Mishaal:

Hello, and welcome to Android bys powered by Esper, the podcast that

Mishaal:

dives deep into the world of Android.

Mishaal:

I'm Michelle Ramon.

Mishaal:

And while I'd normally be joined by my co-host David Ruddock, he unfortunately

Mishaal:

couldn't make it to this one.

Mishaal:

Still.

Mishaal:

We've got a great topic and guest lined up on the show this week,

Mishaal:

we'll be talking about security, specifically mobile app security.

Mishaal:

So if you listen to our podcast before, you know, we've talked about Android

Mishaal:

security model, at least when it comes to applications, as well as our

Mishaal:

permissions work in the previous episode.

Mishaal:

But this time, we want to focus more specifically on how Google app

Mishaal:

developers and outside firms team up to protect you and your Android device.

Mishaal:

So today we've invited Brian Reed, chief mobility officer at now secure

Mishaal:

to talk about mobile app security.

Mishaal:

Welcome to the show,

Brian:

Brian.

Brian:

Thanks, Michelle.

Brian:

It's great to be here and part of your community.

Brian:

Thanks for having me.

Brian:

Thanks for joining us.

Brian:

So

Mishaal:

this is the topic that in my now seven years of covering Android, you know,

Mishaal:

I've kind of delved into the security side a bit here and there, even though, while

Mishaal:

it's been up in my primary focus, just covering the Android platform ecosystem,

Mishaal:

these security issues come up and tend to cover them pretty much every week.

Mishaal:

You'll hear from some mobile security threat firm that there's

Mishaal:

some new malware strain out in the wild, and that is wing havoc.

Mishaal:

And then when you dive into the details you discover, oh, they're mostly misusing

Mishaal:

some Android API or application some permission or they're tricking users

Mishaal:

into enabling some sensitive permiss.

Mishaal:

And so like, this is a topic that is ever pervasive in our lives, because

Mishaal:

you probably know people in your lives who could be tricked into enabling

Mishaal:

something they shouldn't have when songs something they shouldn't have.

Mishaal:

And even if you think that you wouldn't do that, there's a very high

Mishaal:

chance that you could be tricked to.

Mishaal:

No one is ever completely foolproof from fishing or any other malware attacks.

Mishaal:

There are many things you can do to prevent yourself from

Mishaal:

being taken advantage of.

Mishaal:

But on the ecosystem side, there are also many things that Android

Mishaal:

does and that Google does and that outside firms can do to proactively

Mishaal:

protect you from harming yourself.

Mishaal:

So just so we're all on the same page, I kind of wanna just touch upon

Mishaal:

the background of Android security model and how Android actually

Mishaal:

protects you at a platform level.

Mishaal:

So we talked about this before, but every time you install

Mishaal:

an app, it comes an APK file.

Mishaal:

And within that APK file.

Mishaal:

There's all the assets, the code, the resources, et cetera, but there's also

Mishaal:

a digital signature that is generated whenever the developer signs a package.

Mishaal:

And whenever that app installs on your device, it's given a unique package name.

Mishaal:

And whenever you try to install an app that has a package name matching an

Mishaal:

existing app, it installed on the device.

Mishaal:

If that signature doesn't match the signature, that was with the previous.

Mishaal:

Then Android will object the installation.

Mishaal:

And because it's assumed that the signing key, the developer used to sign that

Mishaal:

app is generally kept somewhere safe and secure within their own repository on

Mishaal:

their computer, or upload it to Google.

Mishaal:

Then you can assume that some third party didn't just modify

Mishaal:

the app and then upload it.

Mishaal:

And then you installed it onto your device.

Mishaal:

So that's how Android generally secures updating applications.

Mishaal:

The one challenge with that is while it ensures that some outside developer

Mishaal:

didn't modify and push an app onto your device, it doesn't guarantee that the

Mishaal:

update hasn't been tampered with hasn't had in any malicious or potentially

Mishaal:

harmful code within the update.

Mishaal:

Like it could still be signed by the original developer, but how do you.

Mishaal:

If that update is still safe to use.

Mishaal:

And that's generally where firms like now secure come in.

Mishaal:

So I wanted to ask you, Brian, can you tell us a bit about the company?

Mishaal:

Sure.

Brian:

So now secure actually got started as a forensics company in 2008 and 2009.

Brian:

So the birth of Android that was around the same time as iOS.

Brian:

Our founder got interested in these cool little devices that seemed to

Brian:

have a whole lot of computing power and a lot of forensic data on him.

Brian:

And while he wasn't a forensic specialist, he actually became the world's expert

Brian:

in mobile forensics and ultimately build a business that is now secure today.

Brian:

We're kind of an all in one solution provider we have for

Brian:

mobile application securities.

Brian:

So we have testing tools, developing tools, pen testing

Brian:

services, open source tools.

Brian:

Training all of those kinds of things and partner with lots of organizations

Brian:

to make sure they're able to deliver those secure applications on whatever

Brian:

mobile operating system they want.

Brian:

So our roots are in Android, cuz that's really where he started and we

Brian:

continue to do a lot with Google and the entire ecosystem community today.

Mishaal:

Thanks Brian.

Mishaal:

And just to follow up on the Android aspect, one other thing that Android

Mishaal:

does at the platform level to protect you is that it has a very secure

Mishaal:

model of protecting applications from interacting with other applications.

Mishaal:

So you may have heard the term sandbox before.

Mishaal:

So whenever you install an app on Android, every app that has a unique

Mishaal:

package name, you know, every app has to have a unique package name.

Mishaal:

You can't have two apps with the same package name solved on a.

Mishaal:

So what happens is that that package is assigned a, a unique identifier.

Mishaal:

And when you run that app, Android runs it in a container

Mishaal:

and it's called the process.

Mishaal:

And then that identifier is called the P I D for that process.

Mishaal:

So by putting processes in containers, Android ensures

Mishaal:

that apps can only interact with other apps through a well-defined

Mishaal:

process called the binder IPC.

Mishaal:

So this way apps can only interact and only execute only like send a

Mishaal:

request to get data from another app.

Mishaal:

Through well defined permissions through well defined, intense and whatnot.

Mishaal:

So like you can't just have one app poking around the data of another app

Mishaal:

without break the sandbox, which is just not something that is very easily

Mishaal:

achievable without some very serious exploit in the Android platform.

Mishaal:

I wanted to ask you, Brian, how does this in your experience,

Mishaal:

how does Android security model compare to other operating systems?

Mishaal:

Would you say it's more or less secure?

Brian:

Yeah, that's always a loaded question.

Brian:

What I would say is that the Linux kernel underneath the Android in and

Brian:

of itself with its advanced security capabilities, gives it a strength.

Brian:

Apple has a more closed system on iOS, just in terms of how they operate.

Brian:

Uh, the sandboxing model is very strong.

Brian:

You know, the containerization of applications, the

Brian:

control of the IPC channel.

Brian:

All of those things are good strengths for Android.

Brian:

What's been really interesting to watch is that Android kind of was very heavy.

Brian:

I've been around this since Blackberry, just to be my background.

Brian:

I was with the original mobile security company called Blackberry.

Brian:

So I've seen a lot over the years and Blackberry was completely locked down

Brian:

and completely impossible to innovate.

Brian:

Just about it all, but it was really secure, right?

Brian:

And that's an example of a niche user experience with high security,

Brian:

but it was really inflexible when you wanted to write applications.

Brian:

The Android world kind of has two communities.

Brian:

You have the, I just wanna get stuff done.

Brian:

And then you have kind of the fanboy world I wanna customize

Brian:

and do really interesting things and, you know, so on and so forth,

Brian:

which leads to rooting and more customizations in the operating system.

Brian:

What has been really interesting to watch is that Android has become incredibly.

Brian:

If you look at the number of CVEs and cess listed for Android operating system

Brian:

or for device hardware for at least the tier one manufacturers, they have gone

Brian:

down as a rate over time, apple hasn't.

Brian:

Now apple may have been a little bit ahead.

Brian:

So there sort of is this, it depends.

