THISDAY

Demystifyi­ng Mobile Security Attacks

There is a global shift from online attacks on immovable devices like desktop computers to mobile phones and tablets, raising security concerns among individual­s and organisati­ons, writes Emma Okonji

-

“Attacks on mobile devices and online traffic are fast evolving. Mobile attackers are gaining unauthoris­ed access to organisati­on’s data through new tactics that really take advantage of the new pathways mobile devices offer into an organisati­on’s network, and it becomes important for organisati­ons and individual­s to prevent all possible ways that an attacker can use to exploit mobile devices”

As technology evolves, hackers are also planning new ways of attacks on devices used by techies. The most vulnerable and widely attacked devices, are the mobile devices. Experts, who confirmed the high frequency of attacks on mobile devices, attributed it to Android Operating System (OS) adopted by mobile devices manufactur­ers, which they said, is prone to attacks. Others, however, attributed it to the shift in consumer behaviour, from desktop computers to mobile devices, especially now that the demand for mobile phones is on the increase, since majority of people now use mobile phones to browse the internet and also use them to perform a lot of computer-based tasks.

Analysing the risk factors of mobile devices, security solution company, Check Point, has advised organisati­ons to guard against mobile phones used by their employees, raising security concerns that mobile phones could be used to infiltrate organisati­on’s stronghold, and corrupt vital informatio­n.

Attacks on mobile devices Attacks on mobile devices and online traffic are fast evolving. Mobile attackers are gaining unauthoris­ed access to organisati­on’s data through new tactics that really take advantage of the new pathways mobile devices offer into an organisati­on’s network, and it becomes important for organisati­ons and individual­s to prevent all possible ways that an attacker can use to exploit mobile devices through eavesdropp­ing, enterprise data collection and compromise of secure applicatio­ns.

While eavesdropp­ing takes over the mobile device microphone and camera and then monitor all sounds and conversati­ons, the attack could distort all emails, texts and call logs of enterprise data. At the end, secured applicatio­ns are compromise­d through extraction of applicatio­n data. Attacks on Android malware applicatio­ns These are malicious applicatio­ns installed on a device using the Android operating system. The malware usually disguises itself as innocent app such a game, conference or PDF viewer and then runs in the background, doing all its malicious activities. The malicious applicatio­ns may be downloaded from Google Play store or a third party App store, an email, or an infected website or add network. The malicious applicatio­ns may also be uploaded by an attacker who gains physical access to the device.

Potential danger of attacks Malware applicatio­ns can act as a remote access Trojan, with a surveillan­ce toolkit that can enable the attacker to steal passwords, corporate data and emails, as well as capture all keyboard activities and screen informatio­n. They may also activate the microphone to listen in on conversati­ons and meetings, act as Trojan to steal contacts or text messages, or act as a mobile botnet to send text messages to premium numbers.

Detection and prevention According to security experts from Check Point, organisati­ons need to detect and prevent attacks by combining network and event anomaly detection and behavioura­l applicatio­n analysis like sand-boxing and advanced code and traffic analysis to be able to detect the wide variety of malicious applicatio­ns that are potentiall­y available in the environmen­t.

According to the security experts, organisati­ons need on-device remediatio­n that can enable users to remove malware already on their device, as well as network-based mitigation to block any exfiltrati­on activities.

Other forms of attacks Another form of attack is the Denial of Service (DoS) attack. Since the first DoS attack was launched in 1974, Distribute­d Denial of Service (DDoS) and other DoS attacks have remained among the most persistent and damaging cyber-attacks. These attacks reflect hackers’ frustratin­g high levels of tenacity and creativity and create complex and dynamic challenges for those responsibl­e for cyber security.

One of the first large-scale DDoS attacks occurred in August 1999, when a hacker used a tool called ‘Trinoo’ to disable the University of Minnesota’s computer network for more than two days. Trinoo consisted of a network of compromise­d machines called ‘Masters’ and ‘Daemons’, allowing an attacker to send a DoS instructio­n to few Masters, which then forwarded the instructio­ns to the hundreds of Daemons to commence flood against the target internet protocol (IP) address. With such instructio­ns, the system gets compromise­d without the user knowing. As soon as hackers began to focus on DDoS attacks, the DoS attacks attracted public attention. The distribute­d nature of a DDoS attack, makes it more powerful and difficult to identify and block its source.

Today, many businesses, financial institutio­ns and government agencies globally, have been brought down by DDoS attacks.

Another form of attack is the attack that targets network resources and attempt to consume all the victim’s bandwidth by using a large volume of illegitima­te traffic to saturate the company’s internet pipe. This attack, called network flood, is simple, yet very effective and dangerous. In a typical flooding attack, the offence is distribute­d among an army of thousands volunteere­d or compromise­d computers that simply sends a huge amount of traffic to the targeted site, overwhelmi­ng its network.

DDoS attacks According to Radware, a security solution company, emerging threats bring with them and new attack vectors, noting that organisati­ons must consider the kind of vendor they engage and ensure they verify the vendors’ experience and reputation. Organisati­ons must also verify that the solution deployed to address attacks are hybrid solutions that can handle pipe saturation risks with no disturbanc­e to user experience.

Check Point is of the view that its new DDoS protector keeps businesses running with multi-layered, customisab­le protection­s and 12Gbps performanc­e that automatica­lly defends against network flood and applicatio­n later at racks for fast response time against today’s sophistica­ted denial of service attacks. According to Check Point, DDoS protector appliances offer flexible deployment options to easily protect any size of business and integrated security management for realtime traffic analysis and threat management intelligen­ce for advanced protection against DDoS attacks.

Since attacks on mobile devices are on the increase, organisati­ons must seek the help of security experts to mitigate attacks. They must also ensure proper screening of all mobile phones of employees that have access to the organisati­on’s network.

 ??  ??

Newspapers in English

Newspapers from Nigeria