SlideShare a Scribd company logo
Security Imperatives
for iOS and Android
Session #A5
8, April 2014
8:30am
Clinton Mugge and Gary Bahadur
Symosis Security
Copyright 2014 RBS Citizens
Distributed by MIS Training Institute with permission of owner.
All rights reserved. Printed in the United States of America. No part of this publication may be reproduced,
photocopied, stored in a retrieval system, or transmitted by electronic, mechanical or any other means
without the prior written permission of MIS Training Institute and the respective owner of the copyright.
Trademarked product and company names mentioned in this publication are the property of their respective owners.
ISW14040714
MIS Training Institute Session A5 - Slide 3
© Symosis Security
Who are we?
 Clinton Mugge
 Application and Network Security Providers
 20 Years in Info Sec – Security Assessments, Penetration Testing,
Compliance & Training, Investigations, Incident Response
 Free Mobile App Security / Training Evaluations
 Gary Bahadur
 20 Years in Info Sec – Compliance & Training, Security Assessments,
Risk Assessments
 Author of “Securing the Clicks” Network Security in the Age of
Social Media
 Free Risk Assessment Software “Razient”
MIS Training Institute Session A5 - Slide 4
© Symosis Security
Agenda
Introduction
iOS / Android Apps Top Risks
Countermeasures
MIS Training Institute Session A5 - Slide 5
© Symosis Security
Audience Poll
• What mobile OS do you mostly
use?
• How many of you are involved
with mobile security, privacy,
audits?
• Any mobile developers /
architects?
• Does your employer have
mobile presence?
MIS Training Institute Session A5 - Slide 6
© Symosis Security
There is an App for that!
MIS Training Institute Session A5 - Slide 7
© Symosis Security
What do Attackers Want?
 Credentials - To your
device, To external
services (email, banking,
etc)
 Access to your device
 Use your device
(botnets, spamming),
Steal trade secrets or
other sensitive data
 Personal Data - Full Name,
SINSSN, address book
data, location data
 Cardholder Data - Card
Numbers, Expiration, CVV
 Health Data - Prescription
information, medical
records, procedure
summary
 Corporate Data - IP, Design
Docs
MIS Training Institute Session A5 - Slide 8
© Symosis Security
Security and Privacy Concerns
 Side Channel Data Leakage
 Insufficient Transport Layer Protection
 Weak Server Side Controls
 Insecure Data Storage
 Client Side Injection
 Poor Authorization and Authentication
 Improper Session Handling
 Security Decisions Via Untrusted Inputs
 Broken Cryptography
 Sensitive Information Disclosure
 Hardcoded password/keys
 Privacy compliance
 Identity exposure
 Activity monitoring and data retrieval
 Unauthorized dialing, SMS, and payments
 Unauthorized network connectivity (data
exfiltration or command & control)
 UI (unique identifier) impersonation
 System modification (rootkit, APN proxy
configuration)
 Mobile Malware
 Criminals Target and Infect App Stores
 Social-Engineering
 Geolocation compromise
 Security Regulatory Compliance
 Device Risk
 Application management
 Installation of un-verified / unsigned 3rd
party apps
MIS Training Institute Session A5 - Slide 9
© Symosis Security
Agenda
Introduction
Mobile Apps Top Risks
1. Side Channel Leakage
2. Insecure Transport / Server Controls
3. Insecure Data Storage
4. Privacy
Countermeasures
MIS Training Institute Session A5 - Slide 10
© Symosis Security
1. Side Channel Data Leakage
Data leakage via platform defaults, use of third party
libraries, logging, etc
 Property List Files
 SnapShot (ie- iOS Backgrounding)
 iOS logs
Sometimes result of programmatic flaws
MIS Training Institute Session A5 - Slide 11
© Symosis Security
Demo 1: Snapshot File
Tools: iExplore, Reflection
Device: iPhone 5, IOS 6 latest version, iPhone 4, IOS 5
Snapshot –
 TaxAct Mobile
 TaxSlayer
MIS Training Institute Session A5 - Slide 12
© Symosis Security
TaxAct Mobile Security Hole
Snapshot
MIS Training Institute Session A5 - Slide 13
© Symosis Security
TaxSlayer Mobile Security Hole
Snapshot
MIS Training Institute Session A5 - Slide 14
© Symosis Security
TaxAct Response
MIS Training Institute Session A5 - Slide 15
© Symosis Security
MIS Training Institute Session A5 - Slide 16
© Symosis Security
LinkedIn Plist identity theft
MIS Training Institute Session A5 - Slide 17
© Symosis Security
Agenda
Introduction
Mobile Apps Top 3 Risks
1. Side Channel Leakage
2. Insecure Transport / Server Controls
3. Insecure Data Storage
