Robert Morris University Mobile Forensics Celebrity Stalking Case Lab 2 Report

For this weeks lab, you will need to access the software through VM. Once you are in VM, go to the Start Menu, find Paraben and the click Device Seizure. Please note that some of the information in the videos deals with actual working with physical devices. Since this is an online class, you will be working only with images of devices. With that being said, you will need to download the image of the Palm Treo from Blackboard or download from Passouts

Paullet-Mobile, to your desktop. The image must ALWAYS be copied to the desktop in order to open it in the software. Once the image is on the desktop you can Click the image and it will open in Device Seizure or you can import the file by opening the software then clicking open case. Once the image is in the software you will need to click SORT from the top task bar. If you do not Sort the data you will not be able to analyze the image. For this weeks case you are only responsible for finding the answers to the questions being asked. You will need to explore the software to find the answers. Mobile forensics is very different than computer forensics. There is not a one size fits all for all phones.  The software that you are using currently supports over 26,000 devices. With each device you will see differences. In many ways  this is much different than computer forensics. Throughout the next few weeks you will see the file structures change from phone to phone. Please use the first couple of labs to become familiar with the tool. In addition to answering the questions in detail, you need to write a 1-page report.

Note:  The required Paraben Device Seizure case file is attached to this assignment.  The case file name is “Palm Treo Case File.ds”

  • Any assignments submitted after that time will receive a 10% penalty per day and after three days the assignment will not be accepted.
  • Assignment Rubric ( 100 Points)Forensics analysis and written report80Writing Standards – APA format20-

