DefCamp_2016_Chemerkin_Yury-publish.pdf - Presentation by Yury Chemerkin at DefCamp 2016 discussing mobile app vulnerabilities, data protection issues, and analysis of security levels across different types of mobile applications.
The document is an agenda for the Cyber Defense Initiative Conference 2011 being held from March 20-21, 2012 in Bangkok, Thailand. The conference theme is "Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity." The agenda includes discussions on mobile challenges for enterprises, what to look for in mobile device management (MDM) solutions, advanced threats over networks, and advanced network analysis tools. It also provides questions to consider when evaluating MDM solutions and discusses the need for intelligence-driven security and best-of-breed solutions to address evolving cyber threats.
Slides from data MindsConnect 2018 Conference hosted at Ghelamnco Arena in Ghent by Belgian SQL Server USer Grup. SECDev(OPS) How to embrace your security.
Presentation by Yury Chemerkin on mobile device management, security features, and compliance issues. Analyzes security capabilities across different mobile operating systems and discusses common vulnerabilities.
17 марта 2016 года в московском офисе Яндекса состоялась очередная встреча OWASP Russia Meetup — встреча сообщества специалистов по информационной безопасности. Основной темой этой встречи стала безопасность мобильных приложений. На встрече выступили эксперты, которые рассказали о различных аспектах этой темы и поделились примерами из реальной жизни и личного опыта.
В мероприятии участвовал Юрий Чемёркин, эксперт-исследователь «Перспективного мониторинга» с докладом «Безопасность мобильных приложений и утёкшие данные». Он рассказал, насколько не защищены многие популярные мобильные приложения и что нужно сделать, чтобы повысить их уровень защищённости.
The OWASP Mobile Top 10 is a nice start for any developer or a security professional, but the road is still ahead and there is so much to do to destroy most of the possible doors that hackers can use to find out about app’s vulnerabilities. We look forward to the OWASP to continue their work, but let’s not stay on the sidelines!
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.
This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
Mobile Security for Smartphones and TabletsVince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
The document provides an overview of securing Android applications according to the OWASP (Open Web Application Security Project) approach. It discusses the OWASP Mobile Security Project, performs a crash course on Android architecture and essentials, demonstrates threat modeling for Android apps, reviews the top 10 mobile risks and associated controls from OWASP, and provides resources for further information.
Enable best-of-breed security testing for enterprise, web and
mobile applications
• Facilitate application security testing for your customers at the
appropriate stage of their development lifecycle
• Identify security vulnerabilities such as SQL injection and
cross-site scripting (XSS)
• Automate correlation of static, dynamic and interactive application
security testing results
• Deliver detailed reporting to your customers that summarise
security vulnerabilities, assesses potential risk and offers
remediation tactics
This document summarizes an information security presentation about emerging threats to infrastructure. It discusses growing malware threats, how attacks are carried out through social engineering and exploiting vulnerabilities, and advanced persistent threats targeting critical systems. It emphasizes that compliance does not equal security and organizations must focus on proactive security practices like patching, user awareness training, and incident response planning to defend against sophisticated attacks.
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
This document discusses evolving cybersecurity strategies and moving to an identity-driven security model. It argues that the traditional approach of using many separate "best of breed" security products is too complex, expensive, and slow. Instead, it recommends moving to an integrated security platform centered around identity. This platform would provide pre-integrated solutions, identity-based policies, and machine learning capabilities to detect threats faster. It also discusses leveraging cloud infrastructure and workloads for improved security through features like regular updates and an "intelligent security graph" using data from billions of signals.
The document provides an overview of security testing techniques for mobile applications on different platforms like Android, BlackBerry and iOS. It discusses topics like application threat models, traffic analysis and manipulation, insecure data storage, reverse engineering application binaries, analyzing application components and runtime behavior. The document also mentions tools used for tasks like decompilation, debugging, monitoring network/file activity. Specific platform security features for Android, BlackBerry and iOS are outlined.
The document discusses security challenges in a mobile-first, cloud-first world where data, users, devices, and apps are distributed across on-premises, private cloud, public cloud, and mobile environments. It outlines how traditional perimeter-based security is no longer effective and Microsoft 365 provides a holistic solution to protect organizations at the front door, detect and remediate attacks, and protect data anywhere it goes.
Mobile Apps and Security Attacks: An IntroductionNagarro
A general overview of why the security of your mobile device is important, what are the possible threats to mobile devices, and how you can detect the threats.
A presentation by Yury Chemerkin titled "Who is the Biggest One?" examining data protection concepts, vulnerabilities, and security levels across various mobile applications and platforms.
The document provides definitions and concepts related to application security including assets, threats, vulnerabilities, attacks, and security controls. It discusses how application security aims to secure the confidentiality, integrity, and availability of data by protecting against vulnerabilities like SQL injection and cross-site scripting. The document demonstrates how attackers can exploit vulnerabilities in multiple phases, from information gathering to maintaining access. It recommends best practices for developers like following security standards, conducting audits, implementing logging, and keeping software updated. Finally, it discusses Facebook's response to the Cambridge Analytica data privacy scandal.
Similar to DefCamp_2016_Chemerkin_Yury_--_publish.pdf (20)
This PDF is a presentation by Yury Chemerkin at NullCon 2013, titled "State-of-Art of Mobile Forensics". It explores advanced techniques in mobile forensics, focusing on the security and vulnerabilities of mobile devices, particularly BlackBerry smartphones and PlayBook tablets. The presentation covers various types of malware, rootkits, and spyware, as well as methods for analyzing and extracting data from mobile devices for forensic purposes.
