Enterprises that use MDM (mobile device management) systems to protect their corporate data on employees' mobile phones are not safe from attacks from spyphones, researchers warned at BlackHat Europe on Thursday.
Over the next five years, 65 percent of enterprises will adopt an MDM system for corporate users, technology research company Gartner predicted last October. Companies will use the systems to manage network traffic and corporate data on smartphones and tablets, which nowadays are often owned by employees and used for both private and corporate tasks.
[ For iOS, Android, BlackBerry OS, and Windows Phone: Learn how to manage mobile devices in InfoWorld's Mobile Management Deep Dive PDF special report. | Keep up on key mobile developments and insights via Twitter and with the Mobile Edge blog and Mobilize newsletter. ]
Companies are using MDM systems to protect their data, but they must be aware that while the systems are useful, they don't provide full security and can be targeted by so-called spyphones, warned Daniel Brodie, senior security researcher at the Israeli security company Lacoon Security, and Michael Shaulov, CEO and co-founder of the company, at the BlackHat conference in Amsterdam.
MDM systems try to tackle security issues by providing a "secure container" on mobile devices, encrypting the part of the mobile device that handles business data, as well as offering the possibility to remotely wipe or lock that section if a phone is stolen or an employee quits. However, common MDM security offerings can be circumvented by planting surveillance tools without the users knowledge on a phone, turning it into a spyphone, Brodie told a crowd of conference attendees.
A survey conducted by Lacoon in cooperation with global cellular network providers showed that about one in 1,000 phones was a spyphone, according to Brodie's research paper. Of 175 compromised devices found, 52 percent was attributed to Apple's iOS, 35 percent to Android phones, 7 percent to Nokia phones and 6 percent to other devices, he said.
"This is a very alarming number," Brodie said. The problem with spyphones is that while the software is installed on a single device, it is used to target whole organizations for espionage purposes, Brodie said. And as such, the impact of a spyphone attack on an organization can be "extremely high," he added.
Most spyphones are used for recording confidential phone calls and board meetings, tracking locations, extracting call logs as well as text messages and voice memos, and snooping on corporate emails and application data, Brodie said.
Secure containers of MDM systems can be bypassed in order to install spyphone software. On Android devices this can be done by publishing a seemingly innocent application in an Android market. Once the victim has installed the app, the app refers to the malicious code, which is then downloaded, the researchers said. After this, the spyphone creates a hidden binary and uses it for privileged operations, such as reading mobile logs.