4. Privacy
Countermeasures
MIS Training Institute Session A5 - Slide 18
© Symosis Security
2. Insecure Transport/Server Controls
Failing to encrypt sensitive
network traffic consisting of
sensitive data
Insecure server controls - web,
application and backend API - can
lead to security compromise
MIS Training Institute Session A5 - Slide 19
© Symosis Security
Demo 2: Insecure Transport
Tools: MITM Proxy, Reflection, Flixster
Insecure Transport – User ID, Movies Browsing, Home
Area, Purchase Intent
MIS Training Institute Session A5 - Slide 20
© Symosis Security
Credentials sent over HTTP iOS App
MIS Training Institute Session A5 - Slide 21
© Symosis Security
Unencrypted Cookies over HTTP
Instagram iOS App
MIS Training Institute Session A5 - Slide 22
© Symosis Security
TOC
Mobile Platform Risks
Mobile Apps Top 3 Risks
1. Side Channel Leakage
2. Insecure Transport / Server Controls
3. Insecure Data Storage
4. Privacy
Countermeasures
MIS Training Institute Session A5 - Slide 23
© Symosis Security
3. Insecure Data Storage
Locally stored data both on native and browser based
apps that includes
 SQLite
 Sensitive Files
 Cache Files
MIS Training Institute Session A5 - Slide 24
© Symosis Security
Demo 3: local files
Tools: iExplore, Reflection
SQLite files – Runtastic, TaxSlayer, TaxAct, JacksonHewitt
Flat Files – Jackson Hewitt
Jackson Hewitt #JacksonHewitt /TaxSlayer #TaxSlayer
Tools: iExplorer
MIS Training Institute Session A5 - Slide 25
© Symosis Security
Cached Credentials and tax data in the clear
MIS Training Institute Session A5 - Slide 26
© Symosis Security
JacksonHewitt Tax Documents in the Clear
MIS Training Institute Session A5 - Slide 27
© Symosis Security
JacksonHewitt Responses
MIS Training Institute Session A5 - Slide 28
© Symosis Security
Unencrypted Cache with Master Password in
Keeper
MIS Training Institute Session A5 - Slide 29
© Symosis Security
TOC
Mobile Platform Risks
Mobile Apps Top 3 Risks
1. Side Channel Leakage
2. Insecure Transport / Server Controls
3. Insecure Data Storage
4. Privacy
Countermeasures
MIS Training Institute Session A5 - Slide 30
© Symosis Security
4. Privacy
MIS Training Institute Session A5 - Slide 31
© Symosis Security
Privacy Threat & Impact
 UDID, Mac Address, Device ID
 Location Training
 Usage Tracking - Google, Flurry, Mobclix
 Contacts Access & Sharing
 Shares / Uploads Phone Number
 3rd Party Connections – Facebook, twitter
MIS Training Institute Session A5 - Slide 32
© Symosis Security
Path uploads your entire iPhone address
book to its servers
MIS Training Institute Session A5 - Slide 33
© Symosis Security
WhatsApp sends messages unencrypted
over HTTP
MIS Training Institute Session A5 - Slide 34
© Symosis Security
LinkedIn transmits confidential info
insecurely
MIS Training Institute Session A5 - Slide 35
© Symosis Security
Agenda
Introduction
Mobile Apps Top Risks
Countermeasures
1. Disable side channel data leakage
2. Use HTTPS and secure IOS Safe methods
3. Insecure Data storage
4. Privacy
MIS Training Institute Session A5 - Slide 36
© Symosis Security
Side Channel Data Leakage
Start by identifying all potential side channel data which
includes
 Plist files – Ensure no sensitive data is written
 Disable Snapshots
 Disable System / keystroke logs
 Disable Web caches
 Disable Cut-and-paste buffers
 Clean up Core Data
Do not store sensitive data (e.g., credentials, tokens, PII) in
property list files. Use iOS Keychain
MIS Training Institute Session A5 - Slide 37
© Symosis Security
Encrypt Sensitive Data
Data Protection API - set the NSFileProtectionKey on an
existing file
Keychain – Sensitive data like passwords and keys should be
stored in the Keychain and not in insecure locations like plist
files
CCCrypt & javax.crypto.* package for Android - provides access
to AES, DES, 3DES
SQLCipher (IOS & Android) - transparent 256-
bit AES encryption of database files
MIS Training Institute Session A5 - Slide 38
© Symosis Security
Strategic Recommendations
 Establish common set of security requirements. Perform
periodic security scans and audits
 Invest in security education for all stakeholders
 Perform server side data validation and canonicalization
 Define and deploy secure configuration
 Do not log credentials, PII and other sensitive data
 Design and implement all apps under the assumption
that the user’s device will be lost or stolen
 Review all third party libraries before use
PLEASE
REMEMBER TO FILL OUT THE
SESSION EVALUATIONS.
THANK YOU!

