Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

Cyber Security

Mobile & Wireless Device


S.C.E.T, Surat
Popular attacks on 3G phones
• Malware/Virus/Worms
• Skull Trojan
• Cabir Worm
• Mosquito Trojan
• Brador Trojan
• Lasco Worm
• DoS
• Overbilling Attack
• PDP
• Signaling level attacks
Why attack on Mobile Phones
• Luxury to Necessity
• Power Pack Device
• Low Cost
• Smart
• Multiple Interface
IMEI- International Mobile Equipment Identity
• 15 digit unique number
• *#06#
• Can be used to ‘lock’ the phone even if sim is changed.

• Anti-theft software for mobile:


• GadgetTrak
• Back2u
• Wavesecure
• F-secure
Factors for outbreaks on mobile devices:
• Enough target terminals:
• “Ojam”- The first mobile virus observed in June 2004.
• Was spread using Game “Mosquito”.
• Enough Functionality:
• As today device carry critical data unprotected.
• Expanded functionality increases probability of malware.
• Enough Connectivity:
• SMS
• MMS
• Bluetooth
• IR
• WLAN
• Increase freedom offers more choice.
Mishing
• Combination of Mobile Phone+Phishing
• If you use mobile for purchasing goods/services & for banking could
be vulnerable to mishing scam.
• Mishing attacker uses Vishing or SMS also known as Smishing.

• Phone Frauds.
Why Mishing
• ID Theft
• Purchasing Goods & Services
• Transferring Funds
• Monitoring Bank Accounts
• Making applications for loans and credit cards.
How Vishing is done & its protection
• Internet E-mail
• Mobile messaging
• Voicemail
• Direct Phone calls

• Protection
• Be suspicious of unknown calls
• Beware form caller ID spoofing
• Report to CyberPolice cells
Smishing
• SMS Phishing
• Eg. “We are happy to send our confirmation toward your enrollment
for our ‘xxxxxxxxxxx’ Club Membership. You will be charged Rs. 50/-

You might also like