This document is the proceedings of the Fifth International Conference on Internet Technologies and Applications (ITA 13), held at Glyndŵr University in Wrexham, North Wales, UK. It includes various research papers and discussions on internet technologies and their applications, with a focus on security compliance challenges in cloud computing presented by Yury Chemerkin.
This PDF is a paper presented by Yury Chemerkin at the International Conference on Information Society (i-Society 2013). It addresses the challenges of security compliance in cloud environments. The paper discusses various threats, privacy issues, compliance requirements, and the complexities of managing security in cloud infrastructures. It also provides common security recommendations for cloud services, such as data encryption, access control, and incident response.
Presentation by Yury Chemerkin at the South East European Regional Forum on Cybersecurity and Cybercrime 2012. Covers mobile forensics techniques, data types, acquisition methods, and challenges for BlackBerry devices.
Presentation by Yury Chemerkin at CONFidence 2013. Analyzes security capabilities and vulnerabilities in BlackBerry, iOS, and Android mobile operating systems.
This document is a research paper titled "Security Compliance Challenges on Clouds" authored by Yury Chemerkin. It discusses various aspects of cloud security, including compliance with security standards, risk management, and the implementation of security controls in cloud environments. The paper is part of the proceedings of the International Conference on “Diversifying Trends in Technology & Management” and covers topics like cloud computing, artificial intelligence, and cybersecurity.
DefCamp_2017_Chemerkin_Yury-full.pdf - Presentation by Yury Chemerkin at DefCamp 2017 titled "The rise of security assistants over security audit services", discussing mobile data protection concepts, app security analysis, and tracking changes in app security over time.
Presentation by Yury Chemerkin at the 7th International Conference for Internet Technology and Secured Transactions 2012. Covers mobile forensics techniques and security issues for BlackBerry devices.
This document is a presentation by Yury Chemerkin for the AthCon 2013 conference. It explores how integration features impact sandbox environments, with a focus on reverse engineering, mobile security, and compliance. The presentation provides insights into the challenges and solutions related to sandboxing in cybersecurity, emphasizing the importance of transparency and secure integration practices.
This document from InfoSecurity Russia 2012 explores existing forensic solutions and synthesizes approaches to classical (dead) and live forensics. It details methods of data collection, including physical, commercial, logical, backup, and manual collection. The presentation also addresses data extraction from various devices, communication isolation, password protection, and the differences in forensic approaches between BlackBerry and Android devices.
Presentation by Yury Chemerkin at the 7th International Conference for Internet Technology and Secured Transactions 2012. Covers mobile forensics techniques and security issues for BlackBerry devices.
DefCamp_2015_Chemerkin_Yury.pdf - Slides from Yury Chemerkin's presentation at DefCamp 2015 on the "State of Art of Security App-Apocalypse", covering mobile app insecurity issues, data protection concepts, and analysis of security practices in various mobile apps.
A presentation by Yury Chemerkin discussing mobile security issues, vulnerabilities, and data protection challenges across different mobile platforms and applications.
This presentation from NotaCon 2014 examines the shift from Mobile Device Management (MDM) to Mobile Application Management (MAM) and the new challenges in mobile security. It discusses various aspects of enterprise mobile management, including network access control, antivirus solutions, mobile SIEM, data leakage prevention, compliance, and the management of mobile devices, applications, and information. The document also highlights the differences between MDM and MAM solutions and their respec
This presentation by Yury Chemerkin at HackMiami 2014 covers various aspects of mobile security and privacy. It includes topics such as reverse engineering, mobile security (including Identity and Access Management - IAM, Mobile Device Management - MDM, and Mobile Application Management - MAM), cyber security, cloud security, compliance, and forensics. The document also discusses forensics capabilities on application data access, data protection concepts, and the specifics of data storage on iOS
This paper by Yury Chemerkin examines mobile security challenges related to compliance standards. It analyzes gaps in security standards and guidelines for mobile platforms like iOS, Android, BlackBerry and Windows Phone.
This paper examines mobile device security from the perspective of Bring Your Own Device (BYOD) policies. It analyzes security models and frameworks for iOS, Android, BlackBerry and Windows mobile operating systems, focusing on application programming interfaces (APIs), permissions, and mobile device management (MDM) capabilities. The paper discusses security limitations and proposes ways to improve mobile security granularity and control.
This presentation focuses on security vulnerabilities in health and fitness apps, wearable devices, and smart home products. It demonstrates techniques for extracting sensitive data from these devices and applications, highlighting privacy risks.
This presentation from InfoSecurity Russia 2011 focuses on the security vulnerabilities of BlackBerry solutions. It covers various aspects of information security, mobile platforms, risk management, and reverse engineering. The document also discusses the architectural and functional documentation of BlackBerry's secure mobile platform, comparing it with other platforms like iOS, Android, and Windows Mobile.
This PDF is a paper presented by Yury Chemerkin at the International Conference on Information Society (i-Society 2013). It addresses the challenges of security compliance in cloud environments. The paper discusses various threats, privacy issues, compliance requirements, and the complexities of managing security in cloud infrastructures. It also provides common security recommendations for cloud services, such as data encryption, access control, and incident response.
Using ScyllaDB for Real-Time Write-Heavy WorkloadsScyllaDB
Keeping latencies low for highly concurrent, intensive data ingestion
ScyllaDB’s “sweet spot” is workloads over 50K operations per second that require predictably low (e.g., single-digit millisecond) latency. And its unique architecture makes it particularly valuable for the real-time write-heavy workloads such as those commonly found in IoT, logging systems, real-time analytics, and order processing.