More Related Content

PDF
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Symosis Security (Previously C-Level Security)
 
PPTX
Structure of iso 27001
CUNIX INDIA
 
PPTX
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
PPT
The need for security
Dhani Ahmad
 
PDF
Raising information security awareness
Terranovatraining
 
PPT
Isms awareness training
SAROJ BEHERA
 
PPT
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Symosis Security (Previously C-Level Security)
 
Structure of iso 27001
CUNIX INDIA
 
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
The need for security
Dhani Ahmad
 
Raising information security awareness
Terranovatraining
 
Isms awareness training
SAROJ BEHERA
 
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 

What's hot (18)

PDF
Information Security & Privacy in Healthcare (February 9, 2021)
Nawanan Theera-Ampornpunt
 
PPT
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
 
PPTX
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
PPT
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
DOCX
ISO 27001 Training | ISMS Awareness Training
himalya sharma
 
PPTX
information security awareness course
Abdul Manaf Vellakodath
 
PPT
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
PPTX
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
ArumIm
 
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
PDF
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates
 
PPTX
Information Security Awareness Session -2020
Ismail Oduoye CISSP,CISA, CCNP-ROUTE,CCNA, MCITP,MCTS
 
PDF
How To Promote Security Awareness In Your Company
danielblander
 
PDF
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2
 
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
PDF
Information security for dummies
Ivo Depoorter
 
PPT
Isa Prog Need L
R_Yanus
 
PPTX
MobileIron plus Cisco - Mobilizing Network Security
mobileironmarketing
 
PPTX
Awareness Training on Information Security
Ken Holmes
 
Information Security & Privacy in Healthcare (February 9, 2021)
Nawanan Theera-Ampornpunt
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
 
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
ISO 27001 Training | ISMS Awareness Training
himalya sharma
 
information security awareness course
Abdul Manaf Vellakodath
 
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
ArumIm
 
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates
 
Information Security Awareness Session -2020
Ismail Oduoye CISSP,CISA, CCNP-ROUTE,CCNA, MCITP,MCTS
 
How To Promote Security Awareness In Your Company
danielblander
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
Information security for dummies
Ivo Depoorter
 
Isa Prog Need L
R_Yanus
 
MobileIron plus Cisco - Mobilizing Network Security
mobileironmarketing
 
Awareness Training on Information Security
Ken Holmes
 
Ad

Viewers also liked (7)

PDF
The fundamentals of Android and iOS app security
NowSecure
 
PPTX
Ios seminar
Kurikkal Ashique
 
PPTX
Android vs iOS security
Sumanth Veera
 
PDF
Android vs i os features
Guang Ying Yuan
 
PDF
Android vs. iPhone for Mobile Security
CloudCheckr
 
PPTX
How iOS and Android Handle Security Webinar
Denim Group
 
PDF
The Android vs. Apple iOS Security Showdown
Tom Eston
 
The fundamentals of Android and iOS app security
NowSecure
 
Ios seminar
Kurikkal Ashique
 
Android vs iOS security
Sumanth Veera
 
Android vs i os features
Guang Ying Yuan
 
Android vs. iPhone for Mobile Security
CloudCheckr
 
How iOS and Android Handle Security Webinar
Denim Group
 
The Android vs. Apple iOS Security Showdown
Tom Eston
 
Ad

Similar to InfoSec World 2014 Security Imperatives for IOS and Android (20)

PPTX
Security Imeprative for iOS and Android Apps
Symosis Security (Previously C-Level Security)
 
PDF
Make Mobilization Work - Properly Implementing Mobile Security
Michael Davis
 
PDF
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Yury Chemerkin
 
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
PPTX
Automation: Embracing the Future of SecOps
IBM Security
 
PPTX
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
PDF
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
 
PDF
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
PDF
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 
PPTX
Cyber Security Measures for LMS Platforms
Rahul Pal
 
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
PDF
How to Hack a Cryptographic Key
IBM Security
 
PDF
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
PDF
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON
 
PDF
Security Testing for Testing Professionals
TechWell
 
PDF
Security Testing for Test Professionals
TechWell
 
PPTX
Appsecurity, win or loose
Bjørn Sloth
 
PPTX
Presentation1 110616195133-phpapp01(information security)
Bonagiri Rajitha
 
Security Imeprative for iOS and Android Apps
Symosis Security (Previously C-Level Security)
 
Make Mobilization Work - Properly Implementing Mobile Security
Michael Davis
 
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Yury Chemerkin
 
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Automation: Embracing the Future of SecOps
IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
 
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 
Cyber Security Measures for LMS Platforms
Rahul Pal
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
How to Hack a Cryptographic Key
IBM Security
 
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON
 
Security Testing for Testing Professionals
TechWell
 
Security Testing for Test Professionals
TechWell
 
Appsecurity, win or loose
Bjørn Sloth
 
Presentation1 110616195133-phpapp01(information security)
Bonagiri Rajitha
 

Recently uploaded (20)

PDF
Pesticides | Natural Pesticides | Methods of control | Types of pesticides | ...
Home
 
PPTX
Selecting relevant value chain/s for Impactful Development Policies
Francois Stepman
 
PPTX
Ocean_and_Freshwater_Awareness_Presentation.pptx
Suhaira9
 
PDF
SXSW Panel Picker: Placemaking: Culture is the new cost of living
GabrielCohen28
 
DOCX
Policies & Procedures of Internal Audit Department of Shelter Holding LLC.docx
AlamGir100
 
PDF
Thu Dinh - CIE-RESEARCH-METHODS-SLIDES-sample-extract.pptx.pdf
dinhminhthu1405
 
PPTX
Raksha Bandhan Celebrations PPT festival
sowmyabapuram
 
PPTX
Joy And Peace In All Circumstances.pptx
FamilyWorshipCenterD
 
PDF
Green Natural Green House Presentation (2).pdf
SaeedOsman6
 
PPTX
THE school_exposure_presentation[1].pptx
sayanmondal3500
 
PPTX
GAMABA AWARDEES GINAW BILOG AND SALINTA MONON BY REYMART
purezagambala458
 
PPTX
Enterprise Asset Management Overview with examples
ManikantaBN1
 
PDF
Chapter-52-Relationship-between-countries-at-different-levels-of-development-...
dinhminhthu1405
 
