Weeks 9 & 10 - Mobile Security
These final weeks will pivot from personal computers to mobile devices. It is worth noting how new the technology is despise the overwhelming presence in today's society.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University
There are a couple of ways to get around the system's security. In iOS, jailbreaking can be done to run third party applications. In Android, the OS can be rooted which allows root access to the system. Android security has had enhancements with every new version of the operating system. The following timeline is outdated but it gives a nice overview of the beginning of mobile platforms.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University
Timeline of mobile malware:
The first botnet called YXES was detected in Symbian in 2009, the malware was passed via SMS
IKEE - first iIS malware detected in November 2009. It only targeted jailbroken iPhones.
FakePlayer was the first Android malware found in August 2010. It is a trojan distributed via SMS. Tapsnake was found around the same time and was the fist malware found in the app store Google Play.
Genimi was the fist Android botnet found in December 2010 in China, it was distributed in third party markets. It leaked device information and location coordinates and prompted the user to uninstall applications
PJAPPS was one of the first android malware that intercepted all SMS messages.
DroidDream was the most sophisticated piece of mobile malware when it was first detected. Because it was bypassing google security, google's reaction was to implement a remote kill switch. They remotely removed all of the affected applications from people's devices.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University
There are a couple of ways to get around the system's security. In iOS, jailbreaking can be done to run third party applications. In Android, the OS can be rooted which allows root access to the system. Android security has had enhancements with every new version of the operating system. The following timeline is outdated but it gives a nice overview of the beginning of mobile platforms.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University
The first botnet called YXES was detected in Symbian in 2009, the malware was passed via SMS
IKEE - first iIS malware detected in November 2009. It only targeted jailbroken iPhones.
FakePlayer was the first Android malware found in August 2010. It is a trojan distributed via SMS. Tapsnake was found around the same time and was the fist malware found in the app store Google Play.
Genimi was the fist Android botnet found in December 2010 in China, it was distributed in third party markets. It leaked device information and location coordinates and prompted the user to uninstall applications
PJAPPS was one of the first android malware that intercepted all SMS messages.
DroidDream was the most sophisticated piece of mobile malware when it was first detected. Because it was bypassing google security, google's reaction was to implement a remote kill switch. They remotely removed all of the affected applications from people's devices.
Comments
Post a Comment