Mobile Cyber Attacks
Mobile cyber attacks are growing rapidly as hackers’ strategies become more agile and dangerous, and what’s at stake is mostly the user’s personal data and privacy.
How to Stay Protected in an Overly-Connected World
A mobile cyber attacks is an exploit targeting handheld communications devices, such as smartphones and tablets. … To protect the corporate network from such attacks, Skoudis recommends that corporations develop mobile security policies and evaluate mobile apps before allowing them.
The movement towards a more mobile workforce has forced organizations to adapt their business practices to extend far beyond the safety and security of their networked environments. The evolution from company-issued Blackberrys to BYOD (Bring Your Own Device) has created an expansive attack surface for an organization’s security team to manage and protect.
Informed users are an organization’s first line of defense. The more informed their user-base is, the less likely they will become a victim of a mobile attack. Many organizations may already have or are working to create policies and procedures around BYOD to convey the rules and best practices to keep not only their users safe, but to keep the company data and integrity protected. Just like any policy or procedure implemented within an organization, these mobile device policies should be regularly reviewed and updated as new threats or features are introduced.
It seems no matter who you are, CEO or a regular everyday user, you run the risk of falling victim to a phishing attack. In a phishing attack, attackers present themselves as a legitimate person or firm to try and trick unsuspecting users into handing over valuable data about themselves or their organization. Most times these unsolicited attempts will be presented over email, but this trend is now spreading to mobile and social media.
First things first: If the source is not trusted or it seems suspicious, DO NOT CLICK! This practice may seem simple, but people fall victim to this scheme more times than you would expect. So, when in doubt, exit out.
If you suspect that the email may be legitimate, but because of your training you are still suspicious, perform some investigative work. Most phones will allow you to preview which site the link will direct you to by holding your finger over the link (without clicking it). Look for small spelling errors that may normally be overlooked.
Research the sender’s email domain against their legitimate site. If there are any one-offs, do not trust it.
Legitimate companies will never ask you to provide your username, pin, password, or will they ask you to pay them via a prepaid credit card. If you receive an email asking you to verify these items or any other personal information, do not respond. Contact the institution in question to provide them with the details of the email received. By doing this, you can alert them to this scheme and they can provide their users with a warning against this attempt.
Unsecured Wireless “Hotspot”:
Our need to be constantly connected can pose an unintended risk to our mobile safety. Many establishments try to fulfill this need by providing free WiFi access to their patrons. Everywhere from your local coffee shop to Disney World, WiFi access has become a common and necessary service for companies to provide to its customers. However, this service may provide you with more than a free way of staying connected.
. Never connect to an unsecured WiFi network. An unsecured WiFi network or hotspot is one that a user does not need to provide a password to connect. These networks are a prime target for attackers to snoop or spy on a user’s online activity. Attackers can steal information such as login credentials, credit card data, or personal data which can leave them vulnerable to identity theft or theft of proprietary information.
. Many mobile providers offer personal hotspots to their users for a small monthly fee. This service can provide a user a secure way of connecting on the go. As long as you have a mobile data connection, you have a secure communication path.
. Some organizations may have the ability to provide their mobile workforce VPN connectivity, but for those who do not have access to this, it is a highly recommended investment. VPNs (Virtual Private Network) protect its users by encrypting their Internet connection which prevents attackers or anyone, including Internet Service Providers, from seeing the information sent over the network.
Malware continues to be a threat to organizations regardless of how their users connect. Long gone are the days where security teams had to only be concerned about their internal assets falling victim to these destructive tactics. Now as organization’s environments stretch across the nation and across the world, the need to extend their security programs are even greater.
. Utilize a security application to detect malware. An organization should research acceptable applications their end users can install on their devices to periodically scan for and detect malware.
. End users should be trained on application security. Educating users on how to determine if an app is legitimate will help to prevent them from inadvertently downloading an application that may contain malware.
. Some organizations may even opt to have stringent BYOD policies and procedures where certain applications cannot be downloaded of their personal devices if they are being used for business purposes.
As simple as it sounds, educates end users on the dangers of clicking on suspicious links. Even links found on popular social media sites might lead to a malware infection. Following the same steps outlined in reducing phishing attacks, will help prevent users from falling victim to a malware attack.
The actions outlined in this article are a few simple steps, which, if consistently followed, will reduce an organization’s risk when it comes to mobile devices in their environment. Although organizations today are taking many preventative measures, all it takes is one successful attack to lead to devastating consequences and a full-blown security incident. Security teams need to be able to detect and respond immediately to any and every security alert which they face, whether from a phishing attack, malware attack or other forms. With the increasing volume of alerts, the most effective and efficient way to do this is through automation and orchestration, to ensure no alert goes undetected or untouched. Contact DFLabs today to arrange a personalized demo of its Security Orchestration, Automation and Response platform, IncMan SOAR.