Join ScyllaDB technical director Felipe Cardeneti Mendes and principal field engineer, Lubos Kosco to learn about:
- Common challenges that arise with real-time write-heavy workloads
- The tradeoffs teams face and tips for negotiating them
- ScyllaDB architectural elements that support real-time write-heavy workloads
- How your peers are using ScyllaDB with similar workloads
The Challenge of Interpretability in Generative AI Models.pdfSara Kroft
Navigating the intricacies of generative AI models reveals a pressing challenge: interpretability. Our blog delves into the complexities of understanding how these advanced models make decisions, shedding light on the mechanisms behind their outputs. Explore the latest research, practical implications, and ethical considerations, as we unravel the opaque processes that drive generative AI. Join us in this insightful journey to demystify the black box of artificial intelligence.
Dive into the complexities of generative AI with our blog on interpretability. Find out why making AI models understandable is key to trust and ethical use and discover current efforts to tackle this big challenge.
Connecting Attitudes and Social Influences with Designs for Usable Security a...Cori Faklaris
Many system designs for cybersecurity and privacy have failed to account for individual and social circumstances, leading people to use workarounds such as password reuse or account sharing that can lead to vulnerabilities. To address the problem, researchers are building new understandings of how individuals’ attitudes and behaviors are influenced by the people around them and by their relationship needs, so that designers can take these into account. In this talk, I will first share my research to connect people’s security attitudes and social influences with their security and privacy behaviors. As part of this, I will present the Security and Privacy Acceptance Framework (SPAF), which identifies Awareness, Motivation, and Ability as necessary for strengthening people’s acceptance of security and privacy practices. I then will present results from my project to trace where social influences can help overcome obstacles to adoption such as negative attitudes or inability to troubleshoot a password manager. I will conclude by discussing my current work to apply these insights to mitigating phishing in SMS text messages (“smishing”).
Flame emission spectroscopy is an instrument used to determine concentration of metal ions in sample. Flame provide energy for excitation atoms introduced into flame. It involve components like sample delivery system, burner, sample, mirror, slits, monochromator, filter, detector (photomultiplier tube and photo tube detector). There are many interference involved during analysis of sample like spectral interference, ionisation interference, chemical interference ect. It can be used for both quantitative and qualitative study, determine lead in petrol, determine alkali and alkaline earth metal, determine fertilizer requirement for soil.
Discover practical tips and tricks for streamlining your Marketo programs from end to end. Whether you're new to Marketo or looking to enhance your existing processes, our expert speakers will provide insights and strategies you can implement right away.
IVE 2024 Short Course Lecture 9 - Empathic Computing in VRMark Billinghurst
IVE 2024 Short Course Lecture 9 on Empathic Computing in VR.
This lecture was given by Kunal Gupta on July 17th 2024 at the University of South Australia.
Project Delivery Methodology on a page with activities, deliverablesCLIVE MINCHIN
I've not found a 1 pager like this anywhere so I created it based on my experiences. This 1 pager details a waterfall style project methodology with defined phases, activities, deliverables, assumptions. There's nothing in here that conflicts with commonsense.
Securiport Gambia is a civil aviation and intelligent immigration solutions provider founded in 2001. The company was created to address security needs unique to today’s age of advanced technology and security threats. Securiport Gambia partners with governments, coming alongside their border security to create and implement the right solutions.
2. INTRO: RISKY MOBILE APPS
Mobile applications store data locally and transfer it over networks (at least)
Data - not only binary protected or non-protected. Quality of protection matters
Reverse engineering gives an answer how it works and is protected (slowly)
Pentesting the data protection gives an answer ‘what happened’ and ‘why’ (faster)
Developers never tell and never admit they fail but they does
Privacy Policy might be pure, high detailed or misleading even
One app might be risky and has a quite bad data protection – OK
One risky app over several dozens apps is a betrayer that lead to leaks – not OK
3. OWASP MOBILE PAST vs. NOW
Top 10 Mobile Risks 2012-2013
M1: Insecure Data Storage
M2: Weak Server Side Controls
M3: Insufficient Transport Layer Protection
M4: Client Side Injection
M5: Poor Authorization and Authentication
M6: Improper Session Handling
M7: Security Decisions Via Untrusted Inputs
M8: Side Channel Data Leakage
M9: Broken Cryptography
M10: Sensitive Information Disclosure
Top 10 Mobile Risks 2014-2015
M1: Weak Server Side Controls
M2: Insecure Data Storage
M3: Insufficient Transport Layer Protection
M4: Unintended Data Leakage
M5: Poor Authorization and Authentication
M6: Broken Cryptography
M7: Client Side Injection
M8: Security Decisions Via Untrusted Inputs
M9: Improper Session Handling
M10: Lack of Binary Protections
Top 10 Mobile Risks 2016
M1: Improper Platform Usage
M2: Insecure Data Storage
M3: Insecure Communication
M4: Insecure Authentication
M5: Insufficient Cryptography
M6: Insecure Authorization
M7: Client Code Quality
M8: Code Tampering
M9: Reverse Engineering
M10: Extraneous Functionality
https://www.owasp.org/index.php/
Projects/OWASP_Mobile_Security_
Project_-_Top_Ten_Mobile_Risks
https://www.owasp.org/index.php/
Mobile_Top_10_2016-Top_10
Code Protection Code Protection &
Dev fails
Data Protection &
Dev fails
4. VULNERABILITIES IN DATA PROTECTION. EXCERPTs
Sensitive data leakage [CWE-200]
Sensitive data leakage can be either inadvertent or side channel
Protection can be poorly implemented exposing it:
Location; Owner ID info: name, number, device ID; Authentication credentials & tokens
Target App Information is also sensitive (out of scope of CWE-200)
Unsafe sensitive data storage [CWE-312]
Sensitive data should always be stored encrypted so that attackers cannot simply retrieve this
data off the file system, especially on removable disk like micro SD card or public folders (out
of scope of CWE-312) such as
banking and payment system PIN numbers, credit card numbers, or online service passwords
There’s no excuse for sandboxing without encryption here
Unsafe sensitive data transmission [CWE-319]
Data be encrypted in transmission lest it be eavesdropped by attackers e.g. in public Wi-Fi
If app implements SSL, it could fall victim to a downgrade attack degrading HTTPS to HTTP.
