Threat, Vulnerabilities and Mitigations: Mobile Device Vulnerabilities Flashcards

1
Q

What threats do mobile devices face?

A

Mobile devices–phones, laptops, pads, eReaders–anything you can “take with you” and that has internet connectivity can be a point of weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are patches so important?

A

Android and iOS are constantly being patched and updated due to security issues.

Malware proliferation is huge: check out the Malware Zoo at https://github.com/ytisf/theZoo/tree/master/malware/Binaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the considerations of the bluetooth attack surfaces?

A

Bluetooth is an attack surface. Attacks include:

Bluejacking

Bluesnarfing

Bluebugging

Blueborne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What other wireless methods you have to consider as an attacking point?

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the telco consideration in terms of attacks?

A

Telco: cellular signal uses SS7, short for Common Channel Signaling System No.7, is outdated but still in use to provide interoperability between providers and provide services:

SMS

Billing

Call waiting/forwarding

Attacker can tap into this network using a laptop and the SS7 SDK at https://github.com/openss7/openss7, and then eavesdrop on conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Side-loading, rooting and Jailbreaking?

A

Side-loading, rooting, and jailbreaking:

Installing software from web.

App stores and apps might contain this malware, and even official app stores have been infiltrated. Check out https://f-droid.org/en/.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What other weaknesses you can consider?

A

Weak or no encryption.

Open Web Application Security Project (OWASP) has a Top 10 Mobile Risks list: https://owasp.org/www-project-mobile-top-10/.

Sandbox bypass/escape

SIM Hijacking – can be cloned

Mobile spam, including SMS phishing (SMShing) and voicemail phishing (Vishing).

NSO Group calls out Pegasus and Darknet Diaries.

Theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly