Mobile Evil Twin Malnets - The Worst of Both Worlds

نویسندگان

  • Christian Szongott
  • Benjamin Henne
  • Matthew Smith
چکیده

The mobile computing world is undergoing major changes both in the capability as well as in the proliferation of mobile devices. While, up to now, mobile malware has played a relatively small role compared to the behemoth of desktop malware, the changing environment is steadily increasing the attractiveness of mobile devices as exploitable resources. The increased usage and connectivity of mobile devices opens up a much larger set of attack vectors to compromise them. In this paper, we adapt the evil twin rogue access point attack to the mobile domain and show how it can be used to create a mobile malnet, which is capable of spreading epidemically. We implemented the key components of the concept for the iPhone to study its properties in a laboratory environment. To demonstrate the dangers which come along with this kind of attack we simulate a metropolitan area and show how fast a malware can spread in a mobile environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points

Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil...

متن کامل

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...

متن کامل

6 Wireless Threats to Your Business

If you think a promiscuous client is a scantily-dressed customer, you're in trouble. And I'm not talking about having an affair. Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it's not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and tar...

متن کامل

Detecting and Localizing Transmitters in a Wireless Evil-Twin Attack ∗

In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn’t lie about its identity. The e...

متن کامل

POSTER: Android + Open Wi-Fis = Broken SSL?

In previous work [1] we demonstrated severe problems with the way Android applications use SSL. We performed an in-depth study of 13,500 Android apps and discovered that a large number of apps did not use SSL correctly and thus, were vulnerable to Man-In-The-Middle attacks. To make these threats a reality, an attacker needs to execute an active man-in-the-middle attack (MITMA). While MITMAs are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012