🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 2 - 06 - Understand Wireless Network-specific Attacks - 05_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Copyright © by EC-C iL All Rights Reserved. Reproduction is Strictly Prohibited Mobile Device-specific Attacks This section discusses security issues arising from app stores, app sandboxing issues, mobile spam, mobile a...

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Copyright © by EC-C iL All Rights Reserved. Reproduction is Strictly Prohibited Mobile Device-specific Attacks This section discusses security issues arising from app stores, app sandboxing issues, mobile spam, mobile attacks, Android rooting and iOS jailbreaking. Module 02 Page 342 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks 20N © CQ) L ! E Exam 212-82 Security Issues Arising from App Stores 1 Insufficient or no vetting of apps leads to malicious and fake apps entering the app marketplace 2 App stores are common target for attackers to distribute malware and malicious apps T — Mobile App Official App Store S A gresessens > H No Vetting @ 4 m i il besseery and x“” Sto; % : Mobile........ Call logs/photo/videos/sensitive docs Copyright © by EC-{ L All Rights Reserved, Reproduction is Strictly Prohibited \ Security Issues Arising from App Stores Mobile applications are computer programs designed to run on smartphones, tablets, and other mobile devices. Such applications include text messaging, email, playing videos and music, voice recording, games, banking, shopping, and so on. In general, apps are made available via application distribution platforms, which could be official app stores operated by the owners of mobile OS, such as Apple’s App Store, Google Play app store, and Microsoft App Store, or third-party app stores such as Amazon Appstore, Getlar, and APKMirror. App stores are common targets for attackers who seek to distribute malware and malicious apps. Attackers may download a legitimate app, repackage it with malware, and upload it to a third-party app store, from which users download it, considering it to be genuine. Malicious apps installed on user systems can damage other applications or stored data and send sensitive data such as call logs, photos, videos, sensitive docs, and so on to the attacker without the users’ knowledge. Attackers may use the information gathered to exploit the devices and launch further attacks. Attackers can also perform social engineering, which forces users to download and run apps outside the official app stores. Insufficient or no vetting of apps usually leads to the entry of malicious and fake apps in the marketplace. Malicious apps can damage other applications and data and send users’ sensitive data to attackers. Module 02 Page 343 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Official e, _mamm, ii App Store :-......-> :........) Attacker ——- > eossscecse > A A oo m— ::R : oe MobiloApp Mobile App R s «cccce. s > 1 ([ S H Noveting No Vetting : » iil m t" ‘." : moW l_l....... s R WWA W :- ' Mobile Mobile >“User :éThird-Party Third-Party s > i APStore BT : : App Store - ; Malicious app sends sensitive data to attacker Call logs/photo/videos/sensitive docs Figure 2.64: Security Issues Arising from App Stores Module 02 Page 344 Certified Cybersecurity Technician Copyright © by EG-Council EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks Exam 212-82 App Sandboxing Issues ° 0O Sandboxing helps protect systems and users by limiting the resources the app can access to the mobile platform; however, malicious applications may exploit vulnerabilities and bypass the sandbox Secure Sandbox Environment Other User Data == = s =. User Data Other system | A/ R —— g D U";’::::’" o a B X AN Other _- User Data N No Access Vulnerable Sandbox Environment o i System Resources e. App — == “ i thesandbox Other system | AN R S e. N User Data p a Unrestricted B8 Access = O X % Y. OO B BT0 App Ll System Resources App Sandboxing Issues Smartphones are increasingly attracting the attention of cyber criminals. Mobile app developers must understand the threat to the security and privacy of mobile devices by running a non-sandboxed app, and they should develop sandboxed apps accordingly. App sandboxing is a security mechanism that helps protect systems and users by limiting the resources that an app can access to its intended functionality on the mobile platform. Often, sandboxing is useful in executing untested code or untrusted programs from unverified or untrusted third parties, suppliers, users, and websites. This enhances security by isolating the app to prevent intruders, system resources, malware such as Trojans and viruses, and other apps from interacting with it. As sandboxing isolates applications from one another, it protects them from tampering with each other; however, malicious applications may exploit vulnerabilities and bypass the sandbox. A secure sandbox environment provides an application with limited privileges intended for its functionality to restrict it from accessing other users’ data and system resources, whereas a vulnerable sandbox environment allows a malicious application to exploit vulnerabilities in the sandbox and breach its perimeter, resulting in the exploitation of other data and system resources. Module 02 Page 345 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Secure Sandbox Environment User Data == 1 —-— = ¥= e No No Access Access S X0wmoZ2>r»wn Other Other A N D B (o) Other sv“em Resources -a — x R — — Vulnerable Sandbox Environment A o Other o ‘ f— (=] l == User Data s. = e “ A N D Bypass Bypass the Sandbox 0 User Data i Unrestricted Ve Access ! P Access w System Resources Other j System /\/ M SVS‘BIH Resources Semm=® B B O User Data Unrestricted Access w x System Resources Figure 2.65: App Sandboxing issues Module 02 Page 346 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks To: [email protected] o ekt o Dear Walmart shopper, Congratulations you have won a $2000 Walmart Gift Card. Exam 212-82 Mobile Spam Click here to claim your gift. www.WmarkClick.com/price.html &,@ P Tha 141 o perrs permrs emad semad Sox Plasss Pesse 0 not nat regly 15 Bea. Bia. Cafl 00ur fone phone Tunkeg 1 wmitacre, wnstacr e,

Use Quizgecko on...
Browser
Browser