Weeks 9 & 10 - Mobile Security

These final weeks will pivot from personal computers to mobile devices. It is worth noting how new the technology is despise the overwhelming presence in today's society.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University

There are a couple of ways to get around the system's security. In iOS, jailbreaking can be done to run third party applications. In Android, the OS can be rooted which allows root access to the system. Android security has had enhancements with every new version of the operating system. The following timeline is outdated but it gives a nice overview of the beginning of mobile platforms.
source: lecture slides, Defense Against the Dark Arts, CS373, Oregon State University

Timeline of mobile malware:

The first botnet called YXES was detected in Symbian in 2009, the malware was passed via SMS
IKEE - first iIS malware detected in November 2009. It only targeted jailbroken iPhones.
FakePlayer was the first Android malware found in August 2010. It is a trojan distributed via SMS. Tapsnake was found around the same time and was the fist malware found in the app store Google Play.
Genimi was the fist Android botnet found in December 2010 in China, it was distributed in third party markets. It leaked device information and location coordinates and prompted the user to uninstall applications
PJAPPS was one of the first android malware that intercepted all SMS messages.
DroidDream was the most sophisticated piece of mobile malware when it was first detected. Because it was bypassing google security, google's reaction was to implement a remote kill switch. They remotely removed all of the affected applications from people's devices.

Comments

Popular posts from this blog

Week 5 - Windows Internals

Week 1 - Introduction to Malware

Week 4 - Software Vulnerabilities and Common Exploits