PPTX
PHILIPPINE LITERATURE DURING SPANISH ERA
AllizaJoyMendigoria
 
PPTX
2025-07-27 Abraham 09 (shared slides).pptx
Dale Wells
 
PDF
Advanced-Web-Design-Crafting-the-Future-Web (1).pdf
vaghelavidhiba591
 
PPTX
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
PPTX
Building a Strong and Ethical Digital Professional Identity
khalyaniramjan49
 
PPTX
DPIC Assingment_1.pptx.pptx for presentation
yashwork2607
 
PPTX
garment-industry in bangladesh. how bangladeshi industry is doing
tanvirhossain1570
 
Pesticides | Natural Pesticides | Methods of control | Types of pesticides | ...
Home
 
Selecting relevant value chain/s for Impactful Development Policies
Francois Stepman
 
Ocean_and_Freshwater_Awareness_Presentation.pptx
Suhaira9
 
SXSW Panel Picker: Placemaking: Culture is the new cost of living
GabrielCohen28
 
Policies & Procedures of Internal Audit Department of Shelter Holding LLC.docx
AlamGir100
 
Thu Dinh - CIE-RESEARCH-METHODS-SLIDES-sample-extract.pptx.pdf
dinhminhthu1405
 
Raksha Bandhan Celebrations PPT festival
sowmyabapuram
 
Joy And Peace In All Circumstances.pptx
FamilyWorshipCenterD
 
Green Natural Green House Presentation (2).pdf
SaeedOsman6
 
THE school_exposure_presentation[1].pptx
sayanmondal3500
 
GAMABA AWARDEES GINAW BILOG AND SALINTA MONON BY REYMART
purezagambala458
 
Enterprise Asset Management Overview with examples
ManikantaBN1
 
Chapter-52-Relationship-between-countries-at-different-levels-of-development-...
dinhminhthu1405
 
PHILIPPINE LITERATURE DURING SPANISH ERA
AllizaJoyMendigoria
 
2025-07-27 Abraham 09 (shared slides).pptx
Dale Wells
 
Advanced-Web-Design-Crafting-the-Future-Web (1).pdf
vaghelavidhiba591
 
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
Building a Strong and Ethical Digital Professional Identity
khalyaniramjan49
 
DPIC Assingment_1.pptx.pptx for presentation
yashwork2607
 
garment-industry in bangladesh. how bangladeshi industry is doing
tanvirhossain1570
 