    https://youtu.be/VwtLHBbMj-s

    GSMA Intelligence
    January 2015
    From feature phones to smartphones, the
    road ahead
    The increasing number of smartphone models priced under the $100 mark is the main driver of
    consumer migration from basic and feature phones to smartphones. GSMA Intelligence
    research shows that by 2020, around two thirds of all connections globally (excluding M2M) will
    be smartphones, illustrating the rapid shift away from basic and feature phones, which
    encompassed more than half of global connections in 2014. Data terminals (e.g, dongles,
    tablets, routers) make up the remaining share of connections (at just below 10% in 2014).
    Smartphones began as a developed world phenomenon …
    In many developed markets, smartphone adoption is approaching the 70-80% ‘ceiling’ at which
    growth tends to slow. Across the developed world, basic and feature phones represented only
    around a quarter of all connections in 2014, while only a residual share of the market is
    expected to run on these devices in 2020 as smartphones become ubiquitous.
    While heavy operator subsidies have contributed significantly to this shift in device migration in
    the developed region, the availability of smartphones at the same price as basic and feature
    phones shows that the latter device category is rapidly becoming obsolete.
    A study of Best Buy’s portfolio of ‘unlocked’ handsets in the US shows that the vast majority
    (84%) of mobile phones offered in the country are smartphones (most of them running on
    Android), with a number of them priced at the same level as that of the remaining basic and
    feature phones – less than $100 (Average Selling Price, before discounts and subsidies). Around
    half of smartphones on offer are priced below $200, while 29 smartphones are priced between
    $47 and $80. Devices that form the portfolio of basic and feature phones on offer still hold a
    slight pricing advantage, but this may not be the case for long.
    Figure 1: Best Buy USA, online portfolio of ‘unlocked’ handsets, December 2014
    Source: GSMA Intelligence
    … but the focus is shifting to developing economies
    In 2010, the global smartphone connections market was equally distributed between the
    developed and developing regions. However, almost seven in every ten smartphone
    connections were located in the developing world in 2014. We expect that the rate of
    smartphone adoption will continue to increase over the coming years, driving the region to
    encompass four in every five smartphone connections globally by 2020. The wider availability of
    more affordable smartphones is an important factor behind this trend, however we expect that
    the transition away from basic and feature phones in the region will take longer as the
    availability of low-cost smartphones (below the $50 price point) is still limited.
    As of 2014, less than a third of all connections in the developing region are smartphones,
    showing the large prevalence of basic and feature phones currently. By 2020, we expect that
    only around 30% of connections in the region will still be running on basic and feature phones.
    Figure 2: % of regional total connections (excluding M2M)
    Source: GSMA Intelligence
    Our research shows that, while smartphone prices have declined since 2008 – by 30% in Asia,
    25% in Latin America and 20% in Africa – the majority of smartphones in the developing world
    are priced above the $100 mark, whereas the ‘sweet spot’ for these regions is considered to be
    in the $25-$50 range.
    Mozilla is one of the pioneers of low-cost smartphones, announcing a $25 smartphone design
    at Mobile World Congress in 2014. The company’s COO, Li Gong, explained that Mozilla’s
    success in driving down the cost of smartphones using its Firefox OS was down to optimising
    its software for lower-cost hardware.
    Gong noted that “sometimes the margin on the low-cost phones could be actually bigger than
    higher cost hardware because it’s a question of what OS you put on and what optimisation you
    can get from the OS. We heard lots of demand for lower prices — below $50, below $40
    phones. And we hear loud and clear that the market for that sort of segment, where you convert
    feature phone users to smartphone users, [is] a huge market for us”.
    Last year, a number of smartphones priced between $25-$50 were introduced across the
    developing region, with new models from several handset manufacturers. These launches only
    mark the start of a price expansion trend towards low-cost levels that will spread to more
    developing economies, contributing to the adoption of smartphones in the region – but this will
    not happen overnight.
    Last May, Ooredoo Group explained that in the markets it operates in, “not everyone has got a
    smartphone. In fact, the majority have got feature phones or 2G phones […] certainly in the
    developing market in Iraq and Indonesia and Algeria. The smartphone revolution is happening
    but it is not there yet.”
    GSMA Intelligence is run by GSMA Limited, a wholly owned subsidiary of GSMA
    © 2015 GSMA Intelligence. GSMA, The Walbrook Building, 25 Walbrook, London EC4N 8AF
    Lab #2
    CELEBRITY STALKING CASE
    Case Brief: The owner of a Palm Treo 650 Smart Phone was arrested for stalking outside of a
    well-known celebrity’s home on the morning of May 14, 2009.
    Investigators must determine if the phone contains evidence pertaining to the stalking of
    ______?
    Case Questions
    1. What is the owner’s name and address?
    2. When was the device last “synched?”
    3. Whose work phone number is 911?
    4. What is the owner picking up before the BBQ at the beach?
    5. Is there Internet history being stored on the device? If so, what sites were visited?
    6. What is the Username associated with the device?
    7. What is the phone number for voice mail?
    8. When is “Baywatch Trivia Night?”
    9. With what celebrity is the owner of the device obsessed?
    10. Are there pictures of this celebrity on the device? If so, how many?
    11. Write a 1-page report answering the below questions
    a) Describe, in detail, three (3) functions used in Device Seizure to find the information
    on the celebrity stalking case.
    b) What is the importance of each function in conducting a forensics analysis on a mobile
    device?
    What is a SIM card?
    A SIM card, also known as a subscriber identity module, is a subscriber identity
    module application on a smartcard that stores data for GSM/CDMA Cellular telephone
    subscribers. Such data includes user identity, network authorization data, personal
    security keys, contact lists and stored text messages.
    Security features include Authentication and encryption to protect data and prevent
    eavesdropping.
    The smartcard with Subscriber identity module application is generally known as
    SIMCARD. But, In reality, the SIM is effectively a mass-market smartcard.
    When the SIM is viewed as a smartcard, it opens up security possibilities that
    resonate far beyond the mobile world.
    By combining stored evidence of identity (such as a key) with personal information only
    the user will know (a password, for example), it offers the same two-tier authorisation
    provided by smartcards.
    It is becoming clear that the SIM — a feature unique to the mobile world — has
    applications far beyond those for which it was originally designed. The clue is in the
    name — Subscriber Identity Module. It was created to remotely authenticate users to the
    network and to the billing systems that allow operators to generate revenues from voice
    traffic.
    The GSM standards as specified by ETSI requires authentication of a mobile subscriber
    through a secure device (the SIM card).
    Functionality of the SIM card?
    The SIM card performs the following valuable functions:
    1) Identification of a subscriber: The IMSI programmed on the SIM card, is the
    identity of a subscriber. Each IMSI is mapped to a mobile number and
    provisioned on the HLR to allow a subscriber to be identified.
    2) Authentication of a subscriber: This is a process, where, using the
    authentication algorithm (COMP128V3 for 2/2.5 G GSM, CAVE for CDMA and
    Milenage for 3G) on the SIM card, a unique response is provided by each
    subscriber based on IMSI, Ki (stored on SIM) and RAND (provided by network).
    By matching this response with values computed on the network a legal
