mobile sec 2b Flashcards
STAGEFRIGHT
major vulnerability in
Android
STAGEFRIGHT What ability or privileges does this
vulnerability provide the attacker?
•It is estimated that 50% of the affected devices
would be able to trigger the vulnerability
without any user interaction!
•For other cases, simply opening the MMS will
compromise the device!
STAGEFRIGHT What ability or privileges does this
vulnerability provide the attacker 2?
•During successful attacks, the attacker is able to run
arbitrary code on the target device with media or
system privileges the audio and camera of the device.
•Using these privileges, an attacker can perform
reconnaissance on their victim by listening in on
conversations, and enabling video recording!
STAGEFRIGHT What ability or privileges does this
vulnerability provide the attacker 3?
• On some devices, the affected software runs with “system” privileges.
• the attacker has almost full control of the device already.
• Remote code execution allows sophisticated attackers to execute
“privilege escalation” attacks, which allow the attacker to
• change “roles” on the device – providing unfettered control:
• access to read the victim’s emails,
• facebook/ whatsapp messages and
• contacts,
• access data from other applications or
• use the device as a pivot into the customers network and cloud applications
STAGEFRIGHT What ability or privileges does this
vulnerability provide the attacker 4?
The attacker can hide traces of the attack by simply deleting the
infected message after a successful attack.
• If an attacker spends additional time refining the attack, it can be
made silent.
How to protect from Stagefright
•Update your device:
•Keep your device updated to the latest version
at all times.
•Disable Auto-fetching of MMS:
•You will need to disable this for both Hangout
and regular messaging apps. Here’s how:
How to protect from Stagefright
• HANGOUT: DISABLE AUTO FETCHING MMS
• Open Hangout
• Tap Options on the top left corner
• Tap Settings -> SMS
• In General, If you have Hangout SMS Enabled then in
the Advanced uncheck Auto Retrieve MMS
• MESSAGES: DISABLE AUTO FETCHING MMS Open Messages
• Tap More -> Settings -> More Settings
• Tap Multimedia Messages -> Turn OFF Auto Retrieve.
How to protect from Stagefright
•Advanced Protection
• Zimperium’s advanced mobile threat protection solution – zIPS, is
already trained by their core engine z9, to detect and protect from
Stagefright.
• Devices with zIPS activated are fully protected without the need for
device update or disabling the MMS.
Quadrooter (7 AUG 2016)
• Check Point today disclosed 4 vulnerabilities affecting
900 million Android smartphones and tablets that use
Qualcomm® chipsets.
• The Check Point mobile threat research team, which
calls the set of vulnerabilities QuadRooter, presented
its findings in a session at DEF CON 24 in Las Vegas
Qualcomm is the world’s leading
g designer of LTE
chipsets with a 65% share of the LTE modem
baseband market.
•If any one of the 4 vulnerabilities is exploited, an
attacker can trigger privilege escalations for the
purpose of gaining root access to a device
Quadrooter – Which Device affected
•QuadRooter vulnerabilities are found in software
drivers that ship with Qualcomm chipsets.
• Any Android device built using these chipsets is at risk.
• These software drivers, which control communication
between chipset components, become incorporated
into Android builds manufacturers develop for their
devices.
Quadrooter – Which Device affected 2
• Since the vulnerable drivers are pre-installed on
devices at the point of manufacture, they can only be
fixed by installing a patch from the distributor or
carrier.
•Distributors and carriers issuing patches can only do
so after receiving fixed driver packs from Qualcomm.
Quadrooter – Which Device affected 3
• This situation highlights the inherent risks in the
Android security model.
• Critical security updates must pass through the entire
supply chain before they can be made available to end
users.
•Once available, the end users must then be sure to
install these updates to protect their devices and data.
Quadrooter - How are hp exposed to it?
An attacker can exploit these vulnerabilities using a
malicious app.
• Such an app would require no special permissions to
take advantage of these vulnerabilities, alleviating any
suspicion users may have when installing.
How can I protect employee’s devices from attacks using these Quadrooter
vulnerabilities?
Without an advanced mobile threat detection and mitigation solution
on the Android device, there is little chance a user would suspect any
malicious behavior has taken place.
• What are the risks if an attacker exploits the quadrooter vulnerability on a
device?
If exploited, QuadRooter vulnerabilities can give
• attackers complete control of devices and
• unrestricted access to sensitive personal and enterprise data on them.
• Attacker with capabilities such as keylogging, GPS tracking, and recording
video and audio.