InfoSec World 2014 Security Imperatives for IOS and Android

  • 1. Security Imperatives for iOS and Android Session #A5 8, April 2014 8:30am Clinton Mugge and Gary Bahadur Symosis Security
  • 2. Copyright 2014 RBS Citizens Distributed by MIS Training Institute with permission of owner. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted by electronic, mechanical or any other means without the prior written permission of MIS Training Institute and the respective owner of the copyright. Trademarked product and company names mentioned in this publication are the property of their respective owners. ISW14040714
  • 3. MIS Training Institute Session A5 - Slide 3 © Symosis Security Who are we?  Clinton Mugge  Application and Network Security Providers  20 Years in Info Sec – Security Assessments, Penetration Testing, Compliance & Training, Investigations, Incident Response  Free Mobile App Security / Training Evaluations  Gary Bahadur  20 Years in Info Sec – Compliance & Training, Security Assessments, Risk Assessments  Author of “Securing the Clicks” Network Security in the Age of Social Media  Free Risk Assessment Software “Razient”
  • 4. MIS Training Institute Session A5 - Slide 4 © Symosis Security Agenda Introduction iOS / Android Apps Top Risks Countermeasures
  • 5. MIS Training Institute Session A5 - Slide 5 © Symosis Security Audience Poll • What mobile OS do you mostly use? • How many of you are involved with mobile security, privacy, audits? • Any mobile developers / architects? • Does your employer have mobile presence?
  • 6. MIS Training Institute Session A5 - Slide 6 © Symosis Security There is an App for that!
  • 7. MIS Training Institute Session A5 - Slide 7 © Symosis Security What do Attackers Want?  Credentials - To your device, To external services (email, banking, etc)  Access to your device  Use your device (botnets, spamming), Steal trade secrets or other sensitive data  Personal Data - Full Name, SINSSN, address book data, location data  Cardholder Data - Card Numbers, Expiration, CVV  Health Data - Prescription information, medical records, procedure summary  Corporate Data - IP, Design Docs
  • 8. MIS Training Institute Session A5 - Slide 8 © Symosis Security Security and Privacy Concerns  Side Channel Data Leakage  Insufficient Transport Layer Protection  Weak Server Side Controls  Insecure Data Storage  Client Side Injection  Poor Authorization and Authentication  Improper Session Handling  Security Decisions Via Untrusted Inputs  Broken Cryptography  Sensitive Information Disclosure  Hardcoded password/keys  Privacy compliance  Identity exposure  Activity monitoring and data retrieval  Unauthorized dialing, SMS, and payments  Unauthorized network connectivity (data exfiltration or command & control)  UI (unique identifier) impersonation  System modification (rootkit, APN proxy configuration)  Mobile Malware  Criminals Target and Infect App Stores  Social-Engineering  Geolocation compromise  Security Regulatory Compliance  Device Risk  Application management  Installation of un-verified / unsigned 3rd party apps
  • 9. MIS Training Institute Session A5 - Slide 9 © Symosis Security Agenda Introduction Mobile Apps Top Risks 1. Side Channel Leakage 2. Insecure Transport / Server Controls 3. Insecure Data Storage 4. Privacy Countermeasures
  • 10. MIS Training Institute Session A5 - Slide 10 © Symosis Security 1. Side Channel Data Leakage Data leakage via platform defaults, use of third party libraries, logging, etc  Property List Files  SnapShot (ie- iOS Backgrounding)  iOS logs Sometimes result of programmatic flaws
  • 11. MIS Training Institute Session A5 - Slide 11 © Symosis Security Demo 1: Snapshot File Tools: iExplore, Reflection Device: iPhone 5, IOS 6 latest version, iPhone 4, IOS 5 Snapshot –  TaxAct Mobile  TaxSlayer
  • 12. MIS Training Institute Session A5 - Slide 12 © Symosis Security TaxAct Mobile Security Hole Snapshot
  • 13. MIS Training Institute Session A5 - Slide 13 © Symosis Security TaxSlayer Mobile Security Hole Snapshot
  • 14. MIS Training Institute Session A5 - Slide 14 © Symosis Security TaxAct Response
  • 15. MIS Training Institute Session A5 - Slide 15 © Symosis Security
  • 16. MIS Training Institute Session A5 - Slide 16 © Symosis Security LinkedIn Plist identity theft
  • 17. MIS Training Institute Session A5 - Slide 17 © Symosis Security Agenda Introduction Mobile Apps Top 3 Risks 1. Side Channel Leakage 2. Insecure Transport / Server Controls 3. Insecure Data Storage 4. Privacy Countermeasures