    subscriber is logged on to the network and he or she can now make use the
    services of the mobile service provider.
    3) Storage: To store phone numbers and SMS.
    4) Applications: The SIM Tool Kit or GSM 11.14 standard allows creating
    applications on the SIM to provide basic information on demand and other
    applications for m-commerce, chatting, cell broadcast, phonebook backup,
    location based services etc.
    Subscriber information, such as the IMSI (International Mobile Subscriber Identity), is
    stored in the Subscriber Identity Module (SIM).
    The Subscriber Identity Module (SIM) can be used to store user-defined information
    such as phonebook entries.
    One of the advantages of the GSM architecture is that the SIM may be moved from one
    Mobile Station to another. This makes upgrades very simple for the GSM telephone
    user.
    Why is the SIM card secure?
    SIM card in reality is a mass market smartcard with a subscriber identity module
    application. SIM Cloning can not be confused with smartcard cloning. It is not possible
    to clone the smartcard and only data can be read when application allows the reading of
    the data.(SIM Cloning is covered below)
    Smartcard is very secure and provides
    i)
    ii)
    iii)
    the secure loading of the applications
    Secure data storage for the application data and application cryptographic
    keys
    Secure Crypto operation support.
    However, Application security depends on the application design and smartcard only
    provides a secure platform for developing secure applications. The security of smart
    card is similar to the security offered by HSM(Hardware security module).
    Security of Subscriber Identity Module(SIM application)
    The Presence of Cryptographic algorithm and secret key in SIM card makes the
    SIM card secure.
    The most sensitive information of SIM card is the cryptographic algorithm A3, A8, secret
    Ki, PIN, PUK and Kc. A3, A8 algorithm were written into the SIM card in the producing
    process, and most people could not read A3, A8 algorithm. HN code could be settled by
    the phone owners. PUK code is held by the operator. Kc was derived in the process of
    encryption from Ki.
    The other factors which make the SIM secure are….
    PIN and PUK:
    PIN –Personal Identification Number
    2 PINs exist (PIN 1 and PIN2)
    Limited attempts on PIN access
    PUK –PIN Unblocking Code
    Resetting PUK, resets PIN and the attempt counter
    Too many attempts on PUK blocks use permanently
    Two ways of Storing Data in SIM
    1. As GSM Files
    The data used for Telco and GSM operation are all stored over the files.
    Telco/operator can change the Data this file through RFM in a secure channel.
    Only upon successful verification of file access condition a file can be read.
    All files are protected by access conditions.
    2. As application data within an STK application as instance data.
    mChek stores all its secured encrypted information within application data. All the
    information stored is in persistent objects. Only mChek Server can access these
    data through mChek OTA platform.
    Further, data on the SIM is protected by Administrative keys which are in hexadecimal
    and it is proven, that to compromise the security of a SIM one requires physical access
    to the SIM, enormous supercomputing ability and lots of time to crack one single card.
    Till date there are no instances of COMP128V3 (GSM), CAVE (CDMA) or Milenage (3G)
    being compromised.
    The few reported cases in the media are of COMP128V1, which is phased out and it is
    acknowledged that this version has been hacked and with physical access it is possible
    to clone these cards.
    The applications on the SIM(for GSMA)/RUIM(for CDMA) cards are protected by the
    same set of administrative keys and are hence subject the same levels of security.
    In addition, the messages transmitted from the SIM can be encrypted with DES/TDES
    which are well accepted in banking industry as a secure encryption standard.
    Additional security can be enforced by implementing more complex algorithms and
    digital certificates (issued by CA).
    M-banking applications have been implemented across the world from Latin America to
    Europe to Asia.
    What are the current SIM card capabilities in the Market Place ?
    From the Year 2003, the SIM cards which were provided in the Market Place were Java
    2.0, however, because there was no need of porting the application and due to
    commercial implications this was discontinued for about 2 years and has again started to
    be issued.
    However, the market would have about 50% of the cards OTAC enabled
    (Source: GemAlto).
    Though this is the position in the market place, getting all the SIM cards which are OTAC
    enabled application portable compliant there is a lot of work that needs to be done with
    the customer’s SIM card and each individual SIM vendor.
    Operationally this is absolutely not feasible.
    However, in the past we have seen with the 8K to 32K migration keeping in mind the
    kind of churn rate that we see in the Industry it will take about 3 years for all old SIM
    cards to move to a new Portable SIM card which can house secure banking applications.
    Also Telecom Operators (Bharti Airtel has already started the exercise) can provide new
    secure applications in all new activations and also ensure that they are application
    portable compliant.
    What needs to be done to ensure that the SIM cards in the Market Place can house
    safe banking based applications?
    SIM(smartcard) provides the secure platform for developing a highly secure applications.
    The banking application should be designed with out any security loop holes by utilizing
    the secure storage and secure cryptographic operation provided by smartcard.
    The Cryptographic keys used by the banking application can be loaded in to banking
    application data storage on the smartcard.
    The Global Platform standards can be adopted for the design and development of
    Banking applications.
    The SIM/RUIM is a device which is easy to distribute and cuts across the entire
    subscriber base of a mobile service provider. Secure applications on a SIM/RUIM
    address the entire base of a mobile service provider.
    Conclusion
    1. The current market scenario does not allow the SIM cards available in the market
    place to be ported with applications over the air.
    2. New SIM card seeding would be required for this activity which some Telco’s
    have already started working on.
    3. SIM card is extremely secure as a mode and is ideal for Banking Applications to
    be ported on.
    2016 NowSecure
    Mobile Security Report
    TA B L E O F C O N T E N T S
    I.
    Introduction: Security in a mobile world 2
    II.
    Mobile security requires new methods 4
    III.
    Mobile security snapshot 5
    A. System issues 6
    1. Google Android 6
    2. Apple iOS 7
    B.
    Configuration issues
    C. App issues
    8
    1. Leaky apps and social engineering
    9
    2. A note on app containerization
    9
    D. Network issues
    IV.
    8
    9
    Detailed app vulnerability findings 10
    A. Methodology 10
    Overview of app security weaknesses
    12
    C. Security weaknesses by app category
    14
    B.
    1. Business 14
    2. Finance
    15
    3. Games (aggregated)
    16
    4. Shopping 17
    5. Social
    V.
    1
    © 2016 NowSecure. All rights reserved.
    Conclusion
    18
    19
    I. Introduction: Security in
    a mobile world
    87%
    of time spent using mobile
    devices is spent using apps
    IT and security professionals who manage and secure personal and corporate-owned mobile
    devices for enterprises have a difficult job. People want to use a wide range of different
    devices and mobile apps to access enterprise assets, interact with corporate data, and
    collaborate with their colleagues. Because mobile began as a consumer technology, many
    74%
    devices lack the security and administrative functions that IT and security teams use to
    of organizations allow, or
    manage traditional endpoints such as laptops and desktops.
    plan to allow, employees
    The speed, volume, and variety of devices coming online is incredible. Benedict Evans, an
    analyst at Andreessen Horowitz, summed it up well when he titled a presentation, “Mobile is
    to use their personal
    mobile devices for work
    eating the world.”1
    Consider the following:

