Unit 3 SE PDF
Unit 3 SE PDF
• Variants of this hoax have been circulating since 1999. The information in
the email is completely untrue and has certainly not been "confirmed by
both Motorola and Nokia".
• Forwarded messages claim that a destructive virus will infect your mobile
(cell) phone if you receive a call that displays "ACE" or "XALAN" on the
screen.
38.3. Mishing
'Mishing' is a combination of the words mobile phone and phishing.
Mishing is very similar to phishing—the only difference is the
technology.
Phishing involves the use of emails to trick you into providing your
personal details, whereas mishing involves mobile phones.
If you use your mobile phone for purchasing goods and services
and convenient banking, you could be more vulnerable to a Mishing
scam.
Variants of Mishing:
Vishing : Mishing attacker makes call for phishing
Smishing: Mishing attacker sends SMS for phishing
Vishing
The term "vishing" is a socially engineered technique for stealing
information or money from consumers using the telephone
network.
The term comes from combining "voice" with "phishing," which
are online scams that get people to give up personal information.
Vishing is very similar to phishing—the only difference is the
technology.
Vishing involves voice or telephone services. If you use a Voice
over Internet Protocol (VoIP) phone service, you are particularly
vulnerable to a vishing scam.
Vishing is usually used to steal credit card numbers or other
related data used in ID theft schemes from individuals.
Profitable uses of the information gained through a
Vishing attack include:
ID theft
Purchasing luxury goods and services
Transferring money/ funds
Monitoring the victims bank accounts
Making applications for loans and credit cards
How Vishing works?
1. Internet E-mail: it is also called phishing mail.
2. Mobile text messaging
3. Voice mail
4. Direct phone call: a vishing perpetrator (visher) may gain access
to a group of private customer phone numbers.
The visher may then call the group(may use war dialer)
When a potential victim answers the phone, he or she hears an
automated recording informing him that his bank account has been
compromised.
He then calls the specified toll-free number to reset his security
settings and hears another automated message requesting the user’s
bank account number and/or other personal details via the phone
keypad..
How to protect from Vishing
attack?
Be suspicious of all unknown callers
Don't trust caller ID: caller ID spoofing is easy
Ask questions: ask them to identify who they work
for, and then check them out to see if they are
legitimate.
Call them back: call them back using a number from
your bill or your card. Never provide credit card
information or other private information to anyone
who calls you
Report incidents: to nearest cyberpolice cell
Smishing
Short for SMS Phishing, smishing is a variant of
phishing email scams that instead utilizes Short Message
Service (SMS) systems to send bogus text messages.
Also written as SMiShing, SMS phishing made recent
headlines when a vulnerability in the iPhone's SMS text
messaging system was discovered that made smishing on
the mobile device possible.
How smishing works?
Smishing scams frequently seek to direct the text
message recipient to visit a website or call a phone
number, at which point the person being scammed is
enticed to provide sensitive information such as credit
card details or passwords.
Smishing websites are also known to attempt to infect
the person's computer with malware.
Example
Text message originating from either notice@jpecu or
message@cccu :
ABC CU – has –deactivated – your Debit_card. To
reactivate contact:210957XXXX
This is an automated message from ABC Bank.
Your ATM card has been suspended. To reactivate call
urgent at 1 866 215 XXXX
Text message originating from [email protected] :
[email protected]/VISA. (Card Blocked) Alert. For
more information please call 1-877-269-XXXX
How to protect from Smishing
attacks?
Do not answer a text message
Avoid calling any phone numbers
Never click on a hot link received through messages
Hacking bluetooth
Bluetooth hacking is a technique used to get information
from another Bluetooth enabled device without any
permissions from the host.
This event takes place due to security flaws in the
Bluetooth technology.
It is also known as Bluesnarfing.
Bluetooth hacking is not limited to cell phones, but is also
used to hack PDAs, Laptops and desktop computers.
Bluetooth hacking is illegal and can lead to serious
consequences.
Following are threats a person can face when
his/her mobile phone gets bluesnarfed:
The hacker can steal, delete contacts
Hacker can extract personal files/pictures etc.
Your cell phone can be used for making calls and using
internet at your expense.
The hacker may call or text your contacts to annoy them.
You mobile phone can be reset to default factory settings
hence deleting your personal settings
Hacker can even access your calendar, clock, International
Mobile Equipment Identity (IMEI) number. IMEI number
can be used to clone your cell phone so that your messages
are also routed to another number. Cloning is also
considered illegal.
