© weiss “smartphone botnets” - mulliner.org · analysis of ikee.b [ ... wifi vs. gsm/3g →...

16
© Weiss Berlin Institute of Technology Berlin Institute of Technology FG Security in Telecommunications “Smartphone Botnets” SPRING 2010 Collin Mulliner , July 7 th 2010 [email protected]

Upload: duongdung

Post on 27-Apr-2018

217 views

Category:

Documents


4 download

TRANSCRIPT

© Weiss

Berlin Institute of TechnologyBerlin Institute of TechnologyFG Security in Telecommunications

“Smartphone Botnets”SPRING 2010

Collin Mulliner, July 7th 2010

[email protected]

7.7.2010 2Collin Mulliner – SPRING 5: “Smartphone Botnets”

Agenda

Introduction

Motivation

Project Goals

Command and Control

Payloads

Conclusions

7.7.2010 3Collin Mulliner – SPRING 5: “Smartphone Botnets”

Introduction

Botnets are a serious security problem in todays Internet– Spam, fraud, identity theft, malware hosting, DDoS, ...– Anti botnet research is a big area of research

Smartphone botnets– Vulnerabilities exist in all major smartphone platforms– Smartphones are powerful enough to host a bot– Smartphone-based botnets would offer additional

“financial” gains for a botmaster

Therefore, smartphone botnets are likely to appear and thus need to be studied

7.7.2010 4Collin Mulliner – SPRING 5: “Smartphone Botnets”

The iPhone iKee.B botnet

Very simple botnet that is based on the iKee.A worm– Abused the default root password of jailbroken iPhones– Infected phones via ssh/scp

• No user interaction required! (first one!)– Very simple HTTP-based C&C

• download a shell script with new commands– Main payload was to steel SMS database– November 2009

ReferencesAnalysis of iKee.B [http://mtc.sri.com/iPhone/]iKee.A [http://f-secure.com/weblog/archives/00001814.html]

7.7.2010 5Collin Mulliner – SPRING 5: “Smartphone Botnets”

Motivation

Understand mobile botnets– How will they work– How to build one– Identify “general weak spots”

Operators need to prepare for mobile botnets– Keep mobile network operational– Filter fraud (nobody likes upset customers)– Need to be able to detect and remove bots

7.7.2010 6Collin Mulliner – SPRING 5: “Smartphone Botnets”

Goals

Implement smartphone bot and botnet C&C– Try different C&C schemas– Implement payloads

Evaluate botnet– In test network (in test GSM network)– On real network (manual install, not spreading!)

Investigate detection possibilities– Network side (mobile phone network)

7.7.2010 7Collin Mulliner – SPRING 5: “Smartphone Botnets”

Command and Control (C&C)

C&C is the most important part of a botnet– Control channel for botmaster– If channel can be blocked the botnet is dead– Needs to be robust against attacks

• by defenders (good guys) and other botmasters

Challenges for mobile C&C– Connectivity: Wifi vs. GSM/3G → changes in bandwidth– Communication costs (GSM: SMS/data)– Computational power– Battery power

7.7.2010 8Collin Mulliner – SPRING 5: “Smartphone Botnets”

Internet-based (IP-based) C&C

C&C via IP/Internet– Follow PC-based botnets using P2P

7.7.2010 9Collin Mulliner – SPRING 5: “Smartphone Botnets”

GSM-based (SMS-based) C&C

C&C via SMS/MMS– Botmaster uses a phone to control the botnet

• Phone maybe hijacked

7.7.2010 10Collin Mulliner – SPRING 5: “Smartphone Botnets”

Local Wireless C&C

WiFi (AdHoc), Bluetooth Botmaster injects command and lets it travel through the net

7.7.2010 11Collin Mulliner – SPRING 5: “Smartphone Botnets”

C&C Communication Costs

Mobile phone service cost money– SMS, packet-data, circuit switch data (CSD) calls, ...

Costs could make a botnet detectable– more easily, faster

Need to analyze cost factor– When designing a C&C system for a mobile botnet– When building a detection system

Interesting because of...– Service plans– Countries, roaming

7.7.2010 12Collin Mulliner – SPRING 5: “Smartphone Botnets”

Mobile Botnet Payloads

Mobile phones have abilities not found on desktop computers– Modem

• Billing system• Non-IP communication

– Data not found on desktop computer– Special hardware such as a GPS

Possibilities– Unique kind of denial-of-Service attacks– Unique kind of fraud– Data / identify theft

7.7.2010 13Collin Mulliner – SPRING 5: “Smartphone Botnets”

Data Theft

Smartphone store many kinds of private information– Addressbook– Calendar– Emails + account credentials– SMS/MMS– Voicecall records– Photos

Gain for botmaster– Extortion (private)– Identity theft (private)– Industrial espionage (commercial)

7.7.2010 14Collin Mulliner – SPRING 5: “Smartphone Botnets”

(D)Denial-of-Service Payloads

Operator / Network– DoS a single cell or cell area– DoS MNO backend infrastructure [1]

“Real World”– DoS emergency number– DoS company hotline (extortion)– SMS flooding

[1] Trynor et al.: On cellular botnets: measuring the impact of malicious devices on a cellular network core, 16th ACM CCS

7.7.2010 15Collin Mulliner – SPRING 5: “Smartphone Botnets”

Conclusions

Bots on mobile phones pose some challenges– Many possibilities for C&C

• A lot of work for the defenders

Mobile bots offer unique possibilities to a botmaster– Phone call / sms related fraud (easy)– New interesting DoS attacks

Smartphone botnets are interesting and a hot topic right now

Berlin Institute of TechnologyBerlin Institute of TechnologyFG Security in Telecommunications

Thank you!

Questions?