Securing Cell Phones
Securing Cell Phones
• Poll results that highlight concerns related to mobile security and trending regarding
personal device security practices
Data/information theft,
ransomware, loss of data 55.4%
Providing a gateway into my
other devices or network 9.7%
Cyberattacks have dominated the news lately, like the attack on Colonial Pipeline in April
2021,1 JBS’s US beef plants disruption in May 2021,2 and the posting of over 700 million
LinkedIn users’ personal details on the dark web that stemmed from a data breach in
April 2021.3 Less publicized are some of the mobile malware variants, such as the Pegasus
spyware that is once again making news after being discovered on the iOS devices of
prominent officials,4 such as the Flubot malware variant that targeted Android users in
Spain.5 Both have a seemingly simple attack vector: persuading users to click on links via
specially crafted, enticing language via SMS/iMessage or another messaging platform.
Attackers also increasingly use the mechanism of “overlay” applications. Designed to look
like legitimate applications, these overlays contain trojans developed to steal user data
to send to malicious third parties. Contrary to popular belief, mobile malware less often
relies on zero-day vulnerabilities, but more commonly leverages known, reported security
loopholes, hoping to target unpatched systems or applications, to infiltrate and wreak
havoc on mobile devices.
Wherein lies the responsibility for securing mobile devices. Are there existing or
recommended ways to help increase the security posture on mobile devices?
Fortunately, mobile device security occurs at many layers. Security often starts with the
hardware and software manufacturer, but vendors, application developers, and ultimately
end users also play substantial roles when it comes to security.
1
“ Hackers Breached Colonial Pipeline Using Compromised Password,”
www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
2
“JBS Paid $11 Million to Resolve Ransomware Attack,”
www.wsj.com/articles/jbs-paid-11-million-to-resolve-ransomware-attack-11623280781
3
“ Massive data leak exposes 700 million LinkedIn users’ information,”
https://fortune.com/2021/06/30/linkedin-data-theft-700-million-users-personal-information-cybersecurity/
4
“ Private Israeli spyware used to hack cellphones of journalists, activists worldwide,”
www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/
5
“ Analysis of the FluBot malware variant (locally named Voicemail),”
www.infigo.hr/en/analysis-of-the-flubot-malware-variant-locally-named-voicemail-n90
6
“ Combating Insider Threats with People, Processes, and AI-Based Technology,” July 2021,
www.sans.org/white-papers/40410/ [Registration required.]
Usually occurring in tandem, the operating system will also undergo improvements to
then leverage the changes to the existing hardware. Depending on your manufacturer, you
may get notified immediately upon the availability of a new operating update for your
device. For apple users who have selected to download and install automatic updates
from Settings > General > Software Updates (as shown in Figure 2), the process occurs
seamlessly. Generally, the update process occurs as the device charges or when connected
to a wireless network. If you are an Android user, you manage this configuration in the
Application Store
Another line of defense that helps to strengthen the security of mobile devices is the
method in which they receive and install third-party applications. By default, Apple
directs users to the only trusted repository, Apple’s App Store, when they want to install
new applications on their devices. Similarly, by default Android devices can install
applications from trusted sources only, such as Google’s Play Store. However, users
can adjust this setting by ticking the box to “Allow installation of apps from unknown
sources” from the Settings > Security menu.
One benefit of choosing to install applications from the official stores only is the
vetting of not only the application but also the application developer. Apple and Google
continuously monitor all applications in their stores, performing a combination of both
static and dynamic analysis against the applications to ensure that they adhere to their
policies. The vendors immediately remove applications that violate policies from their
stores and often revoke developer licenses.
This application review extends to the devices themselves. For example, Google
Play Protect, if enabled, can monitor your current device for applications that
violate current policies, request undesirable or unnecessary permissions, or
hide/misrepresent important information. The device receives notifications if an
application appears to exhibit unwanted or suspicious behavior, so that we can
disable/remove the offending application.
known to hit both app stores before being identified and subsequently You want to ensure that you have automatic updates
removed. However, using an app store remains safer than installing turned on for your device, in case the vendor pulls
down or makes changes to any suspicious apps that
applications from outside the official stores.
made their way into the store.
Apple users adjust these settings in Settings > App Store (see Figure 6).
Android users manage this by opening the Google Play Store app, tapping their profile
icon, choosing Settings > Network Preferences > Auto-update apps, and then choosing
from one of the three available options shown in Figure 7 on the next page.
Application development represents another area where good practices can exponentially
affect the overall security posture of the mobile device. This can relate to the application
itself—for example, an application that provides end-to-end communications such as
Telegram or Wickr—and it can also be used to ensure the security of the user-related data
associated with the application.
Secure application development is still gaining traction Using the best methods for authentication
in the mobile application space, but developer feedback
Avoiding outdated or undocumented third-party libraries
often consists of hurdles in overcoming tight deadlines,
unpredictable security release blockers, and constantly Use of encryption
evolving mobile operating systems.
Avoidance of insecure areas for data retention
Many great resources, including a free checklist from
OWASP,7 will get you started down the right path. As a Proper use of certificates
developer, pay close attention to some common areas that
Session handling
highlight application security in the development phase.
They include the highlights in Figure 8, with some also Input validation
highlighted in the OWASP Top 10 Mobile Vulnerabilities.8
Figure 8. Application Security
When it comes to secure coding, we have many areas of concern. Fortunately, a number Highlights
of vendor-supported frameworks, trainings, and certifications assist in making developers
more proficient in this process.
