SlideShare a Scribd company logo
MOBILE THREATS & TRENDS CHANGING
MOBILE APP SECURITY
September 18, 2018
RECENT TRENDS
© 2018 OneSpan North America Inc. 2
#1: MOBILE FRAUD IN GENERAL IS INCREASING
of fraud transactions
came from mobile apps &
browsers in Q2 2018
(↑ 9% over Q1 & ↑ 16%YOY)
71%
https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
#2 REPACKAGED OR FORGED/ROGUE MOBILE APPS ON THE RISE
>9K rogue apps in Q2 2018
• >25% of fraud in Q2 2018
• 13% increase over Q1 2018
Repackaging attacks
1. Attacker downloads app from
official stores
2. Reverse-engineers the app
3. Adds malicious functionality
4. Distributes tainted copy to
unsuspecting users
© 2018 OneSpan North America Inc. 4
https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
#3: MOBILE BANKING TROJANS & OVERLAY ATTACKS ESCALATING
3.2Xmore mobile
banking Trojan
installation packages
in Q2 2018 over Q1
https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/
#4: NON-TRADITIONAL DISTRIBUTION MODELS (“SIDELOADING”)
© 2018 OneSpan North America Inc. 6
https://www.kaspersky.com/blog/fortnite-security/23685/
• Users essentially have to compromise their device’s security
• Devices that download apps from sources other than Google
Play are 9X more likely to download malware
• 15 million downloads & 23 million players (21 days after beta)
• Fortnite was vulnerable to “man-in-the-disk attacks”
WHY ARE MOBILE THREATS ON THE RISE?
ATTACKERS FOCUS ON THE MONEY & SHIFT W/ CONSUMERS
2B
Mobile banking users
forecasted for 2018
200M
Estimated increase in
mobile users over 2017
50%Of global banked
population are mobile
banking users
Futureproofing Digital Banking 2018,by Juniper Research published March 2018
…AND IT’S NOT JUST BANKING
$86Bspent in app stores in 2017
2Xgrowth in two years
https://www.appannie.com/en/insights/market-data/app-annie-2017-retrospective/#download
MOBILE APP COMPETITION IS FIERCE
>3.1MApps on the
Google Play Store
>1.9MApps on the
Apple App Store
Priority becomes differentiating (adding/improving functionality) more quickly…
MOBILE APP DEVELOPMENT AND SECURITY CHALLENGES
• Balancing revenue-generating/retaining activities (e.g., new features) with security
• Lack of security expertise
• Mobile threats constantly evolve
© 2018 OneSpan North America Inc.
11
of developers know it’s
important but say they
don’t have enough time
to spend on security48% https://info.signalsciences.com/devsecops-community-survey-2018
DIVING DEEPER INTO MOBILE APP ATTACKS
© 2018 OneSpan North America Inc. 12
MOBILE MALWARE DELIVERY EXAMPLE
© 2018 OneSpan North America Inc. 13
OVERLAY ATTACK
EXPLAINED
© 2018 OneSpan North America Inc.14
Example of legitimate screen Example of malicious overlay screen
CODE INJECTION ATTACK EXPLAINED
• ~3 min
© 2018 OneSpan North America Inc. 15
Bad Guy
1
2
3
4
WHAT IS DUE CARE WHEN IT COMES
TO MOBILE APP SECURITY?
© 2018 OneSpan North America Inc. 16
YOU CAN’T COUNT ON THE PLATFORMS ALONE FOR SECURITY
• Apple/Google constantly working to
improve the situation
• Security is a journey, not a destination
• Known/unknown vulnerabilities in the OS &
resulting periods of exposure
• Incentives for Android/iOS vulnerabilities
• Bad apps still make it onto the stores