    The number of mobile devices on Earth has surpassed the number of people
    living on it2

    In 2015 more Google searches occurred on mobile devices than on computers
    in 10 countries3

    87 percent of time spent using mobile devices is spent using apps4

    An average of 53,309 mobile apps were released on the Apple App Store each
    month in 20155

    Forrester predicted people would download more than 226 billion apps in 20156
    The mobile tidal wave will not subside any time soon, and enterprises need to prepare
    themselves. In 2015, Tech Pro Research reported that 74 percent of organizations allow, or
    plan to allow, employees to use their personal mobile devices for work.7 Employees want to
    use their own devices, and enterprises want to realize the benefits of increased productivity
    that come with the bring-your-own-device (BYOD) approach.
    In discussion around BYOD, an important point is often overlooked. More important than
    who owns the device is how it is used and how it is secured. Enterprise risk is increasing as
    a greater variety of devices running more apps from untrusted sources connect and process
    sensitive data. Tightly controlling all devices and limiting apps to a small whitelist is simply
    not viable for all scenarios.
    Connect with us:
    2
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    A B O UT THIS REPORT
    We present this report, gleaned from our database of mobile security intelligence, to help
    IT and security pros make informed decisions about managing and securing mobile devices,
    mobile apps, and their enterprises’ mobile ecosystem.
    35%
    of communications sent
    by mobile devices are
    unencypted
    Some of our eye-opening statistics regarding mobile insecurity include:

    24.7 percent of mobile apps include at least one high risk security flaw

    The average device connects to 160 unique IP addresses every day

    35 percent of communications sent by mobile devices are unencrypted

    Business apps are three times more likely to leak login credentials than the
    average app

    Games are one-and-a-half times more likely to include a high risk
    vulnerability than the average app
    Enterprise IT and security teams should take data points such as these into consideration as
    they develop and manage their mobile security strategies.
    Connect with us:
    3
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    II. Mobile security requires
    new methods
    The traditional, malwarefocused approach to
    network security does not
    translate to mobile.
    Mobile endpoints differ from traditional endpoints in a number of ways:

    Lack of administrative, or “root,” access

    Complex, drawn-out patching cycles for device updates

    Operating system (OS) access-control that limits the functionality of security
    apps

    Constant connectivity, frequently traversing insecure and untrusted networks

    A broad attack surface spanning devices, apps, and back-end services and
    infrastructure
    The traditional, malware-focused approach to network security does not translate to mobile.
    According to Verizon’s 2015 Data Breach Investigations Report, only “an average of 0.03
    percent of smartphones per week—out of tens of millions of mobile devices on the Verizon
    network—were infected with ‘higher-grade’ malicious code.”8 Focusing on malicious apps
    leaves out too many important aspects of mobile security.
    We founded NowSecure on a different approach to mobile security, which we call the SCAN
    Principle. SCAN stands for System, Configuration, Apps and Network. System vulnerabilities
    include security flaws in mobile operating systems. Configuration vulnerabilities include,
    for example, a device that does not require a passcode for access or is jailbroken. App
    vulnerabilities consist of risky apps prone to man-in-the-middle attacks or apps that store
    sensitive information insecurely or send data unencrypted. Finally, network vulnerabilities
    include insecure Wi-Fi connections that might allow an attacker to intercept traffic from a
    device.
    Connect with us:
    4
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    III. Mobile security snapshot
    400,000
    apps were tested for
    We’ve structured our report to highlight our findings across each domain of NowSecure’s
    vulnerabilities using our
    SCAN Principle for mobile security. Much of the data comes from our proprietary collection
    dynamic analysis system
    of mobile security data, statistics and trends. Our NowSecure Intelligence database gathers
    and correlates more than 140 million data points each day from users of our NowSecure
    Protect app in more than 180 countries. The app performs anonymous, non-invasive
    security assessments of the mobile device on which it’s installed. This trove of data
    highlights device health trends, mobile device security across regions, operating systems in
    use, vulnerability prevalence, and the IP addresses to which devices connect with or without
    permission.9
    In section IV, “Detailed app findings,” we dive deep into an analysis of vulnerabilities in more
    than 400,000 apps available on the Google Play app store. We tested these apps using
    our own dynamic analysis system that performs automated analysis of iOS and Android
    applications at scale.10
    Connect with us:
    5
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    SYSTE M ISSUE S
    1.4 BILLION
    Google Android
    Google leads the development of Android, an open source software stack for mobile
    devices. Last year, Google CEO Sundar Pichai announced that 1.4 billion people now use
    Android.11 Android 6.0 Marshmallow is the most recent version of the platform, following
    people now use Android,
    says Google CEO Sundar
    Pichai
    Android 5.0 Lollipop.
    The following Android statistics give you a sense of just how many people use the OS:
    82%