  • 18. MIS Training Institute Session A5 - Slide 18 © Symosis Security 2. Insecure Transport/Server Controls Failing to encrypt sensitive network traffic consisting of sensitive data Insecure server controls - web, application and backend API - can lead to security compromise
  • 19. MIS Training Institute Session A5 - Slide 19 © Symosis Security Demo 2: Insecure Transport Tools: MITM Proxy, Reflection, Flixster Insecure Transport – User ID, Movies Browsing, Home Area, Purchase Intent
  • 20. MIS Training Institute Session A5 - Slide 20 © Symosis Security Credentials sent over HTTP iOS App
  • 21. MIS Training Institute Session A5 - Slide 21 © Symosis Security Unencrypted Cookies over HTTP Instagram iOS App
  • 22. MIS Training Institute Session A5 - Slide 22 © Symosis Security TOC Mobile Platform Risks Mobile Apps Top 3 Risks 1. Side Channel Leakage 2. Insecure Transport / Server Controls 3. Insecure Data Storage 4. Privacy Countermeasures
  • 23. MIS Training Institute Session A5 - Slide 23 © Symosis Security 3. Insecure Data Storage Locally stored data both on native and browser based apps that includes  SQLite  Sensitive Files  Cache Files
  • 24. MIS Training Institute Session A5 - Slide 24 © Symosis Security Demo 3: local files Tools: iExplore, Reflection SQLite files – Runtastic, TaxSlayer, TaxAct, JacksonHewitt Flat Files – Jackson Hewitt Jackson Hewitt #JacksonHewitt /TaxSlayer #TaxSlayer Tools: iExplorer
  • 25. MIS Training Institute Session A5 - Slide 25 © Symosis Security Cached Credentials and tax data in the clear
  • 26. MIS Training Institute Session A5 - Slide 26 © Symosis Security JacksonHewitt Tax Documents in the Clear
  • 27. MIS Training Institute Session A5 - Slide 27 © Symosis Security JacksonHewitt Responses
  • 28. MIS Training Institute Session A5 - Slide 28 © Symosis Security Unencrypted Cache with Master Password in Keeper
  • 29. MIS Training Institute Session A5 - Slide 29 © Symosis Security TOC Mobile Platform Risks Mobile Apps Top 3 Risks 1. Side Channel Leakage 2. Insecure Transport / Server Controls 3. Insecure Data Storage 4. Privacy Countermeasures
  • 30. MIS Training Institute Session A5 - Slide 30 © Symosis Security 4. Privacy
  • 31. MIS Training Institute Session A5 - Slide 31 © Symosis Security Privacy Threat & Impact  UDID, Mac Address, Device ID  Location Training  Usage Tracking - Google, Flurry, Mobclix  Contacts Access & Sharing  Shares / Uploads Phone Number  3rd Party Connections – Facebook, twitter
  • 32. MIS Training Institute Session A5 - Slide 32 © Symosis Security Path uploads your entire iPhone address book to its servers
  • 33. MIS Training Institute Session A5 - Slide 33 © Symosis Security WhatsApp sends messages unencrypted over HTTP
  • 34. MIS Training Institute Session A5 - Slide 34 © Symosis Security LinkedIn transmits confidential info insecurely
  • 35. MIS Training Institute Session A5 - Slide 35 © Symosis Security Agenda Introduction Mobile Apps Top Risks Countermeasures 1. Disable side channel data leakage 2. Use HTTPS and secure IOS Safe methods 3. Insecure Data storage 4. Privacy
  • 36. MIS Training Institute Session A5 - Slide 36 © Symosis Security Side Channel Data Leakage Start by identifying all potential side channel data which includes  Plist files – Ensure no sensitive data is written  Disable Snapshots  Disable System / keystroke logs  Disable Web caches  Disable Cut-and-paste buffers  Clean up Core Data Do not store sensitive data (e.g., credentials, tokens, PII) in property list files. Use iOS Keychain
  • 37. MIS Training Institute Session A5 - Slide 37 © Symosis Security Encrypt Sensitive Data Data Protection API - set the NSFileProtectionKey on an existing file Keychain – Sensitive data like passwords and keys should be stored in the Keychain and not in insecure locations like plist files CCCrypt & javax.crypto.* package for Android - provides access to AES, DES, 3DES SQLCipher (IOS & Android) - transparent 256- bit AES encryption of database files
  • 38. MIS Training Institute Session A5 - Slide 38 © Symosis Security Strategic Recommendations  Establish common set of security requirements. Perform periodic security scans and audits  Invest in security education for all stakeholders  Perform server side data validation and canonicalization  Define and deploy secure configuration  Do not log credentials, PII and other sensitive data  Design and implement all apps under the assumption that the user’s device will be lost or stolen  Review all third party libraries before use
  • 39. PLEASE REMEMBER TO FILL OUT THE SESSION EVALUATIONS. THANK YOU!