• APIs must be implemented correctly
• Defense-in-depth requires going beyond
what’s offered by Android and iOS
© 2018 OneSpan North America Inc. 17
18
Differing levels of security based on the app in question
L1: Baseline for mobile app security
L2: Defense-in-depth measures for more sensitive apps
R: Protection against client-side attacks (reverse-engineering)
OWASP MOBILE APP SECURITYVERIFICATION STANDARD (MASVS)
“The MASVS is a community effort to establish a framework of security requirements
needed to design, develop and test secure mobile apps on iOS and Android.
https://github.com/OWASP/owasp-masvs/releases/download/1.0/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf
19
It all starts with answering questions including but not limited to:
• Can attackers monetize data handled by your app?
• Is data handled by your app regulated?
• Does your app handle financial transactions?
• Are there motivated adversaries interested in your source code?
WHAT LEVEL OF SECURITY DOESYOUR APP NEED?
Verification Level Examples
MASVS-L1 Basic security for any mobile app that doesn’t qualify for any of the higher levels
MASVS-L2
• Fitness/Health Care: PII, PHI, regulations (HIPAA, etc.)
• Financial: PII, payment card info, regulations (PCI DSS, FFIEC, etc.)
MASVS-L1+R
• Gaming: prevent cheating/modification
• IP needs protection
MASVS-L2+R
• Financial: L2 requirements plus resilience against tampering and malware
• Apps that store data on device, but support a wide range of devices and OS versions
?
Fewest vulnerabilities possible
• Strong authentication mechanism
• Connect over HTTPS
• Proper verification of the certificate of the server
• Sensitive data stored securely on device
• Use of strong cryptography (e.g., NOT ECB mode, SHA1, MD5, etc.)
How can this be achieved?
• Including security & approved methods in product requirements
• Secure code training for developers
• Automated security testing throughout the SDLC
• Penetration testing prior to release
WHAT MAKES A MOBILE APP SECURE?
INTERNAL PERSPECTIVE
Hardened against external threats
• Fortified against reverse engineering
• Resistant to runtime tampering
• Resistant to repackaging
• Can defend against client-side attacks
• Overlay attacks
• Rogue keyboards
How can this be achieved?
Mobile app shielding and runtime protection
—also called mobile runtime application self protection or (RASP)
WHAT MAKES A MOBILE APP SECURE
EXTERNAL PERSPECTIVE
SUMMARY
22
KEY TAKEAWAYS
© 2018 OneSpan North America Inc. 23
MOBILETHREATS
ARE INCREASING
INTHE WILD
DEPENDING ONTHE
PLATFORMS ALONE WILL
LEAVEYOU EXPOSED
PROTECTINGYOUR APP IN
UNTRUSTED ENVIRONMENTS
IS ESSENTIAL
1 2 3
A KEY SOLUTION WITHIN A COMPLETE APP SECURITY PORTFOLIO
© 2018 OneSpan North America Inc. 24
APP SHIELDING AND
RUNTIME PROTECTION
JAILBREAK AND
ROOT DETECTION
DEVICE IDENTIFICATION
DEVICE BINDING
SECURE STORAGE
SECURE CHANNEL
PUSH NOTIFICATION
QR CODE SUPPORT
GEOLOCATION
BEHAVIORAL BIOMETRICS
AUTHENTICATION
FACE AUTHENTICATION
FINGERPRINT
AUTHENTICATION
RISK-BASED
AUTHENTICATION
CRONTO
AUTHENTICATION
TRANSACTION SIGNING
E-SIGNATURES
®
MOBILE APP SHIELDING & RUNTIME PROTECTION
1 2 3
SHIELD IT TEST IT TRUST IT
SEE FORYOURSELF RUNTIME ATTACK DEFENSEEASY INTEGRATION
Q&A

More Related Content

PPTX
Mobile application security
Shubhneet Goel
 
PDF
Mobile Application Security
cclark_isec
 
PPTX
Web and Mobile Application Security
Prateek Jain
 
ODP
Mobile Apps Security Testing -1
Krisshhna Daasaarii
 
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
ODP
Mobile App Security Testing -2
Krisshhna Daasaarii
 
PDF
Security Testing Mobile Applications
Denim Group
 
PDF
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Mobile application security
Shubhneet Goel
 
Mobile Application Security
cclark_isec
 
Web and Mobile Application Security
Prateek Jain
 
Mobile Apps Security Testing -1
Krisshhna Daasaarii
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Mobile App Security Testing -2
Krisshhna Daasaarii
 
Security Testing Mobile Applications
Denim Group
 
Challenges in Testing Mobile App Security
Cygnet Infotech
 

What's hot (20)

ODP
Mobile Apps Security Testing -3
Krisshhna Daasaarii
 
PDF
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
PPTX
Security testing of mobile applications
GTestClub
 
PDF
Mobile Application Security
Dirk Nicol
 
PPTX
Android Security
Arqum Ahmad
 
PDF
Mobile Application Pentest [Fast-Track]
Prathan Phongthiproek
 
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
PPTX
Pentesting Android Applications
Cláudio André
 
PPTX
Penetrating Android Aapplications
Roshan Thomas
 
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
PDF
Mobile_app_security
Hassan El Hadary
 
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
PPTX
Secure Android Apps- nVisium Security
Jack Mannino
 
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
PPTX
Android sandbox
Anusha Chavan
 
PDF
Android security - an enterprise perspective
Pietro F. Maggi
 
PPTX
Android security
Mobile Rtpl
 
PDF
VSEC Sourcecode Review Service Profile
Vietnamese Network Security J.S.C
 
PPTX
Android security
Midhun P Gopi
 
Mobile Apps Security Testing -3
Krisshhna Daasaarii
 
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
Security testing of mobile applications
GTestClub
 
Mobile Application Security
Dirk Nicol
 
Android Security
Arqum Ahmad
 
Mobile Application Pentest [Fast-Track]
Prathan Phongthiproek
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Pentesting Android Applications
Cláudio André
 
Penetrating Android Aapplications
Roshan Thomas
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
Mobile_app_security
Hassan El Hadary
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
Secure Android Apps- nVisium Security
Jack Mannino
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
Android sandbox
Anusha Chavan
 
Android security - an enterprise perspective
Pietro F. Maggi
 
Android security
Mobile Rtpl
 
VSEC Sourcecode Review Service Profile
Vietnamese Network Security J.S.C
 
Android security
Midhun P Gopi
 
Ad

Similar to Mobile Threats and Trends Changing Mobile App Security (20)

PDF
Unicom Conference - Mobile Application Security
Subho Halder
 
PDF
Jump-Start The MASVS
Prathan Phongthiproek
 
PDF
OWASP Day - OWASP Day - Lets secure!
Prathan Phongthiproek
 
PDF
Securing Mobile Apps - Appfest Version
Subho Halder
 
PDF
Securing 3-Mode Mobile Banking
Jay McLaughlin
 
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Nikola Milosevic
 
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
NowSecure
 
PDF
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
PDF
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
PDF
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
PPTX
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
PPTX
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
PDF
State of Application Security Vol. 4
IBM Security
 
PDF
State of Application Security: State of Piracy
IBM Security
 
PDF
Mobile security chess board - attacks & defense
Blueinfy Solutions
 
PPTX
Appsecurity, win or loose
Bjørn Sloth
 
PDF
Owasp masvs spain 17
Luis A. Solís
 
PDF
CNIT 128 8: Mobile development security
Sam Bowne
 
PPTX
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
IBM Security
 
Unicom Conference - Mobile Application Security
Subho Halder
 
Jump-Start The MASVS
Prathan Phongthiproek
 
OWASP Day - OWASP Day - Lets secure!
Prathan Phongthiproek
 
Securing Mobile Apps - Appfest Version
Subho Halder
 
Securing 3-Mode Mobile Banking
Jay McLaughlin
 
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Nikola Milosevic
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
NowSecure
 
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
State of Application Security Vol. 4
IBM Security
 
State of Application Security: State of Piracy
IBM Security
 
Mobile security chess board - attacks & defense
Blueinfy Solutions
 
Appsecurity, win or loose
Bjørn Sloth
 
Owasp masvs spain 17
Luis A. Solís
 
CNIT 128 8: Mobile development security
Sam Bowne
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
IBM Security
 
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
PPTX
Vulnerability Discovery in the Cloud
DevOps.com
 
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
PDF
A New Year’s Ransomware Resolution
DevOps.com
 