Brian:

On who your hardware manufacturer is, how they are properly or improperly

Brian:

using the operating system and the licensing that they're doing around the

Brian:

play store and the tooling around that.

Brian:

But Android today is a very safe environment.

Brian:

And so I live in a blended world.

Brian:

So I have yes, one of everything because I'm in a mobile business.

Brian:

I have no qualms about saying which device or which operating system is better.

Brian:

Android and iOS are both better than windows, frankly.

Brian:

And so from that perspective, there's lots of different places we can go

Brian:

in terms of talking about, well, how do I make sure I'm safe and secure?

Brian:

And how do I make sure I do the right things?

Brian:

You mentioned

Mishaal:

something that I wanna kind of wanted to follow up on power users.

Mishaal:

You know, there are people who like the brute and tinker their devices.

Mishaal:

That's something that wasn't really possible with the older,

Mishaal:

more lockdown operating systems and current ones like iOS.

Mishaal:

So on Android, you are allowed.

Mishaal:

Side load applications.

Mishaal:

This term side loading.

Mishaal:

Isn't really much of a thing in the windows world, but it is

Mishaal:

something that exists in Android.

Mishaal:

And in order to side load, an application from outside of the official

Mishaal:

Google play store, you have to opt in, you have to enable permission.

Mishaal:

You have to do it on a per application basis.

Mishaal:

And there are also other security features that kind of irk power users.

Mishaal:

And I wanted to ask you your thoughts first on side loading.

Mishaal:

Like how does Google balance.

Mishaal:

Ability to allow users to side load applications with actually protecting

Mishaal:

them from installing something that's potentially untrusted.

Brian:

Yeah.

Brian:

I think there's kind of two ways to look at it.

Brian:

So I'm gonna take a macro view and then kind of a micro view.

Brian:

So the macro view is there are three or 4 billion users of Android, and

Brian:

that means everybody of every kind everywhere in the world, trying

Brian:

to do everything you can imagine.

Brian:

Right.

Brian:

And so there's lots of different segments of people that wanna

Brian:

use it in certain behavior.

Brian:

I do a lot of work with companies that use lockdown, Android tablets that are

Brian:

purpose designed for a specific use.

Brian:

They may have one application on them.

Brian:

I do work in automotives.

Brian:

I do work in healthcare, right?

Brian:

And so there's that class financial services where regulatory matters control

Brian:

matters, sensitive data matters you as a patient, don't want that data lost.

Brian:

If it's your car, you don't want that car broken into.

Brian:

Right.

Brian:

So there's that category.

Brian:

And then you kind of move into the more general maybe business user.

Brian:

Then you move into the more generalized consumer and then you move into the

Brian:

tinkerer category, like the fanboy and you know, and what I think

Brian:

Google's done a pretty good job of is trying to balance all of them, right.

Brian:

From that perspective.

Brian:

And so they've set up the guardrails.

Brian:

They've continued to improve the guardrails and gates to

Brian:

make it hard to be malicious.

Brian:

So you've got the containerized model.

Brian:

We just talked about side loading to me is an enabler for the category

Brian:

of people who want it, but most people should stay away from it.

Brian:

If you were to ask me how do regular people, consumers, not more technical,

Brian:

advanced customizer, stay safe.

Brian:

Don't side.

Brian:

Because Google play with play protect data, safety labels, and all of the system

Brian:

services that are built into the premium level are designed to keep you safe.

Brian:

And it's really easy to stay safe when you're leveraging those things.

Brian:

Side loading is one of the top malware paths.

Brian:

The other biggest breach vector actually is SMS fishing, and that's not Google

Brian:

or apple or anybody else's fault.

Brian:

That's the nature of the way SMS behaves.

Brian:

And that's a whole different security conversation.

Brian:

And the fact that people click on that stuff just in the same way,

Brian:

they sometimes click on spam email.

Brian:

Right.

Brian:

So side loading, isn't a bad thing, but side loading can get you in trouble.

Brian:

So you really should focus on brand name apps from brand name companies,

Brian:

you know, that have attestation in them with data safety program.

Brian:

That have four or more stars have millions of downloads, right?

Brian:

That's just the collective being safe, doing the smart thing, which

Brian:

is probably 80% of the world really.