    8 out of every 10 phones in the world use the Android operating system12

    Android currently has an estimated 1.6 million apps available on Google Play13

    Only 43.8 percent of Android users have adopted Android Lollipop according to
    by the Vulnerability
    NowSecure mobile security intelligence
    Test Suite for Android
    of Android devices tested
    had at least one of 25
    vulnerabilities
    Data collected from users of the NowSecure
    Protect app in January 2016.
    Security issues persist within the Android OS. Statistics from our open-source app that checks
    a device for recent OS vulnerabilities, Vulnerability Test Suite (VTS) for Android, show that 82
    percent of Android devices were vulnerable to at least one of 25 OS flaws for which VTS tests.
    Those devices could be prone to hundreds more vulnerabilities that the app doesn’t assess.
    Unfortunately, a significant amount of time can pass between when a vulnerability is found
    to when it’s actually patched. Once a patch is developed, it must be passed through original
    equipment manufacturers (OEMs) and wireless carriers like Verizon, AT&T and T-Mobile.
    Patches can take many months or more than a year to make their way to users’ devices. Even
    then, OEMs or carriers sometimes choose not to patch devices. Such a lengthy patch lifecycle,
    or the altogether absence of a patch, leaves users exposed to attacks and data theft.
    Connect with us:
    6
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Apple iOS
    Apple iOS represents the other major mobile OS platform. Based on our mobile security
    82.8%
    intelligence, 82.8 percent of iOS users have adopted iOS 9 and subsequent updates. This
    of iOS users have updated
    data point does not ensure that a particular version of iOS is secure – but shows the rate of
    to iOS 9
    updates is measurably faster.
    Data collected from users of the NowSecure
    Protect app in January 2016.
    Vulnerabilities still exist on iOS devices. According to an analysis of data from CVE Details,
    a free security vulnerability database, Apple iOS had the most vulnerabilities in 2015 with
    375.14 That’s nearly three times more than Android, which had 130. While the overall
    number of CVEs was higher for iOS, that statistic does not necessarily account for the risk
    level of each vulnerability.
    In November 2015, security researcher Charlie Miller released a malicious app onto the
    Apple App Store to demonstrate that risks still exist within the iOS ecosystem.15 While
    Apple later suspended him from its developer program, the experiment emphasizes that a
    developer could sneak a malicious app past Apple’s security checks.
    Overall, security flaws in mobile operating systems coupled with the difficulties posed by
    fragmentation and patch schedules on both Android and iOS must be taken into account
    when securing your mobile ecosystem.
    Connect with us:
    7
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    CO N FIG URATION ISSUES
    Users and how they configure their devices can also threaten the security of enterprises.
    A user can compromise security, compounding risk when insecure apps are involved. For
    example, we find that 43 percent of mobile users do not use a passcode, PIN, or pattern lock
    on their device. If a user doesn’t enable one of these security features and someone steals
    43%
    of mobile users do not use
    a passcode, PIN, or pattern
    lock on their device
    or finds the device, they would have mostly unfettered access to the data on the device,
    including SMS messages, emails, geo-location data, and photos. Most security features on a
    mobile device, including encryption and remote wipe, is ultimately dependent on having set
    a user passcode.
    Other configuration issues can impact device security, including encryption settings, the
    enablement of USB debugging, and apps installed from unknown sources. Altogether the
    configuration plays a key part in activating the security capabilities of the mobile OS.
    Legitimate apps can leak
    your location, device
    identifiers, personal
    contacts, and more
    A P P ISSUE S
    Here we provide a high-level summary of the security of mobile apps, based on our in-depth
    app vulnerability findings which are explained in the “Detailed App Vulnerability Findings”
    section of this report.
    We define leaky apps as mobile applications that transmit or store private user information
    in an insecure manner. Security failures might include man-in-the-middle vulnerabilities and
    insecure data transmission or storage. Intentionally or not, legitimate apps can collect and
    transmit location, device identifiers, personal contacts, and more.
    We define high risk security flaws as issues that expose data that a malicious individual
    could use to gather private, sensitive information and/or monitor a user’s activity.
    In our analysis of more than 400,000 apps available from the Google Play store:

    10.8 percent of all apps leak sensitive data over the network

    24.7 percent of mobile applications have at least one high risk security flaw

    50.0 percent of popular apps send data to an ad network including but not
    limited to phone numbers, IMEI number (a unique identifier assigned to cellular
    devices), call logs, location coordinates, and more
    Connect with us:
    8
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Leaky apps and social engineering
    Any piece of personal data leaked by a mobile app should concern us all because it’s an
    invasion of privacy. However, the information that a mobile app might leak can prove
    valuable to attackers in multiple ways. Personal data leaked by multiple apps can be used
    as reconnaissance information to be used in social engineering schemes. For example, if
    A secure container on
    an insecure mobile
    device yields an insecure
    container
    the user is targeted, credentials leaked by a productivity app might grant an attacker access
    to a cache of sensitive information. A hacker can potentially obtain a username and GPS
    location, allowing them to unlock other sensitive information about a user.
    A note on app containerization
    App containerization involves storing encrypted data on a mobile device within an
    encrypted storage “container” separate from other data and apps on the device. Access to
    Half of all mobile devices
    connect to unsecured
    Wi-Fi each month
    the container requires authentication making it inaccessible without valid credentials. IT
    teams can then control business data separate from personal data on employee devices.
    Containerization also has benefits beyond control of data: organizations can wipe container
    data, revoke access to specific data, fulfill industry and regulatory compliance requirements,
    manage multiple types of devices and platforms, and increase employee access to important
    data.
    App containerization alone should not be counted on to protect mobile endpoints,
    however, as it’s only one piece of a secure mobile ecosystem. Containerization software has
    substantial costs to install and maintain, and requires users to go through additional steps
    to access needed data, which can result in a poor user experiences and abandonment. In
    addition, app containerization, if relied upon alone, can serve as a single point of failure:
    a secure container on an insecure mobile device yields an insecure container. For more
    information about app containerization and where it might fit into your mobile security
    strategy, see the NowSecure whitepaper, “Four Myths of Containerization.”16
    N E TWO RK ISSUES
    One of mobile’s most beneficial aspects, continual connectivity, is also one of its greatest
    weaknesses. Our data shows that half of mobile devices connect to unsecured Wi-Fi each
    month, which exposes devices to data loss and manipulation. Even if a device connects
    to the Internet using a secure connection, it’s astonishing to note all of the connections
    devices and apps make with servers around the world. The average mobile device connects
    to approximately 160 unique servers every day. Any one of those connections could expose
    your enterprise to risk. In addition, 35 percent of the data transmitted via those connections
    is unencrypted.
    Connect with us:
    9
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    IV. Detailed app
    vulnerability findings
    M E TH O DO LO GY
    High risk security flaws
    expose data a malicious
    individual could use to
    gather private, sensitive
    information or monitor a
    user’s activity
    Our detailed app findings come from the analysis of more than 400,000 apps published
    on the Google Play store. We evaluated these apps using NowSecure’s automated app
    security testing system. The scalable system allows us to test mobile applications for high
    risk security and privacy problems including the sending of sensitive data without proper
    encryption. Each app is automatically tested on a physical device to reduce false positives
    and avoid instances where an app avoids executing functions because it detects that it is
    running on an emulator.
    As part of our data-gathering and analysis, we have recorded distinct issues for each
    application. We classify these issues as high risk security flaws as they all expose data a
    malicious individual could use to gather private, sensitive information or monitor a user’s
    activity. Data leaks include information an attacker could obtain either over the network or
    directly from the device itself.
    The following chart details the issues evaluated as part of this app security testing study.
    Connect with us:
    10
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    SE N SITIVE DATA ISSU ES:
    Email leak
    The app leaks the user’s email address.
    Username leak
    The app leaks the user’s username associated with that application.
    Password leak
    The app exposes the user’s password for that application.
    IMEI leak
    IMEI stands for International Mobile Station Equipment Identity and is used by a GSM digital cellular network to
    identify valid devices.
    Name leak
    The app leaks the user’s first and/or last name.
    GPS leak
    The app leaks GPS data potentially allowing for the tracking of a user’s location.
    MAC address leak
    The app exposes the device’s media access control (MAC) address, which is a unique identifier assigned to network
    interfaces for communications on the device.
    N E TWOR K ISSU ES:
    Improper TLS usage
    Improper validation of TLS can result in partial or complete degradation of a connection’s privacy and authenticity.
    This can result in leaking sensitive data such as credit card information and increasing the attack surface significantly
    (i.e., code considered by the server to be secure could be manipulated).
    .Zip files
    .Zip files refer to an app that allows the installation of a .zip file. Unvalidated .zip files might allow for the modifying of
    code or app parameters (e.g., altering the IP address to which communications are sent).
    FILE SYST EM ISSU ES:
    World-readable files
    A file with world-readable permissions enabled would allow anyone to read that file’s contents.
    World-writable files
    A file with world-writeable permissions enabled would allow anyone to overwrite that file’s contents, which can lead
    to arbitrary code execution.
    OTHE R ISSU ES:
    Arbitrary code execution
    This allows an attacker with write-only permissions to execute code in the context of the victim app.
    Directory traversal content providers
    Apps share content that is exported by default and allows other apps on the device to request and obtain sensitive
    information.
    Running superuser (SU)
    The app attempts to run as superuser (SU), potentially enabling root access on your device.
    11
    © 2016 NowSecure. All rights reserved.
    Our automated app security testing system also allows us to gather metadata about an app
    including its category and number of downloads, which allowed us to filter and group the
    information as we have below.
    We identified at least one