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
PDF
Don't Panic! Effective Incident Response
DevOps.com
 
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
PDF
Monitoring Serverless Applications with Datadog
DevOps.com
 
PDF
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
PPTX
Securing medical apps in the age of covid final
DevOps.com
 
PDF
How to Build a Healthy On-Call Culture
DevOps.com
 
PPTX
The Evolving Role of the Developer in 2021
DevOps.com
 
PDF
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
PPTX
Secure Data Sharing in OpenShift Environments
DevOps.com
 
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 

Recently uploaded (20)

PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
The Future of Artificial Intelligence (AI)
Mukul
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Software Development Methodologies in 2025
KodekX
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 

Mobile Threats and Trends Changing Mobile App Security

  • 1. MOBILE THREATS & TRENDS CHANGING MOBILE APP SECURITY September 18, 2018
  • 2. RECENT TRENDS © 2018 OneSpan North America Inc. 2
  • 3. #1: MOBILE FRAUD IN GENERAL IS INCREASING of fraud transactions came from mobile apps & browsers in Q2 2018 (↑ 9% over Q1 & ↑ 16%YOY) 71% https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
  • 4. #2 REPACKAGED OR FORGED/ROGUE MOBILE APPS ON THE RISE >9K rogue apps in Q2 2018 • >25% of fraud in Q2 2018 • 13% increase over Q1 2018 Repackaging attacks 1. Attacker downloads app from official stores 2. Reverse-engineers the app 3. Adds malicious functionality 4. Distributes tainted copy to unsuspecting users © 2018 OneSpan North America Inc. 4 https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
  • 5. #3: MOBILE BANKING TROJANS & OVERLAY ATTACKS ESCALATING 3.2Xmore mobile banking Trojan installation packages in Q2 2018 over Q1 https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/
  • 6. #4: NON-TRADITIONAL DISTRIBUTION MODELS (“SIDELOADING”) © 2018 OneSpan North America Inc. 6 https://www.kaspersky.com/blog/fortnite-security/23685/ • Users essentially have to compromise their device’s security • Devices that download apps from sources other than Google Play are 9X more likely to download malware • 15 million downloads & 23 million players (21 days after beta) • Fortnite was vulnerable to “man-in-the-disk attacks”
  • 7. WHY ARE MOBILE THREATS ON THE RISE?
  • 8. ATTACKERS FOCUS ON THE MONEY & SHIFT W/ CONSUMERS 2B Mobile banking users forecasted for 2018 200M Estimated increase in mobile users over 2017 50%Of global banked population are mobile banking users Futureproofing Digital Banking 2018,by Juniper Research published March 2018
  • 9. …AND IT’S NOT JUST BANKING $86Bspent in app stores in 2017 2Xgrowth in two years https://www.appannie.com/en/insights/market-data/app-annie-2017-retrospective/#download
  • 10. MOBILE APP COMPETITION IS FIERCE >3.1MApps on the Google Play Store >1.9MApps on the Apple App Store Priority becomes differentiating (adding/improving functionality) more quickly…
  • 11. MOBILE APP DEVELOPMENT AND SECURITY CHALLENGES • Balancing revenue-generating/retaining activities (e.g., new features) with security • Lack of security expertise • Mobile threats constantly evolve © 2018 OneSpan North America Inc. 11 of developers know it’s important but say they don’t have enough time to spend on security48% https://info.signalsciences.com/devsecops-community-survey-2018
  • 12. DIVING DEEPER INTO MOBILE APP ATTACKS © 2018 OneSpan North America Inc. 12
  • 13. MOBILE MALWARE DELIVERY EXAMPLE © 2018 OneSpan North America Inc. 13
  • 14. OVERLAY ATTACK EXPLAINED © 2018 OneSpan North America Inc.14 Example of legitimate screen Example of malicious overlay screen