Mishaal:

Right.

Mishaal:

I kind of like in side loading to deciding where to purchase something online.

Mishaal:

So if you're a side loader, you're kind of bypassing all the.

Mishaal:

Extra scrutiny that is placed on those applications by Google play and by

Mishaal:

play protect and all the stuff that's that developers have to go through

Mishaal:

to even get their apps on there.

Mishaal:

So like if you were to shop online, sure.

Mishaal:

You could go to all express.

Mishaal:

You could find literally anything you want at any time, but you're

Mishaal:

kind of putting yourself at risk by, you know, are you actually gonna

Mishaal:

get what you're trying to order?

Mishaal:

Is the seller actually legitimate is the product actually as described.

Mishaal:

Or could you just do the easy thing and go to like Amazon, you know?

Mishaal:

Sure.

Mishaal:

There are going to be some fakes.

Mishaal:

There are going to pieces of product issues, but generally those are

Mishaal:

more vetted because there's more barriers to entry to get on there.

Brian:

Right.

Brian:

You know, a lot of this is risk and reward for the bad guys.

Brian:

Right?

Brian:

So those barriers of entry, the friction that's put in the system make it harder

Brian:

for the people who wanna be malicious to behave malicious and the cost of being M.

Brian:

Becomes so high, it's not worth it.

Brian:

So from that perspective, take advantage of everything.

Brian:

You can buy a first class device from a first class vendor, make sure they're

Brian:

using they're licensing, Google correctly, and leveraging that technology and so

Brian:

on and so forth and you can be safe.

Brian:

And when we look at what Google has done for the two primary safety systems, we

Brian:

have the play protect side of the house.

Brian:

We have the data safety label side of the house and data safety labels just

Brian:

became mandatory in the last week.

Brian:

And so between those two things, if I can play protect is basically

Brian:

Google's giant malware engine.

Brian:

Google is continuously scanning for malware.

Brian:

Google has a lot of partners that are in security and endpoint management that are

Brian:

contributing to the malware signature.

Brian:

While you sometimes see it.

Brian:

And I'm not saying they're in any it's way better now than it used to be.

Brian:

And that database allow our signatures and the sophistication of the testing

Brian:

between Google and Google's partners continues to get better and better and

Brian:

better take advantage of play protect.

Brian:

You can run it on your own device.

Brian:

It's being scanned when it's going into the app store.

Brian:

If you find something reported and kind of help the community, the data

Brian:

safety label is really interesting.

Brian:

So I'll show my age.

Brian:

I remember when my parents would only buy electronics if they had the

Brian:

underwriter's laboratory safety label on it, which meant some third party

Brian:

company tested that piece of electronics.

Brian:

So it wouldn't like burn you or blow up your house or, you

Brian:

know, something else like that.

Brian:

And for the first time, anywhere in software that I have ever seen, Google's

Brian:

actually added labeling that this thing's.

Brian:

It's called a data safety label.

Brian:

And so one half of a label is the software developer is going to attest and say,

Brian:

here is what my app does with your data.

Brian:

I transmit it.

Brian:

I collect it.

Brian:

I send it.

Brian:

What have you, the other half is you can get an independent security verification

Brian:

done by an accredited third party.

Brian:

And that accredited third party now secures one of them will actually

Brian:

test it sufficiently to say, yeah, this app is safe based on

Brian:

this industry standard benchmark.

Brian:

That's like a good housekeeping seal of approval or underwriter's

Brian:

lab label on it now.

Brian:

So now with play protect, I'm protecting myself from malware

Brian:

with data safety labels.

Brian:

I'm also ensuring that the app manufacturer is doing the right thing.

Brian:

And that's really great for users.

Brian:

So

Mishaal:

just to take a step back, because on this show, we love to

Mishaal:

talk about a O S P and GMs, and try to differentiate between them.

Mishaal:

Google play protect, as Brian had mentioned is part

Mishaal:

of Google mobile services.

Mishaal:

So it's something that is available on devices with GMs, Android.

Mishaal:

So, if you were to compile a S P from Google ski repositories, you would

Mishaal:

not have play protect available to you because it is part of, I believe Google

Mishaal:

play store app itself, or Google play services, either one of those two.

Mishaal:

And as Brian mentioned, it is a massive database of malware signatures.

Mishaal:

And I kind of wanted to talk about now, like I wanted to ask you how exactly.

Mishaal:

Is that malware signature database actually built.

Mishaal:

How does Google go out and decide to add something to its database?

Mishaal:

So for the two who looked up anything related to this before you might have

Mishaal:

heard terms like static and dynamic analysis, can you walk us through what

Brian:

those mean?

Brian:

Sure.

Brian:

So there is something called the app defense Alliance.

Brian:

So I'm just gonna introduce the, how does the data get collected?

Brian:

So the app defense Alliance was created.

Brian:

Five six years ago.

Brian:

And it's a group of folks who do malware.

Brian:

They do endpoint management, they do antivirus a lot of the subjects

Brian:

you might expect in this world.

Brian:

And so Google said, Hey, we wanna crowdsource this stuff.

Brian:

We've got a whole bunch.

Brian:

We know you have more.

Brian:

So let's start collecting them.

Brian:

So through all of the different vendors who participate in that, when

Brian:

they find something, they submit it through a special channel to Google.

Brian:

Google adds it to their database, verifies that the giant database gets bigger.

Brian:

And it's because there's multiple vendors scanning billions of device.

Brian:

You get a pretty good signature database as a result of that.

Brian:

Now, what we're all doing under the hood is we're basically doing

Brian:

some combination of static and dynamic analysis or SAST and DAS.

Brian:

And so SAST is basically scanning code either the source code or binary image

Brian:

of the app to statically identify coding failures in the application.

Brian:

So with SAST, you might find things like say hard coded secrets embedded

Brian:

in the application or debugging code that made it into production

Brian:

in the app store submission or hard coded URLs or stuff like that.

Brian:

Those are vulnerabilities.

Brian:

You could.

Brian:

You can also find malicious behavior, like, Hey, it's scooping up this data

Brian:

and transmitting it to this IP address.

Brian:

And then dat, which is dynamic analysis is actually running the app.

Brian:

Most of us who participate in the program have some sort of dynamic

Brian:

analysis, which we observe the app running on a real device, whether it's

Brian:

in a lab or it's on some customer's device that has an agent running on it.

Brian:

And we see the malicious behavior, we capture it.

Brian:

So dynamic finds things like permissions, escalation,

Brian:

because something changes over.

Brian:

It finds transmission of sensitive data that maybe shouldn't be there.

Brian:

Is that data properly encrypted?

Brian:

Does it go to a bad end point?

Brian:

That's a known malware harvester endpoint from the endpoint databases on the.

Brian:

Things like that.

Brian:

So what's interesting about it is the collective is kinda looking for

Brian:

malware through bad behaviors, but also looking for vulnerabilities.

Brian:

Some of the more recent issues we found in the market weren't actually malware.

Brian:

They were vulnerable commercial applications used by millions of

Brian:

people where the bad guys figured out how to exploit weakness in them.

Brian:

There was a security weakness that their developers had introduced to.

Brian:

So that's a little bit about how that works.

Brian:

Now, the app defense Alliance recently added the MAs specification,

Brian:

which is that independent security verification strategy.

Brian:

So this is how to use SAS and dat to analyze the app for vulnerabilities that

Brian:

could be exploited work with the vendor to fix them, and then give them that good

Brian:

housekeeping label of approval, which is the independent security review stamp.

Brian:

So that when you go their data safety label, In the Google play store.

Brian:

You see, it says independent security review has been completed

Brian:

by an attested third party.

Brian:

This is deep save for use in these categories.

Brian:

And now you have that attestation, which is great from the third party.

Brian:

So you mentioned

Mishaal:

before that, you know, you typically look at either the source

Mishaal:

code or the compiled code of an application, and I'm guessing like 99%

Mishaal:

of the time you don't have access to the source code of the application.

Mishaal:

You're looking for most of the time, you're looking at the binary, the

Mishaal:

compiled binary, and you'd have to use some kind of de compilation.

