 V1) https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks
  • 11. 11 © 2015 IBM Corporation Mobile Dating App Vulnerabilities: A Closer Look
  • 12. © 2015 IBM Corporation IBM Security 12 Key Findings in IBM’s Analysis of Mobile Dating Apps on Android Devices About the Organizations:  50% of enterprises have popular apps present on devices that accessed confidential business data. About the Applications:  73% of popular apps can access users’ current and past GPS information.  60% of apps are vulnerable to cyber-attacks that could put personal information & organizational data at risk.  49% of popular apps access to users’ billing information, potentially jeopardizing credit card information in mobile wallets.  34% of popular apps have access to users’ cameras or microphones. 12 Blog: "A Perfect Match: Uniting Mobile Security With Online Dating Apps"
  • 13. © 2015 IBM Corporation IBM Security 13 Protecting Yourself Against Mobile Threats Blog: "A Perfect Match: Uniting Mobile Security With Online Dating Apps"
  • 14. 14 © 2015 IBM Corporation Mobile Dating App Vulnerabilities: Methodology & Impact of Vulnerabilities
  • 15. © 2015 IBM Corporation IBM Security 15 History of Mobile Application Vulnerabilities July 2013 December 2013 March 2014 July 2014 August 2014
  • 16. © 2015 IBM Corporation IBM Security 16 Risk of Malware for Mobile Apps http://grahamcluley.com/2014/12/the-interview-android-app-malware/
  • 17. © 2015 IBM Corporation IBM Security 17 Uploading A Mobile Application on AppScan Mobile Analyzer
  • 18. © 2015 IBM Corporation IBM Security 18 App Exposed activity parameters Non-exposed Activity parameters Public Intent Service Receiver Data store Content Provider Manifest Imitating A Hacker Private intent App
  • 19. © 2015 IBM Corporation IBM Security 19 HIGH MEDIUM What were we looking for? • Android Fragment Injection • Android Class Loading Hijacking • Buffer Overflow • Client-side SQL Injection • Crash in Native Code • Cross-Site scripting via Man in the Middle • Cross-Application Scripting (XAS) • Debug Flag Enabled on Release Version • Broken Cryptography • File Manipulation • Insecure File Permissions • Insecure Pending Intent • Phishing via Man in Middle • Unsafe Reflection • Weak Random Number Generators • Activity Hijacking • Backup Flag Enabled • Service Hijacking • UI Spoofing • Unhandled Java Exception • Unstripped Binary • Broadcast Theft • Debug Version Severities - Based on X-Force research LOW INFORMATIONAL
  • 20. © 2015 IBM Corporation IBM Security 20 Reviewing the Results
  • 21. © 2015 IBM Corporation IBM Security 21 Man in The Middle Attacks • You don’t really know who’s on the other end of the line. • You cannot trust the application that runs on your own device. • Your sensitive information and privacy are at risk.
  • 22. © 2015 IBM Corporation IBM Security 22 Broken Cryptographic and Weak Random Number Generators • Encrypted communication can be decrypted by a hacker. • Your “secrets” are not well-hidden. • Your sensitive information and privacy are at risk.
  • 23. © 2015 IBM Corporation IBM Security 23 2 Applications Left Debug Flag Enabled • Information that flows into the application can be hijacked and modified. • Malicious code can run in the context of the app with access to anything the app can access. • Your sensitive information and privacy are at risk.
  • 24. © 2015 IBM Corporation IBM Security 24 Learn How to Improve Your Mobile Security Blog: "A Perfect Match: Uniting Mobile Security With Online Dating Apps" 24 YouTube Video: Digital Dating - It's Not You, It's Me IBM News Room- IBM Security Finds Over 60 Percent of Popular Dating Apps Vulnerable to Hackers Share the Love! Digital Dating – “It's Not You, It's Me’
  • 25. 25 © 2015 IBM Corporation Questions-and-Answers Session About the Research: IBM Security analysts from IBM’s Application Security Research team used its new IBM AppScan Mobile Analyzer tool to analyze the top 41 dating apps available on Android devices to identify vulnerabilities that can leave users open to potential cyberattacks and threats. These apps were also analyzed to determine the granted permissions, unveiling a host of excessive privileges. To understand enterprise adoption of these 41 dating apps, app data was analyzed from IBM MobileFirst Protect™, formerly MaaS360. In advance of releasing this research to the public, IBM Security has disclosed all affected app vendors identified with this research.
  • 26. © 2015 IBM Corporation IBM Security 26 www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.