  • 15. CODE INJECTION ATTACK EXPLAINED • ~3 min © 2018 OneSpan North America Inc. 15 Bad Guy 1 2 3 4
  • 16. WHAT IS DUE CARE WHEN IT COMES TO MOBILE APP SECURITY? © 2018 OneSpan North America Inc. 16
  • 17. YOU CAN’T COUNT ON THE PLATFORMS ALONE FOR SECURITY • Apple/Google constantly working to improve the situation • Security is a journey, not a destination • Known/unknown vulnerabilities in the OS & resulting periods of exposure • Incentives for Android/iOS vulnerabilities • Bad apps still make it onto the stores • APIs must be implemented correctly • Defense-in-depth requires going beyond what’s offered by Android and iOS © 2018 OneSpan North America Inc. 17
  • 18. 18 Differing levels of security based on the app in question L1: Baseline for mobile app security L2: Defense-in-depth measures for more sensitive apps R: Protection against client-side attacks (reverse-engineering) OWASP MOBILE APP SECURITYVERIFICATION STANDARD (MASVS) “The MASVS is a community effort to establish a framework of security requirements needed to design, develop and test secure mobile apps on iOS and Android. https://github.com/OWASP/owasp-masvs/releases/download/1.0/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf
  • 19. 19 It all starts with answering questions including but not limited to: • Can attackers monetize data handled by your app? • Is data handled by your app regulated? • Does your app handle financial transactions? • Are there motivated adversaries interested in your source code? WHAT LEVEL OF SECURITY DOESYOUR APP NEED? Verification Level Examples MASVS-L1 Basic security for any mobile app that doesn’t qualify for any of the higher levels MASVS-L2 • Fitness/Health Care: PII, PHI, regulations (HIPAA, etc.) • Financial: PII, payment card info, regulations (PCI DSS, FFIEC, etc.) MASVS-L1+R • Gaming: prevent cheating/modification • IP needs protection MASVS-L2+R • Financial: L2 requirements plus resilience against tampering and malware • Apps that store data on device, but support a wide range of devices and OS versions ?
  • 20. Fewest vulnerabilities possible • Strong authentication mechanism • Connect over HTTPS • Proper verification of the certificate of the server • Sensitive data stored securely on device • Use of strong cryptography (e.g., NOT ECB mode, SHA1, MD5, etc.) How can this be achieved? • Including security & approved methods in product requirements • Secure code training for developers • Automated security testing throughout the SDLC • Penetration testing prior to release WHAT MAKES A MOBILE APP SECURE? INTERNAL PERSPECTIVE
  • 21. Hardened against external threats • Fortified against reverse engineering • Resistant to runtime tampering • Resistant to repackaging • Can defend against client-side attacks • Overlay attacks • Rogue keyboards How can this be achieved? Mobile app shielding and runtime protection —also called mobile runtime application self protection or (RASP) WHAT MAKES A MOBILE APP SECURE EXTERNAL PERSPECTIVE
  • 23. KEY TAKEAWAYS © 2018 OneSpan North America Inc. 23 MOBILETHREATS ARE INCREASING INTHE WILD DEPENDING ONTHE PLATFORMS ALONE WILL LEAVEYOU EXPOSED PROTECTINGYOUR APP IN UNTRUSTED ENVIRONMENTS IS ESSENTIAL 1 2 3
  • 24. A KEY SOLUTION WITHIN A COMPLETE APP SECURITY PORTFOLIO © 2018 OneSpan North America Inc. 24 APP SHIELDING AND RUNTIME PROTECTION JAILBREAK AND ROOT DETECTION DEVICE IDENTIFICATION DEVICE BINDING SECURE STORAGE SECURE CHANNEL PUSH NOTIFICATION QR CODE SUPPORT GEOLOCATION BEHAVIORAL BIOMETRICS AUTHENTICATION FACE AUTHENTICATION FINGERPRINT AUTHENTICATION RISK-BASED AUTHENTICATION CRONTO AUTHENTICATION TRANSACTION SIGNING E-SIGNATURES ®
  • 25. MOBILE APP SHIELDING & RUNTIME PROTECTION 1 2 3 SHIELD IT TEST IT TRUST IT SEE FORYOURSELF RUNTIME ATTACK DEFENSEEASY INTEGRATION
  • 26. Q&A