Mobile enterprise management tools are targeted by spyphones, researchers warn

iOS devices are targeted the most, they said

Enterprises that use mobile device management (MDM) systems to protect their corporate data on employees' mobile phones are not safe from attacks from spyphones, researchers warned at BlackHat Europe on Thursday.

Over the next five years, 65 percent of enterprises will adopt a mobile device management (MDM) system for corporate users, technology research company Gartner predicted last October. Companies will use the systems to manage network traffic and corporate data on smartphones and tablets, which nowadays are often owned by employees and used for both private and corporate tasks.

Companies are using MDM systems to protect their data, but they must be aware that while the systems are useful, they don't provide full security and can be targeted by so-called spyphones, warned Daniel Brodie, senior security researcher at the Israeli security company Lacoon Security, and Michael Shaulov, CEO and co-founder of the company, at the BlackHat conference in Amsterdam.

MDM systems try to tackle security issues by providing a "secure container" on mobile devices, encrypting the part of the mobile device that handles business data, as well as offering the possibility to remotely wipe or lock that section if a phone is stolen or an employee quits. However, common MDM security offerings can be circumvented by planting surveillance tools without the users knowledge on a phone, turning it into a spyphone, Brodie told a crowd of conference attendees.

A survey conducted by Lacoon in cooperation with global cellular network providers showed that about one in 1,000 phones was a spyphone, according to Brodie's research paper. Of 175 compromised devices found, 52 percent was attributed to Apple's iOS, 35 percent to Android phones, 7 percent to Nokia phones and 6 percent to other devices, he said.

"This is a very alarming number," Brodie said. The problem with spyphones is that while the software is installed on a single device, it is used to target whole organizations for espionage purposes, Brodie said. And as such, the impact of a spyphone attack on an organization can be "extremely high," he added.

Most spyphones are used for recording confidential phone calls and board meetings, tracking locations, extracting call logs as well as text messages and voice memos, and snooping on corporate emails and application data, Brodie said.

Secure containers of MDM systems can be bypassed in order to install spyphone software. On Android devices this can be done by publishing a seemingly innocent application in an Android market. Once the victim has installed the app, the app refers to the malicious code, which is then downloaded, the researchers said. After this, the spyphone creates a hidden binary and uses it for privileged operations, such as reading mobile logs.

iOS devices are much harder to crack but are probably more appealing to spyphone makers since a lot of companies are standardizing on iOS, Brodie said. An attacker has to install a signed application on the targeted device using an enterprise- developer certificate. The attacker then uses a jailbreak exploit -- removing limitations and protections to gain root access to iOS -- to inject container-bypass code into the secure container. After that, the attacker removes every source of the jailbreak.

"If you're looking at the phone you're not going to see if it's jailbroken," said Brodie, adding that he and Shalouv had several times tried to jailbreak an iPhone that was already jailbroken. They simply did not notice it already was, they said.

Once the jailbreak is removed, the spyphone places hooks in the secure container using Objective-C hooking mechanisms. The spyphone is than alerted when an email is read, is able to pull the email and subsequently sends every loaded email to a command and control (C&C) server that is controlled by the attackers, according to Brodie.

While mobile OSes try to protect themselves by protecting the OS from attackers and users, jailbreaking and rooting methods are rendering this security mechanism irrelevant, according to Brodie.

"Infection is inevitable," Brodie said. This however doesn't mean that MDMs are not useful. They are useful for separating personal and business data and also can be very useful when use for remote-wipe operations, the researchers said.

Companies need to be aware though that MDMs cannot provide absolute security, the researchers said. The security industry therefore should try to find a way to solve this problem, they added. Solutions could for instance look at different network parameters and abnormal behavior to signify an infected device. Those parameters for example could consist of behavioral analysis to signify strange behavior, traffic to well known C&C servers, and data intrusion detection, they said.

Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to loek_essers@idg.com

Join the PC World newsletter!

Error: Please check your email address.

Tags securitymobileLacoon SecurityBLACK HAT EUROPE

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Loek Essers

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?