Another way SSL could be compromised is if the app does not fail on invalid certificates.
There’s no excuse for partial SSL validation here
6. SOLUTIONS. VULNERABILITY DBs
CVE, CWE, CVSS, NVD, and so on…
Put 100 vulns into the report – be ready to prove it works
Vulnerabilities are everywhere
7. SOLUTIONS. SECURITY SCANNERS
Incorporated into EMM, MDM, MAM solutions
Pure & High detailed at the same time
Based mainly on auto-scanners
Based on idea
API/System Calls Data Item
That ≠ any info how’s protected
Built like a checklist ‘be up-to-date’
8. SOLUTIONS. FORENSICS SOFTWARE
Isn’t easy to adopt for you needs.
You still don’t know how good or bad it was protected
But you know how much data can be extracted by these tools
Common features (example, Oxygen Software)
Social Networks. Extraction from Kate Mobile (30.1) from Android OS devices.
Messengers. Extraction from WhatsApp (2.16.1) including encrypted messages.
Messengers. Extraction from Skype (6.15.0.1162) from Blackberry 10 devices.
Business. Extraction from Yandex.Money (4.4.1) from iOS devices.
Messengers. Extraction from Telegram (3.7.0) from Android OS devices.
Messengers. Extraction from Viber (5.8.1) from iOS devices.
Social Networks. Extraction from LinkedIn (9.0.9) from iOS devices.
Social Networks. Extraction from Instagram (7.19.0) from Android OS devices.
http://www.oxygen-forensic.com/en/events/news
9. SOLUTIONS. PRIVACY POLICY
Privacy Policy is a ‘longread’ doc filled by scaring buzzphrases like:
We request all permissions & information we need
Do not guarantee the confidentiality of information and data
Participant is obliged to observe safety measures & care security
Under no circumstances be liable of business interruption, loss of
business, or other data or information …
Certified by PCI DSS… and use SSL
Everything is 100% protected because of SSL
Keep yourself inform about security.. by yourself
10. SOLUTIONS. SUMMARY
• Vuln. DBs make sense for known vulnerabilities. Vuln. Scanner is like
• 1st day: “Device is not checked yet! Check now! Congrats – 100% Secure”
• 2nd day: “Oops, device is 50% protected”. Wait for developer’s update
• … 364th day: “Finally, updated. Now 86% protected”. Another app is bad. Wait for update
• Security Scanner is mainly based on app code scanner. Lack of useful details
• “This application has vulnerabilities”. See a section above (Vuln. DBs)
• “This application has a HTTP”. It’s bad app!
• “This application encrypt your traffic”. It’s good app!
• “This application request your Device ID, IMEI,… and ACCESS to FILE SYSTEM”
• Very detailed about device & lack of details about files? This is APIDATA
• “Device is jailbroken/rooted”. Don’t do that! Fix it!
• “Malware detected”. Remove it!
11. PANDA SM MANAGER IOS APP - MITM
SSL CERTIFICATE VULNERABILITY
"Panda Systems Management is the new way to
manage and monitor IT systems.“
Issue
The Panda SM Manager iOS application (version 2.0.10
and below) does not validate the SSL certificate it receives
when connecting to a secure site.
http://osdir.com/ml/bugtraq.security/2016-
03/msg00018.html
Impact
An attacker who can perform a man in the middle attack
may present a bogus SSL certificate which the application
will accept silently.
Usernames, passwords and sensitive information could be
captured by an attacker without the user's knowledge.
Solution
Upgrade to version 2.6.0 or later
Timeline
July 19, 2015 - Notified Panda Security via
security@xxxx, e-mail bounced
July 20, 2015 - Resent vulnerability report to
corporatesupport@xxxx & security@xxxx
July 20, 2015 - Panda Security responded stating they
will investigate
July 31, 2015 - Asked for an update on their
investigation
August 3, 2015 - Panda Security responded stating
that the issue has been escalated and is still being
reviewed
August 14, 2015 - Asked for an update on their
investigation
October 16, 2015 - Asked for an update on their
investigation
March 1, 2016 - Panda Security released version 2.6.0
which resolves this vulnerability
IT TOOK 6 MINOR RELEASES & 8 MONTHES TO FIX ‘MITM’ ISSUE
12. ANSWERS ARE LOOKING FOR?
What questions are usually asked by customers when they see a security report?
Which security holes are important and may lead to the leakage?
What data may leak through the particular hole?
Do updates help? And when it will be fixed?
At a customer level:
Doe app need access to emails in address book, or handles & display names?
Does browser process need access to the home directory, or just downloads directory?
What does media player need write access to?
Does any solution answer any questions? Not really.
13. UPDATES DON’T WORK!
o App v2
o SSL worked but MITM was
possible (preinstalled cert?)
o Privacy Policy
“We encrypt our services and data transmission
using SSL”
“You’re responsible for privacy”. Just do it yourself
On March, 2016
Slide #48, http://goo.gl/wPfmgM
o App v3
o Everything is in plaintext by
HTTP, even app installers (APK)
o Privacy Policy
We adopt appropriate data collection, storage and
processing practices and security measures to
protect against unauthorized access, alteration,
disclosure or destruction of your personal
information, username, password, transaction
information & data stored on Site
Official Website http://goo.gl/FYOXjE
MOBOMARKET (ANDROID APP STORE), BEST ONE IN CHINA & INDIA
14. UPDATES DON’T WORK!
o Before Summer/Autumn 2016
eFax
Media Data (faxes) are PINNED, but
Media URL of faxes, Credentials &
rest data are MITMed (Cert)
Evernote
Everything is PINNED, except
Social credentials of LinkedIn
Locally stored data
Accessible via iTunes incl. all DBs
o Since Autumn 2016
eFax
MITM with
preinstalled/crafted/stolen CERT
Applies to all data items
Evernote
Everything is MITMed with
preinstalled/crafted/stolen CERT
Location data is not protected
Documents & Location Info: GEO
Data & Address Data
eFax – weird SSL Pinning Evernote – downgraded from Pinning
15. COMPLEX DATA LEAKAGE
Don’t trust email
applications?
Signed up for
account on
popular services
and got a
confirmation
email?
Here we go!
16. UPDATES. IT WORKS!
OS updates / Vendors (Apple, Google, Asus, HTC,…)
App updates
Updates fix the issues sometimes
But keep an eye on a vendor activity
17. VKONTAKTE – iPHONE, iPAD, ANDROID
VK for iPhone/Android
on fly MITM (no preinstalled cert need)
HTTPS was turned off by default,
everything except credentials were
transferred by HTTP
Updated in Autumn – now preinstalled
cert is need to MITM
VK for iPad
on fly MITM (no preinstalled cert need),
https was turned off by default
June 5th, 2016
VK DBs records for just 1 Bitcoin
(approx. US$580)
VK.com HACKED! 100 Million Clear
Text Passwords Leaked Online
http://thehackernews.com/2016/06
/vk-com-data-breach.html
18. Apple iMessage EXPOSES USER IP
ADDRESS AND DEVICE DETAILS
When the user opens iMessage to see the message,
even if he never clicks the link and accesses it,
iMessage would connect to the URL automatically,
and retrieve the necessary preview data plus user's
IP address, OS version, and device details.
Preview & device data issue is not iMessage only
issue.
Preview, device data and media have a weaker
protection issue is also known for many mobile apps
even if the rest data is good protected
http://news.softpedia.com/news/apple-s-
imessage-exposes-user-ip-address-and-device-
details-to-spammers-508948.shtml
19. APP IN THE AIR
Flight manager & notification app:
In-App, SMS, stats, history, so on
Y2014: HTTP
Simple notification app
Y2015+: HTTPS
Fake/Crafted/Preinstalled certificate
to perform MITM
20. INSTAGRAM: FROM INSECURITY TO
INSECURITY THOUGHT THE SECURITY
Metadata is usually technical data that is associated with
User Content. For example, Metadata can describe how,
when and by whom a piece of User Content was collected
and how that content is formatted.
Users can add or may have Metadata added including
a hashtag (e.g., to mark keywords when you post a
photo),
geotag (e.g., to mark your location to a photo),
comments or other data.
It becomes searchable by meta if photo is made
public
Details: (1), (2)
https://goo.gl/1IxKUg https://goo.gl/LPh07C
21. INSTAGRAM: FROM INSECURITY TO
INSECURITY THOUGHT THE SECURITY
Media Data incl. Advertisement and
Profile images
Y2014: Media data transferred as is
without protection and hosted on Amazon
Storage Service (AWS S3)
Y2015: Media data transferred over HTTPS
and hosted on Amazon Storage Service
(AWS S3); Crafted cert to MITM needed
Y2016: Media data transferred as is
without protection and hosted on own
Instagram storages
22. PureVPN iOS V.1.0.2
PureVPN ANDROID V.5.4.0
Account Information
Account Details, Settings 'n' Configs, Credentials IDs+Passwords, Account Media, Tracked/Favorites
Analytics 'n' Ads Information
Analytics Configs, Device Data, Environment
Application Information
Application Certificates 'n' Profile + Configs, Credentials (IDs+Passwords+ Tokens)
Device Information
Device Data but network data is available by preinstalled certificate
Location 'n' Maps Information
GEO & Address Data
VPN Information
Application Configs
iOS App’s data items protected by SSL pinning_Android App’s data item MITMed by preinstalled certificate
23. CYBERGHOST iOS V.6.4
CYBERGHOST ANDROID V.5.5.1.7
Account Information
Account & License Details
Analytics 'n' Ads Information
Application Information
Application Certificates 'n' Profile
Browser Information
Credentials IDs, Password, Tokens
Account & License Details, GEO Data, Environment, Application Config
Credentials Information
Credentials (IDs, Tokens, Access IDs, App Passwords, PreShared Secret)
Device Information
Environment & Network Details
Location 'n' Maps Information
GEO Data & Address Data
Log Information (supposed to be logs) – out of backup files, jailbreak/root required
Log Data, Credentials IDs, Tokens, Access IDs, App Passwords, PreShared Secret