Common attacks
Bluejacking
Bluesnarfing
Bluebugging
Car wishper
Bluejacking
Bluejacking is the sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices such as
mobile phones, PDAs or laptop computers, sending a
vCard which typically contains a message in the name
field (i.e., for bluedating or bluechat) to another
Bluetooth-enabled device .
Bluejacking is also known as bluehacking.
Bluejacking exploits a basic Bluetooth feature that
allows devices to send messages to contacts within
range.
Bluejacking is harmless
Bluesnarfing
Bluesnarfing(To take somethimg without permission) is
the unauthorized access of information from a wireless device
through a Bluetooth connection, often between phones,
desktops, laptops, and PDAs (personal digital assistant.).
This allows access to a calendar, contact list, emails and text
messages, and on some phones, users can copy pictures and
private videos.
Both Bluesnarfing and Bluejacking exploit others' Bluetooth
connections without their knowledge.
While Bluejacking is essentially harmless as it only transmits
data to the target device, Bluesnarfing is the theft of
information from the target device.
Bluebugging
Bluebugging: it allows attackers to remotely access a users phone and
use its features without users attention. It is a form of Bluetooth attack
often caused by a lack of awareness.
It was developed after the onset of bluejacking and bluesnarfing.
Similar to bluesnarfing, bluebugging accesses and uses all phone
features
Bluebugging manipulates a target phone into compromising its
security, this to create a backdoor attack before returning control of the
phone to its owner. Once control of a phone has been established, it is
used to call back the hacker who is then able to listen-in to
conversations.
The Bluebug program also has the capability to create a call forwarding
application whereby the hacker receives calls intended for the target
phone.
Not only can a hacker receive calls intended for the target phone, he
can send messages, read phonebooks, and examine calendars.
Car Whisperer
Software that intercepts a hands-free Bluetooth conversation
in a car.
the Car Whisperer enables an attacker to speak to the driver
as well as eavesdrop on a conversation.
By exploiting the fact that a common security code (passkey)
is used by many Bluetooth hands-free system vendors, the Car
Whisperer sets up a two-way session with the car and a Linux
computer.
an attacker could access a telephone address book once he has
connected with the Bluetooth system,
May disable airbags or breaks
The best way to avoid being "Car Whispered" is to simply connect the
in-car system to a Bluetooth phone, because only one such device can
be connected at a time.
Common bluetooth attack tools
BTScanner
Bluesnarfer
Bluediving
Bluebugger
Bluesniff
Mobile Devices: Security Implications for Organizations
Managing diversity and proliferation of Hand-Held
devices
Unconventional/ stealth storage devices
Threat through lost and stolen devices
Protecting data on lost devices
Educating the laptop users
1. Managing diversity and
proliferation of Hand-Held devices
Employees aren't just bringing their mobile devices to
the workplace—they're living on them
As smartphones and tablets become constant
companions, cyber attackers are using every avenue
available to break into them.
With the right (inexpensive) equipment, hackers can
gain access to a nearby mobile device in less than 30
seconds and either mirror the device and see
everything on it, or install malware that will enable
them to siphon data from it at their leisure.
Analysts predict that by 2018, 25 percent of corporate
data will completely bypass perimeter security and flow
directly from mobile devices to the cloud.
Chief information security officers (CISOs) and other
security executives are finding that the proliferation of
mobile devices and cloud services are their biggest
barriers to effective breach response.
In order to secure the corporate data passing through
or residing on mobile devices, it is imperative to fully
understand the issues they present.
5 Security Risks and a Surprising
Challenge
1. Physical access
2. Malicious Code
3. Device Attacks
4. Communication Interception
5. Insider Threats
Physical access
Mobile devices are small, easily portable and extremely
lightweight.
hence easy to steal or leave behind in airports, airplanes or
taxicabs.
As with more traditional devices, physical access to a mobile
device equals “game over.”
The cleverest intrusion-detection system and best anti-virus
software are useless against a malicious person with physical
access.
Circumventing a password or lock is a trivial task for a seasoned
attacker, and even encrypted data can be accessed.
This may include not only corporate data found in the device,
but also passwords residing in places like the iPhone Keychain,
which could grant access to corporate services such as email and
virtual private network (VPN).
Malicious Code
Mobile malware threats are typically socially engineered and focus on
tricking the user into accepting what the hacker is selling.
