Social engineers have been using various dirty tricks to fool people for centuries. Social engineering, the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.
For the past several years online, social engineers have been trying to fool unsuspecting users into clicking on malicious links and giving up sensitive information by pretending to be old friends or trusted authorities on email and social networks.
And now that mobile devices have taken over our lives, social engineering is an attack method of choice to gain access to a person's smartphone or tablet.
Information security expert Lenny Zeltser, senior faculty member with SANS Institute and an incident handler at the Internet Storm Center, recently shared three examples of current cons being used by criminals to get inside your mobile device.
Malicious apps that look like legitimate apps
The example Zeltser uses is the case of a popular and legitimate application Android users were purchasing that caused a virtual "steam" to appear on the screen of a smartphone.
"You could move your finger to scrape the virtual steam off," he explained. "People love this sort of thing."
But a malicious application that looked exactly like the virtual steam application was created and many were conned into purchasing that one, instead of the authentic application.
"From a users perspective it is very hard to distinguish between an app that is legitimate with an app that turns out to be malicious," said Zeltser.
What users ended up with was an application with unwanted things behind it. In some cases, according to Zeltser, the malicious application activated an SMS message from the victim's phone that was sent to request premium services and the user was charged. The attacker, meanwhile, would delete any return SMS messages acknowledging the charges so the victims had no idea they were being billed.
"In this scenario, the victim had no indication that the phone was sending messages or receiving any kind of notifications of the charges. They would get a large phone bill."
Zeltser said Google removed over 50 malicious apps from Android Market in spring 2011 that seemed turned out to be variants of the DroidDream trojan, but looked like legitimate applications and had names like Super Guitar Solo.
"The advice we're giving people outside of the mobile world is don't install applications that come from untrusted sources," said Zeltser. "That same advice applies now to mobile."
Zeltser also noted not to rely on an application's ratings because many users might be enjoying the app's features without realising that it contains a malicious functionality. He also said the bad apps he is hearing about and seeing are ones on the Android market, which is where most criminals seem to target. It's not that Apple applications could not also be malicious, but Zeltser has yet to see one and thinks it has to do, at least partly, with Apple's vetting and examination process and digital signature requirements.
Malicious mobile apps that come from ads
Zeltser laid out a scenario in which a legitimate application on a smartphone runs a bad advertisement. If the user clicked on the ad, they are taken to a web site that tricks the victim into thinking their battery is inefficient, he said. The person is then asked to install an application to optimise the battery consumption, which is instead a malicious application.
"Much like outside the mobile world, the attack began here with an ad," explained Zeltser. "We are seeing on our malicious ads on desktop systems as an incredible infection vector because they allow the attacker to present potentially malicious code into the browser of hundreds of thousands of victims. Now we are seeing this happen in a mobile environment too to where ads are being placed into legitimate applications."
Apps that claim to be for "security"
Another new mobile attack vector is a ZeuS malware variant that actually originates with an infected PC. When a user visits a banking site from an infected computer, they are prompted to download an authentication or security component onto their mobile device in order to complete the login process, said Zeltser.
"The attackers realize that users are using two-factor authentication," he explained. "In many cases that second factor is implemented as a one time password sent to the user's phone by the banking provider. Attackers were thinking: 'How can we get access to those credentials?' Their answer is: 'Attack the user's phone.'"
The way this ruse works is once the PC is infected, the person logs onto their bank account and is told to download an application onto their phone in order to receive security messages, such as login credentials. But it is actually a malicious application from the same entity that is controlling the user's PC. Now they have access to not only the user's regular banking logon credentials, but also the second authentication factor sent to the victim via SMS. In many cases, said Zeltser, people thought they simply were installing security applications, or in some cases, a security certificate.
"When people think something is done for security they forget all logic and reason," he said. "They just blindly do it."