    high risk issue in almost
    one in four mobile apps
    OV E RVIE W OF A PP SECU RIT Y WEA K NES S ES
    We examined the results of security testing 400,000 mobile apps and recorded the
    following prevalence of high risk security issues in those apps.
    We identified at least one high risk issue in almost one in four mobile apps. Out of all the
    mobile apps we tested, 13.3 percent had file system issues. The prevalence of sensitive data
    leak and network issues in all mobile apps were lower than other issues at 10.7 percent and
    3.8 percent respectively.
    Connect with us:
    12
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    The chart below illustrates the quantity of issues found by type for the most popular apps
    on the Google Play store. We’ve defined popular apps as those with more than 1 million
    16,036
    downloads. In total, we found 16,036 high risk issues among these popular applications.
    high risk issues were found
    in the most popular apps
    This chart illustrates that mobile apps continue to leak usernames, passwords, and email
    addresses. This is particularly concerning because many users reuse the same username
    and password for different applications. The compromise of a user’s credentials for one app
    could easily lead to the compromise of another app or web account.
    Connect with us:
    13
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    SECURITY WE AK NESSES BY A PP CAT EG O RY
    Business apps are 3
    We examined the results of security testing 400,000 mobile apps and recorded the
    times more likely to leak
    following prevalence of high risk security issues in those apps.
    usernames and passwords
    Business
    than the average app
    Apps in the Business category improve productivity and perform business functions such
    as scanning documents, sharing and storing files, recording financial transactions, managing
    schedules, and other business tasks.
    We tested 5,104 apps within the Business category. Users install an average of 1.6 business
    apps on their mobile devices. We found at least one high-risk vulnerability in 27.6 percent
    of business apps, which is 2.8 percent higher than in the average app. Looking at specific
    issues, business apps are three times more likely to leak usernames and passwords than the
    average app.
    Connect with us:
    14
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Finance
    Apps in the Finance category include banking applications, payment apps, and insurance
    apps. These apps might store credit card information, allow for sending currency, and save
    personal banking information.
    Finance apps were more
    secure than the average
    app, only showing one
    high risk vulnerability
    in 16.9 percent of
    applications, 7.8 percent
    lower than the average
    app
    We tested 5,201 apps within Google Play’s Finance category. We find that users install
    an average of 1.8 finance apps on their device. Finance apps were more secure than the
    average app illustrated by our finding at least one high risk vulnerability in only 16.9 percent
    of them, which is 7.8 percent lower than in the average app. We identified file system issues
    in only 10.1 percent of finance apps, 3.3 percent less than the average app. Only 4.2 percent
    of the finance apps we tested leaked sensitive data, which is 6.6 percent less than the
    average.
    Connect with us:
    15
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Games (aggregated)
    The Google Play store includes 17 distinct games categories. We’ve aggregated our findings
    32.8%
    across those categories into a single Games category here. Game apps feature in-app
    of apps in the Games
    purchases, present ads to users, and save user information as a profile for playing
    category leak sensitive
    specific games.
    data, which is three times
    as much as the average
    mobile app
    We tested 56,964 apps within the Games category. We find that 5.2 games apps are
    installed on the average device. Our findings show that game apps are 1.5 times more likely
    to have at least one high risk vulnerability than the average app. File system issues are
    present in 17.1 percent of games apps compared to 13.3 percent in all apps.
    What concerns us most about the game apps is that 32.8 percent of apps in the category
    leak sensitive data, which is three times as much as the average mobile app. Game apps are
    also nine times more likely than the average app to have a network issue.
    Connect with us:
    16
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Shopping
    Apps in the Shopping category include apps from retailers used to purchase goods, services,
    and more. You can use these apps to browse items, submit reviews, make purchases, or
    create and save a user profile for future shopping.
    Apps in the Shopping
    category are 1.5 times
    more likely to have at least
    one high risk vulnerability
    compared to the average
    app
    We tested 2,947 apps in the Shopping category. Our research shows that the average
    device has two shopping apps installed. Shopping apps are 1.5 times more likely to have at
    least one high risk vulnerability compared to the average app. In addition, 24.8 percent of
    the shopping apps we tested possessed file system issues, which is 1.9 times higher than
    the average app.
    Connect with us:
    17
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    Social
    Apps that allow users to participate in social media make up the Social category. These
    applications share messages, photos, videos, and other media through popular social media
    platforms.
    Social apps are 4.1 times
    more likely to leak a
    username, 3.8 times more
    likely to leak a password,
    and 4.7 times more likely
    to leak a user’s email
    address
    We tested 4,503 apps within Google Play’s Social category. Users install an average of
    3.7 social apps on their mobile device. We found at least one high risk vulnerability in
    30.5 percent of social apps – 5.8 percent more than in the average app. Compared to apps
    overall, social apps are 4.1 times more likely to leak a username, 3.8 times more likely to
    leak a password, and 4.7 times more likely to leak a user’s email address.
    Connect with us:
    18
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    V. Conclusion
    We founded NowSecure focused solely on mobile security. Our company mission is to
    secure mobile devices and apps and protect the people that use them. Our mobile app
    testing, device monitoring, forensics and security intelligence capabilities provide us with a
    unique set of mobile security data.
    Leaky apps that store or
    transmit sensitive personal
    and corporate data in an
    insecure manner are of
    far greater concern than
    malware
    We published this report to share some of that data and the resulting insights with the
    public. We also aim to help enterprises manage and secure the mobile devices and apps
    that connect with their corporate assets each day. IT and security teams should take the
    following key points away from the 2016 NowSecure Mobile Security Report:

    Mobile security requires a different approach not focused on malware.
    Leaky apps that store or transmit sensitive personal and corporate data in
    an insecure manner are of far greater concern at this point in time.

    Even legitimate apps without intentionally malicious functionality that are
    downloaded from official app marketplaces can include high risk security
    issues.

    Mobile security requires identifying and remediating security issues in
    device OSs and configurations, the apps installed on those devices, and the
    network connections those devices make each day.
    Connect with us:
    19
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com
    SO U RCE S
    1
    http://a16z.com/2014/10/28/mobile-is-eating-the-world/
    2
    http://www.independent.co.uk/life-style/gadgets-and-tech/news/there-are-officiallymore-mobile-devices-than-people-in-the-world-9780518.html
    3
    http://adwords.blogspot.com/2015/05/building-for-next-moment.html
    4
    https://www.comscore.com/Insights/Presentations-and-Whitepapers/2015/The-2015US-Mobile-App-Report
    5
    http://www.pocketgamer.biz/metrics/app-store/app-count/
    6
    http://blogs.forrester.com/satish_meena/15-06-22-consumers_will_download_more_
    than_226_billion_apps_in_2015
    7
    http://www.zdnet.com/article/research-74-percent-using-or-adopting-byod/
    8
    http://www.verizonenterprise.com/DBIR/2015/
    9
    https://www.nowsecure.com/intelligence/
    10 https://www.nowsecure.com/blog/2015/12/17/finding-mobile-vulnerabilities-atscale/
    11 http://www.ubergizmo.com/2015/09/over-1-4-billion-people-are-now-using-android/
    12 http://www.cnet.com/news/google-io-by-the-numbers-1b-android-users-900m-ongmail/
    13 http://www.statista.com/statistics/266210/number-of-available-applications-in-thegoogle-play-store/
    14 http://venturebeat.com/2015/12/31/software-with-the-most-vulnerabilities-in-2015mac-os-x-ios-and-flash/
    15 http://www.zdnet.com/article/after-latest-iphone-hack-charlie-miller-kicked-out-ofios-dev-program/
    16 https://info.nowsecure.com/containerization-four-myths/
    Connect with us:
    20
    www.nowsecure.com
    © 2016 NowSecure. All rights reserved.
    info@nowsecure.com

    Calculate your order
    275 words
    Total price: $0.00

    Top-quality papers guaranteed

    54

    100% original papers

    We sell only unique pieces of writing completed according to your demands.

    54

    Confidential service

    We use security encryption to keep your personal data protected.

    54

    Money-back guarantee

    We can give your money back if something goes wrong with your order.

    Enjoy the free features we offer to everyone

    1. Title page

      Get a free title page formatted according to the specifics of your particular style.

    2. Custom formatting

      Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

    3. Bibliography page

      Don’t pay extra for a list of references that perfectly fits your academic needs.

    4. 24/7 support assistance

      Ask us a question anytime you need to—we don’t charge extra for supporting you!

    Calculate how much your essay costs

    Type of paper
    Academic level
    Deadline
    550 words

    How to place an order

    • Choose the number of pages, your academic level, and deadline
    • Push the orange button
    • Give instructions for your paper
    • Pay with PayPal or a credit card
    • Track the progress of your order
    • Approve and enjoy your custom paper

    Ask experts to write you a cheap essay of excellent quality

    Place an order