GEO Data & Address Data, Account Details & License Details, Network Details
License information, credentials, app passwords, settings can be MITMed with crafted/stolen/installed certificate
24. iOS vs. ANDROID: CINEMAGIA
3.9.3 vs. 5.0.9 – Sept 2016
iOS – MITM with preinstalled cert
Account Info
Booking 'n' Purchases Info
Credentials Info
Device Info
Location 'n' Maps Info
Payment 'n' Transaction Info
Social Info
Android – Mainly w/o protection
Account Info
Booking 'n' Purchases Info
Credentials Info
Device Information
Location 'n' Maps Info
Payment 'n' Transaction Info
Social Info
25. GHOST PROJECTS: MOBILE APPS ALIVE, BUT NO
CHANGES SINCE MAY Y2014
ALTERGEO iOS 4.6 / Android 3.13
Account Information: Account Details, GEO & Address Data
Contact Information: Profile, Social, GEO, Stream, Place Details, Media URLs
Analytics 'n' Ads Information: Device Data & Environment
Browser Information: Credentials IDs, Passwords, Tokens
Credentials Information: Credentials IDs, Passwords, Tokens
Location Info: Messages, GEO & Address Data, Place Details, Media Data
Loyalty Information: GEO & Address Data + Place Details
Media Information: Place Details
Social Information: Media Data, Stream, Place Details + GEO Data
Out of backup file (rest is in backup)
Account Information: Address Data
Contact Information: Media Data
Location Info: GEO & Address Data, Place Details, Media Data
AlterGeo is Russian clone of Foursquare & Swarm; nothing is protected except browser log-in, but not an in-app login
26. WEIRD PROJECTS:
WEATHER STREET STYLE 1.8.6
ANDROID ONLY
Account Information
Account & Media Data
Address Data, Account Settings
Credentials Information
Credentials IDs + Passwords
Activation IDs + Tokens
Device Information:
Device Details
Location 'n' Maps Information:
GEO Data, GEO Snapshots
Social Information:
Contact Profile, Media Data, Messages
Weather Information:
Weather Data
Weather style is app to show what people wear at the moment in different countries. Everything in plaintext
27. IHG & MARRIOTT APPS
WHEN ENCRYPTION DOESN’T MATTER
Everything is MITMed with crafted / stolen / preinstalled certificate
Account, Analytics, Application Info, Booking, Credentials, Device Information,
Financial Information, Location, Log, Loyalty, Media, Payment 'n' Transaction,
Personal 'n' Private and Travel Information
Encrypted Credentials Information: Passwords - IHG only
Doesn’t make a sense if it’s only way to give an access to the user account
Makes a sense if it’s data that stored locally if it’s out of backup even
Limited access by a time (no longer 180 days)
Booking 'n' Purchases Information: Orders & Reservation History
28. FLOW & IFTTT
ABSOLUTE POWER OVER YOUR ACCOUNTS
In this research were found over 8K data items
30 unique data groups
105 unique data items
462 unique pairs of data group & data item
In each app Flow and IFTTT were found
15 unique data group out of all 30 = 50%
52 unique data items out of all 105 = 50%
~150 unique pairs of data group & data item out of all 462 = 30%
Everything is MITMed with crafted / stolen / preinstalled certificate
Account, Analytics, Browser, Credentials, Device Info, Events, Location,
Media, Message, News, Social, Storage Info, Tasks, Weather, Workflow
Data includes everything to direct access, such as credentials/tokens, and data
itself from linked services, such as Dropbox or mobile device GEO/network lists
IFTTT & Flow are two apps to automatize any kind of activities with social networks or IoT
29. WECHAT
HOW TO FAIL BEING AWESOME
Awesome protected (many security fails fixed by now), encrypted, own
protocol:
Account Information: Account Settings 'n' Configs
Address Book 'n' Contact Information: Contact Profile
Application Information: Application Configs
Location 'n' Maps Information: GEO Data
Message Information: Media Data, vCard, Messages, Short Profile
But Location data is still out of protection
Location 'n' Maps Information: Contact Media
Message Information: GEO & Address Data, GEO Snapshots, Place
Details
Many Chinese apps might be with a lack of protection or overloaded with own protocols, encryption of data and code
30. FACEBOOK & MESSENGER.
DUPLICATE DATA, PREVIEW AND LOCATION FAILS
Application Information
Log Data
Credentials (Passwords)
Credentials (App Passwords)
Transaction History
Contact Short Profile
Credentials (IDs)
Card Full Information
Card Short Information
Credentials (Tokens)
Browser Information
Preview
Message Information
GEO Data
GEO Snapshots
https://m.facebook.com/password/change/?refid=70
36. UNTRUSTED PLACES
• Untrusted chargeable places.
• When you connect your device to them you will see a notification
you plugged to PC/Mac
• Or lost devices
• Untrusted network places.
• When you connect your device to them
• You will see nothing
• You will see a question about untrusted certificate. You accept or
decline it
• Someone make you to install trusted certificate
37. EXTRACTING LOCAL DATA. EXAMPLES
• Oxygen Forensic® Detective introduces offline maps and new
physical approach for Samsung Android devices!
• The updated version offers a new physical method for
Samsung Android OS devices via custom forensic recovery. This
innovative approach allows to bypass screen lock and extract
a full physical image of supported Samsung devices.
