The Emerging Mobile App “Wild West”

It’s a mobile “Wild West” out there. The use of mobile devices continues to climb: There are already more Internet-connected mobile devices, such as smartphones and 3G/4G tablets, than humans in the world. The use of dedicated mobile apps is also increasing and is completely dominating mobile internet usage. Flurry reports that mobile apps account for 86 percent of the average U.S. mobile user’s time, which amounts to more than two hours per day.

Mobile apps, available through online app distributors such as Apple’s App Store, Google’s Play Store and third-party marketplaces, are without a doubt the dominant form of delivering value to users worldwide. Organizations have embraced mobile apps as a way to improve employees’ productivity and align with their new agile and mobile lifestyle, but are these mobile applications really secure and protected from malicious hackers?

To put this concern into perspective, recent research from Arxan determined that among the top paid and free mobile applications:

  • 100% of the top 100 paid apps on the Google Android platform had been hacked
  • 56% of the top 100 paid apps for Apple iOS had been hacked
  • 73% of popular free apps on Android had been hacked
  • 53% of popular free apps on Apple iOS had been hacked

These numbers are alarming to say the least, especially considering many companies are increasingly adopting bring-your-own-device (BYOD) policies to allow employees to merge their personal and professional lives into a single mobile experience. The fact is that 84 percent of consumers use the same smartphone for work and personal use, according to Ponemon Institute. This trend, while positively impacting the user experience, can reduce the ability of the IT department to confidently secure access to data on enterprise systems.

Because of this, it is pretty much impossible to make certain assumptions about the underlying security of a mobile device or the application mix being used on that device. This unknown territory, the so-called “Mobile Wild West,” makes securing the application and its execution an increasingly difficult task.

So how do we secure the mobile work force in the age of BYOD? What follows is a framework to address the creation, deployment and execution of secure mobile applications, thus reducing the business exposure associated with enterprise mobility.

1. Secure the Code: Building a Secure Application

Mobile malware often taps vulnerabilities or bugs in the design and coding of the mobile applications they target. Recent research from Kindsight reported by Infosecurity shows that malicious code is infecting more than 11.6 million mobile devices at any given time, and the number of mobile malware samples is growing at a rapid clip, increasing by twentyfold in 2013.

Even before a vulnerability is exploited, attackers can obtain a public copy of an application and reverse engineer it. Popular applications are repackaged into “rogue apps” containing malicious code and are posted on third-party app stores to lure and trick unsuspecting users to install them and compromise their devices.

Enterprises should look for tools to aid their developers to detect and close security vulnerabilities and then harden their applications against reverse engineering and tampering. However, “consumer apps” still represent a threat as they may not undergo the appropriate hardening process; and if rogue applications, malware and enterprise apps share the same device, the threat is tangible.

2. Secure the Device: Detecting Compromised and Vulnerable Run-Time Environment

As secure as an application is, its security relies on the underlying device’s security. Jailbroken or rooted devices or the presence of rogue applications can represent an execution risk that may be allowed for certain enterprise apps but not for others.

Enterprises should look into ways to dynamically gauge the security of the underlying device. First, the mobile app sandbox, which is prevalent in modern mobile operating system design, must be intact. Rooting or jailbreaking the device breaks the underlying security model, and it is highly recommended to restrict these devices from accessing enterprise data. Furthermore, jailbreak technology is evolving rapidly to evade detection; coping with these mechanisms is essential to keeping up with these threats.

Mobile malware doesn’t always rely on the device being jailbroken, however. Excessive use of permissions to the mobile applications — which are granted by the user, often by default — can provide malware and rogue applications access to basic services (e.g., SMS) used to facilitate fraudulent activities.

Enterprises should consider up-to-date intelligence sources and application reputation services to track the tidal wave of applications — and their associated risk — as they enter mobile app stores on a daily basis. Using this data, application capabilities could be enabled or disabled based on the device risk profile.

3. Secure the Data: Preventing Data Theft and Leakage

When mobile applications access enterprise data, documents and unstructured information are often stored on the device. If the device is lost or when data is shared with nonenterprise applications, the potential for data loss is heightened.

Many enterprises are already looking into “remote wipe” capabilities to address stolen or lost devices. Mobile data encryption can be used to secure data within the application sandbox against malware and other forms of criminal access. To control application data sharing on the device, individual data elements should be encrypted and controlled.

4. Secure the Transaction: Controlling the Execution of High-Risk Mobile Transactions

Because mobile applications enable users to transact with enterprise services on the go, the risk tolerance for transactions will vary. For example, reading HR-related content may be deemed low risk versus the approval of a large payment to a new supplier.

Organizations should adapt an approach of risk-aware transaction execution that restricts client-side functionality based on policies that consider mobile risk factors such as device security attributes, user location, and the security of the network connection, among others.

Even when client-side transactions are allowed, enterprise applications can leverage an enterprise mobile risk engine to correlate risk factors such as IP velocity — access to the same account from two locations that are far apart over a short period — user access patterns and data access profiles. This approach extends the enterprise’s ability to detect and respond to complex attacks that can span multiple interaction channels and seemingly unrelated security events.

Securing Enterprise Mobile Applications Against Evolving Threats

IDC expects that nearly 69 percent of all smartphones used for business are owned by the employees rather than the enterprise. These mobile devices are becoming more attractive targets for malware writers that are just following the money. BYOD growth rates increase the risk of personal devices infecting enterprise networks.

To secure the mobile workforce in the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile. The proposed framework looks at the device, the data, the application and the transaction as components of a single continuum that must be secured to minimize the business risk associated with mobility; it’s about finding a balance between usability and mitigating risk. The appropriate mobile security framework will enable enterprises to reap the productivity gains and enhance employee satisfaction while limiting the exposure to their critical information and business assets.

Watch the video: How to Protect Sensitive Business Data and Mitigate the Risk of Mobile Malware

More from Endpoint

Combining EPP and EDR tools can boost your endpoint security

6 min read - Endpoint protection platform (EPP) and endpoint detection and response (EDR) tools are two security products commonly used to protect endpoint systems from threats. EPP is a comprehensive security solution that provides a range of features to detect and prevent threats to endpoint devices. At the same time, EDR is specifically designed to monitor, detect and respond to endpoint threats in real-time. EPP and EDR have some similarities, as they both aim to protect endpoints from threats, but they also have…

The needs of a modernized SOC for hybrid cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

X-Force prevents zero day from going anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…