7
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide/migrated_content
8
https://owasp.org/www-project-mobile-top-10/
• OWASP: https://owasp.org/www-project-mobile-top-10/
• Android: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Android+
• Apple: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=iOS
TAKEAWAY
Knowledge of the lowest hanging fruit for attackers will prevent
developers from utilizing some of these weaknesses in their own code. Application developers must be aware of the latest
exploits targeted by attackers.
This can often be validated by employing either internal or external
penetration testing on the applications. This process should occur any
time a major feature release is made available. Penetration testing represents a great
way to vet applications before their release, but in some situations bugs or security
vulnerabilities still make their way into the finished code. Immediately upon identification
of such, the developer should make a patch available. While the vendor can make the
patch available in the application store as soon as it’s ready, the onus is now on users to
ensure that their devices are set to receive application updates automatically or, at the
very least, that they periodically monitor their apps for new releases. Users can configure
this setting (see Figures 5 and 6).
MDM software has become more available in the past few years, and some options meet
company-owned or BYOD models. Having a way to prevent users from circumventing or
disabling manufacturer or vendor settings is important, because we know that many users
may knowingly or unwittingly diverge from the recommended settings on their own devices.
Along the same lines as MDM, some corporations may want to baseline their devices to
get an idea of what application or configurations have changed from one point to the next.
This can prove helpful in identifying a compromise or providing more stringent controls to
devices in the future. Several companies specialize in baselining application code changes
or device features to help identify potentially malicious activity on a device.
Users
The final line of defense for many devices is us—the end users.
Is your device set to auto-update?
Although developers put many protections in place to help
2.8%
keep us secure, if we relax or adjust those settings, we may es—both firmware and
Y
applications when a
open up our devices to vulnerabilities. For instance, we want to new version is available
15.4% Sort of—firmware only
keep the software updated, and we can set both applications
ort of—applications
S
and firmware to update automatically. As shown in Figure 9, only
9.7%
some users choose to automatically update one or the other, o—neither firmware
N
68.6% nor applications are set
but some of those polled still remain unaware of their devices’ 3.4%
to auto update when
available
configurations. I don’t know—not sure
where to find this
You also want to ensure that your device is new enough to setting
devices likely run—or, at the very least, can run—the 5–10 years 2.9%
I still have my original
most current operating systems. flip phone 0.0%
0% 20% 40% 60% 80%
You can also increase the overall security of your
Figure 10. Device Age
device by enabling a device passcode. Many different
passcode types exist, but not all are created equal. If you
have no password at all, make sure to set one up today.
Is your device protected with a lock code?
While swipe patterns and four-digit pin codes may be (If using biometrics face/finger – select your backup code.)
easy to remember, they aren’t the most secure passwords
1.2%
because they are easier to attack. Biometrics represent a -digit PIN—I’m old
4
school
better option, but you want to ensure that when prompted
Swipe—I like to draw
(and you will be) to set up a backup passcode that you
22.4% 26.4% -digit PIN—it’s easy to
6
choose an alphanumeric passcode—which is more difficult remember my birthday
to brute force—as the backup method. Although it seems
3.5% Alphabetic password
unfathomable to most of us to forgo a device lock, some 5.2% Alphanumeric password
users still leave their devices completely open (as shown in 41.3%
one—the stuff on my
N
Figure 11). phone isn’t important
to anyone but me
You might not know the terms rooting or jailbreaking. That’s
okay, because device manufacturers don’t want you to do Figure 11. Device Locks
them anyway. In fact, if you jailbreak an Apple device, you
automatically void the warranty. Although still technically
acceptable to root an Android device, doing so now
Do you jailbreak or root your current device?
often requires unlocking the device’s bootloader,
which in turn may void a manufacturer warranty. This Yes 4.0%
means that manufacturers know doing this entails No 84.6%
risk, and they want your device to be as protected as Not sure—I am unfamiliar
with that terminology 11.4%
possible. If you believe that you can get more out of
0% 20% 40% 60% 80% 100%
your device by rooting or jailbreaking, you need to
Figure 12. Rooting and Jailbreaking
pay even more attention to other risky behaviors you engage
in on your devices. Fortunately, as indicated by survey results
in Figure 12, the majority of users do not root or jailbreak
their devices. TAKEAWAY
Keeping your device current is one way to make it
more secure.
Conclusion
It takes a village to properly protect a mobile device, and everyone must work together
to ensure the protection of these devices. We have many lines of defense available, and
an abundance of additional software and resources enable us to further strengthen
our various devices’ security postures. Ultimately, end users should remember best
practices they learned on other digital platforms and continue to practice good habits
when accessing, storing, and utilizing sensitive information on mobile devices. Even
though the old adage “If it’s not broke, don’t fix it” may be a part of your new post-
COVID-19 mantra, this proverb doesn’t always apply to mobile devices. Keep your
devices current and updated and adhere to the security settings already in place to
make for a safer overall experience.
SANS Certified Instructor Domenica Lee Crognale is a co-author and certified instructor
of SANS FOR585: Advanced Smartphone Forensics. She has 15 years of experience in
cybersecurity, with a focus on digital forensics and mobile device security. Lee developed
a love for mobile device forensics while working in both the law enforcement and
intel communities, where she was fortunate to work on many high-profile cases. She
has provided specialized training to military special forces, the US Coast Guard, and
other government agencies, and has tested and validated various forensics utilities,
researched artifacts associated with mobile operating systems and numerous third-
party apps, and provided security assessments for many mobile applications.
Sponsors