• http://www.oxygen-forensic.com/en/events/news/666-
oxygen-forensic-detective-introduces-offline-maps-and-new-
physical-approach-for-samsung-android-devices
41. SSL ISSUES: Apps, Mozilla, WoSign,
Apple, Google
Applications handle SSL connection in different ways:
Some don’t validate SSL certificate during the connection
Many trust to the root SSL certificates installed on the device due to SSL validating
Some have pinned SSL certificate and trust it only
Trusting root certificate might not be a good idea (Mozilla reports):
Between 16th January 2015 and 5th March 2015, WoSign issued 1,132 SHA-1 certificates
whose validity extended beyond 1st January 2017
Between 9th April 2015 and 14th April 2015, WoSign issued 392 certificates with duplicate
serial numbers, across a handful of different serial numbers
It is important background information to know which WoSign roots are cross-signed by
other trusted or previously-trusted roots (expired but still unrevoked)
Eventually Apple removes SSL certificate from iOS, perhaps from iOS 10 only
https://support.apple.com/en-us/HT204132, https://support.apple.com/en-us/HT202858
https://threatpost.com/google-to-distrust-wosign-startcom-certs-in-2017/121709/
42. DATA PROTECTION CONCEPTS (DPC)
There are known many of them, some were renamed but still 3:
Data-at-Rest (DAR)
Locally stored data on internet or external storage. Data might divide
into several parts, full data, backup data, and containerized data
Data-in-Transit (DIT)
Data transmitted over Internet and local wireless network (as part of
solid internet connection) and limited by it
Data-in-Use (DIU)
Referred to data operated in internal memory (not storage) and
application code, like hardcoded values
43. IMPLEMENTATION OF DPC. DATA-AT-REST
No special tools for viewing various data types
No root to gain an access backup data
No root to gain an access to internal storage to
the application data folder (works only for iOS
older than 8.3) CVE-2015-1087
Root to gain an access to internal storage to the
keychain folder
Root to gain an access to internal storage to the
application data folder (iOS 8.3 and higher)
Root to gain an access to internal storage in
general
No special tools for viewing various data types
Root to gain an access to internal storage.
No root to gain an access to external storage,
public folders or backup data
Unlocking locked bootloader wipes all data on
several devices, e.g. HTC
Non-locked or unlocked bootloader might give an
opportunity to root a device, grab data or install
malicious application and de-root it back, e.g.
Samsung, LG (details, news, http://www.oxygen-
forensic.com/en/events/news)
44. IMPLEMENTATION OF DPC. DATA-IN-TRANSIT
Do not require a root for cases, such as
onon-protected traffic,
ono SSL validation except centralized list of certificates
oMITM possible - fake/crafted/stolen SSL certificate installed as trusted
Require root for cases, such as
oSSL Pinning to bypass it automatically or manually
oRest cases that directly impacts on app code and mixed with DIU
App-level proxy
is an alternative internet access
OS-level proxy
no app-level alternative tunnels
45. QUANTIFICATION SECURITY LEVELS. DAR
Non-Protected
Protection N/A or Jailbroken iOS
Encode Protected
Encoded data (zlib, bas64, etc.)
Weak Protected
App Data access w/o jailbreak iOS <8.3
Obesity Protected
Not Defined
Medium Protected
Data available via sharing, such as iTunes
Iterim Protected
Access limited by time, e.g. cache folders
Good Protected
Not Defined
Strong Protected
Sandboxed data, jailbreak needs & wipe data
Extra Protected
No public tools for a jailbreak is available
Best Protected
Not Defined
Protection N/A, rooted,public folders,SD cards
Encoded data (zlib, bas64, etc.)
Not Defined
Not Defined
Not Defined
Access limited by time, e.g. cache folders
Sandbox, root/unlocking not wipe data
Sandboxed data, root needs & wipe data
No public tools for a jailbreak is available
Not Defined
46. Non-Protected
Protection N/A, Jailbroken, crafted certificate Protection N/A, rooted, crafted certificate
Encode Protected
Encoded data (zlib, bas64, etc.) Encoded data (zlib, bas64, etc.)
Weak Protected
Stolen or expired certificates Stolen or expired certificates
Obesity Protected
Not Defined Not defined
Medium Protected
Basic feature of SSL validation of certificates Basic feature of SSL validation of certificates
Iterim Protected
Not defined App-level proxy/tunnel for internet
Good Protected
Not defined Not defined
Strong Protected
Not defined Not defined
Extra Protected
System and/or user VPN System and/or user VPN
Best Protected
Not Defined Not defined
QUANTIFICATION SECURITY LEVELS. DIT
47. LIST OF SOFTWARE RELATED TO
SECURITY CHECKS
File Viewers
Online services & tools for calculations
Network Debug & Pentest
Debuggers, Disassemblers, Decompilers,
activity tracers, and pentest frameworks
File & Device Access
Forensics & special pentest solutions
No tools
Non-Protected
Weak Protected
Obesity Protected
Medium Protected
Iterim Protected
Good Protected
Strong Protected
Extra Protected
Best Protected
Encode Protected
Free or
paid
$100-
300 or
less
Free or Paid
Home ~$100
Enterprise
$300+
$5-10k+,
lightweight -
$100-1k
No tools, if no
data available
48. SOLUTIONS: FOR DEVELOPERS
Secure Mobile Development Guide by NowSecure
Coding Practices
Handling Sensitive Data
iOS & Android Tips
etc.
https://books.nowsecure.com/secure-mobile-
development/en/index.html
49. SOLUTIONS: DATA PROTECTION DBs
• We [as security experts] know what data is protected and not
protected despite of it’s locally stored, transferred or hardcoded
• Also, we know two simple things
• not only users publish their data
• developers can’t protect data
• At the same time we’re customers, right?