The most prolific include spam, weaponized links on social networking
sites and rogue applications.
Android devices are the biggest targets, as they are widely used and
easy to develop software for.
Mobile malware Trojans designed to steal data can operate over either
the mobile phone network or any connected Wi-Fi network.
They are often sent via SMS (text message); once the user clicks on a
link in the message, the Trojan is delivered by way of an application,
where it is then free to spread to other devices.
When these applications transmit their information over mobile phone
networks, they present a large information gap that is difficult to
overcome in a corporate environment.
Device Attacks
Attacks targeted at the device itself are similar to the
PC attacks of the past.
Browser-based attacks, buffer overflow exploitations
and other attacks are possible.
The short message service (SMS) and multimedia
message service (MMS) offered on mobile devices
afford additional avenues to hackers.
Device attacks are typically designed to either gain
control of the device and access data, or to attempt a
distributed denial of service (DDoS).
Communication Interception
Wi-Fi-enabled smartphones are susceptible to the same attacks that
affect other Wi-Fi-capable devices.
The technology to hack into wireless networks is readily available, and
much of it is accessible online, making Wi-Fi hacking and man-in-the-
middle (MITM) attacks easy to perform.
Cellular data transmission can also be intercepted and decrypted.
Hackers can exploit weaknesses in these Wi-Fi and cellular data
protocols to eavesdrop on data transmission, or to hijack users’ sessions
for online services, including web-based email.
For companies with workers who use free Wi-Fi hot spot services, the
stakes are high.
While losing a personal social networking login may be inconvenient,
people logging on to enterprise systems may be giving hackers access to
an entire corporate database.
Insider Threats
Mobile devices can also facilitate threats from employees and other
insiders.
Malicious insiders can use a smartphone to misuse or misappropriate
data by downloading large amounts of corporate information to the
device’s secure digital (SD) flash memory card, or by using the device
to transmit data via email services to external accounts.
The downloading of applications can also lead to unintentional threats.
The misuse of personal cloud services through mobile applications is
another issue; when used to convey enterprise data, these applications
can lead to data leaks that the organization remains entirely unaware
of.
Many device users remain unaware of threats, and the devices
themselves tend to lack basic tools that are readily available for other
platforms, such as anti-virus, anti-spam, and endpoint firewalls.
Policy making efforts
Organization needs to establish security practice subject to
legal and external constraints
Policy making effort starts with the commitment of CEO,
president or Director who takes cybersecurity seriously
Mobile devices of the employees should be registered in the
corporate asset register
Close monitoring of these devices
Physical access to corporate resources must be removed
from mobile devices before the employee leaves
Employees register their device with the IT department: to
control the access
Unconventional/ Stealth Storage
devices
Secondary storage devices
CDs
USBs
Portable external hard disks
Portable storage devices can be easily lost or stolen.
Decrease in size and emerge in new shape and sizes – difficult to
detect
Prime challenge for organizational security
Firewalls and antivirus software are no defense against the open
USB ports
Remedy- block these ports, but Windows OS do not support
Disgruntled employee can use these to download confidential
data or upload harmful virus
Devicelock software
DeviceLock provides network administrators the
ability to set and enforce contextual policies for how,
when, where to, and by whom data can or can’t be
moved to or from company laptops or desktop PCs via
devices like phones, digital cameras, USB sticks,
CD/DVD-R, tablets, printers or MP3 players.
In addition, policies can be set and enforced for copy
operations via the Windows Clipboard, as well as
screenshot operations on the endpoint computer.
Stealth storage devices
3. Threats through lost and stolen devices
4. Protecting data on lost devices
Encrypting sensitive data
Encrypting entire file system
Encrypting servers: third party solutions
Create a database action to delete the entire data on
the user’s device
5. Educating the Laptop users
No free downloads
Illegal music files and movies
86% employees do this
3.10 Organizational measures for handling mobile
devices- related security issues
In this section, we discuss what organizations can do
toward safeguarding their information systems in the
mobile computing paradigm.
Encrypting organizational databases.
Including mobile devices in security strategy.
3.11 Organizational Security Policies
And Measures In Mobile Computing
3.11.1. Importance Of Security Policies Relating To
Mobile Computing Devices.
3.11.2. Operating Guidelines For Implementing Mobile
Devices Security Policies.
3.11.3. Organizational Policies For The Use Of Mobile
Hand – Held Devices