• I’m as a customer prefer and have a right to know where devices shouldn’t
be connected to network or plugged PC/Mac.
• Developers aren’t going to tell me if they fail. Instead they’re telling
‘everything is OK but they're not responsible for anything’
50. SOLUTIONS: DATA PROTECTION DBs
• Goal is providing a solution that helps to keep ‘everyone’
informed about app security fails.
• Everyone means
• app users as well as app developers
• you don’t need to be expert to understand that how it affects
you; you just know if it has required level of protected or not
• but you have to get used that your application operates many
data visible and not visible for you beyond the blueberry
muffins over the weekend
51. Vulnerabilities matter but exist over 40 years
Vulnerability is a defect/flaw in design in dev’s code or third party libraries
Lack of data protection is usually an insecurity by design and implementation fails
Even OWASP considers data protection as more important thing than vulnerabilities by now
Lack of data protection is described by 3 vulnerabilities
sensitive data leakage, storage, transmission CWE-200, CWE-312, CWE-319
PrivacyMeter gives answer about (at the moment)
list of apps and average values (Raw value, Environment value depend on OS)
list of app data items grouped by ‘protection levels/categories’
data item protection level and explanation
examination of privacy policy in regards to gained app results
Results are available on the web-site http://www.privacymeter.online/ see booklets (!)
Download the Autumn Report http://www.privacymeter.online/reports see booklets (!)
52. APPS FINDINGS. OVERALL RESULTS
250 apps = 135 iOS apps + 115 Android apps
8124 data items = 4287 (iOS) + 3837 (Android)
20+ application groups (17 unique groups)
30 data groups & 105 data items over 8K data items
462 unique pairs of data group & data item
News & Magazines
Productivity
Shopping
Social Networking
Tools & Utilities
Transportation
Travel & Local
Weather
Business
Communication
Entertainment
Finance
Food & Drink
Lifestyle
Photo & Video
Music
Navigation
53. DATA GROUPS' AVERAGE PROTECTION
LEVEL. iOS VS. ANDROID
0.00 1.00 2.00 3.00 4.00 5.00 6.00 7.00
Account Information
Address Book 'n' Contact Information
Analytics 'n' Ads Information
Application BaaS Information
Application Information
Booking 'n' Purchases Information
Bookmark Information
Browser Information
Call Information
Credentials Information
Device Information
Documents Information
Events Information
Financial Information
Location 'n' Maps Information
Log Information
Loyalty Information
Media Information
Message Information
News Information
Notification Information
Payment 'n' Transaction Information
Personal 'n' Private Information
Social Information
Storage Information
Tasks Information
Travel Information
Visa 'n' Passport Information
VPN Information
Weather Information
Workflow Information
iOS Android
54. QUANTITY OF APPS PER EACH GROUP
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
90.00%
100.00%
Worst applications Bad applications Good applications Best applications
iOS 27.41% 100.00% 97.04% 30.37%
Android 24.35% 100.00% 30.43% 20.87%
27.41%
100.00% 97.04%
30.37%
24.35%
100.00%
30.43%
20.87%
iOS Android
55. WORST PROTECTED ITEMS OVER APPS
0
1
2
3
4
5
6
Env (iOS) Raw (iOS) Env (Android) Raw (Android)
56. WORST PROTECTED ITEMS OVER APPS
Account Information: Account Details, GEO & Address
Contact Information: GEO + Profile + Social + Media URLs + Place Details +
Stream
Analytics 'n' Ads Information: Device Data & Environment
Credentials Information: Credentials IDs & Passwords
Events Information: Stream
Location 'n' Maps Information: GEO & Address, Media Data, Messages, Place
Details
Loyalty Information: Account Data, GEO & Address, Place Details
Media Information: Place Details
Many of applications reveal something in plaintext 8 groups, 16 data items, 30 pairs of group + data items
57. WORST iOS AND ANDROID APPLICATIONS
0
0.5
1
1.5
2
2.5
3
AppCompass Cris Taxi
Bucuresti
Fixtaxi
(Aerotaxi)
Meridian Taxi Skyscanner Taxi 777 Velobike
Env (iOS) Raw (iOS) Env (Android) Raw (Android)
58. GOOD iOS & ANDROID APPS
0
1
2
3
4
5
6
Env (iOS) Raw (iOS) Env (Android) Raw (Android)
4.6
4.8
5
5.2
5.4
5.6
5.8
Asana British
Airways
British
Airways for
iPad
Cloud Hub Firefox Google
Trips
NS Wallet
FREE
NS Wallet
PRO
ParkSeason Spaces Trello
Env (iOS) Raw (iOS) Env (Android) Raw (Android)
61. [ YURY CHEMERKIN ]
• MULTISKILLED SECURITY EXPERT
• EXPERIENCED IN :
• REVERSE ENGINEERING & AV, DEVELOPMENT (PAST)
• MOBILE SECURITY, & CLOUD SECURITY
• IAM, COMPLIANCE, FORENSICS
• PARTICIPATION & SPEAKING AT MANY SECURITY
CONFERENCES
62. RISKWARE BETRAYER
WHO IS THE BIGGEST ONE?
HOW TO CONTACT ME ?
ADD ME IN LINKEDIN:
HTTPS://WWW.LINKEDIN.COM/IN/YURYCHEMERKIN
YURY CHEMERKIN
SEND A MAIL TO: YURY.S@CHEMERKIN.COM