Mishaal:

Or some kind of analyzer to analyze behavior while it's on device.

Mishaal:

Can you tell us about like some of the tools that you might use?

Mishaal:

Are they like all inhouse?

Mishaal:

We use any

Brian:

commercial for those who are into reversing, you may have heard of Frida

Brian:

and rod Aari are the top two reversing disassembly tools in the market.

Brian:

Frida and red were created by researchers on our now secure.

Brian:

And pancake are their handles.

Brian:

And so those are used by a lot of security researchers.

Brian:

They're also used in some other tooling by other folks, and

Brian:

those are embedded in our tools.

Brian:

So we can reverse and disassemble an iOS or an Android app, whether it's DRM

Brian:

or not with it, you can break most of the obfuscation tools and hook the app.

Brian:

Even the ones that have anti Frita capabilities in it, it's

Brian:

like a cat and mouse game.

Brian:

They try to block and then you find new ways around it.

Brian:

But in reversing it, you can get down to bite code or Java code or some

Brian:

intermediate language that you can then scan to get a sense from a static

Brian:

perspective about what's going on.

Brian:

What I will say is that freedom and Dari are great tools.

Brian:

Have a look at them.

Brian:

If you really wanna kinda learn your way through what this world looks.

Brian:

There's some free training on how to use freedom, Ary and participate in the

Brian:

community on our academy.now secure.com or you can just find them on the internet.

Brian:

They're great tools.

Brian:

There's some other tools out there.

Brian:

There are various other tools that might go into kit.

Brian:

You might use perp suite to do network sniffing and some things like that

Brian:

when you kind of build out a tool kit.

Brian:

So we leverage those and other advance.

Brian:

IP that we built.

Brian:

So do the other vendors have all built something that involves some combination

Brian:

of static and dynamic analysis?

Mishaal:

Speaking of static and dynamic analysis, there is one thing

Mishaal:

I wanted to follow up with you on.

Mishaal:

And it's something that I think requires some clarification for

Mishaal:

listeners who may not be familiar.

Mishaal:

And it's that why is dynamic analysis actually important to do?

Mishaal:

Why do you have to test on a real device versus why can't you just statically

Mishaal:

analyze the code and look for some, say potentially malicious thing happening.

Brian:

We talked earlier about containers in IPC and data transmission between

Brian:

say two containers or two processes.

Brian:

Right?

Brian:

Well, that's why you need dynamic analysis, static analysis.

Brian:

We'll never see if data was improperly transmitted to the IPC

Brian:

found from one process to another.

Brian:

You need dynamic analysis to understand what's being written to the device in

Brian:

log files, or being stored on the device.

Brian:

We find key material, forensic data.

Brian:

IP.

Brian:

We actually found a, uh, coupon code generator.

Brian:

The actual IP generation of that was spewed out and log

Brian:

files under error conditions.

Brian:

Now static source code scanning.

Brian:

Won't find that you only find that when you run it dynamically.

Brian:

So it's a general rule.

Brian:

Dynamic is about testing the crypto.

Brian:

Is the crypto working correctly.

Brian:

And then it's testing storage, which is what is being written

Brian:

and what can I forensically find?

Brian:

And what's being written into my own address, space, my own storage,

Brian:

other storage file system log files, and then network transmission.

Brian:

So what is getting transmitted over the air?

Brian:

Is it intercept?

Brian:

Am I doing proper certificate pinning?

Brian:

Am I using the TLS channel?

Brian:

Correct.

Brian:

What endpoints am I talking to?

Brian:

Are those endpoints safe?

Brian:

There's a whole bunch of things you can test around authentication

Brian:

and authorization that you'll pick out through testing dynamically.

Brian:

So I'll give you wild data.

Brian:

We scan all the apps in the app store.

Brian:

So there are 6 million app and Google play store apps.

Brian:

Approximately we scan almost all of them on a regular basis.

Brian:

And what I can tell you is that 80% of them have security vulnerability.

Brian:

The good news is 20%.

Brian:

Don't have really bad security vulnerabilities in 'em, but 80% do.

Brian:

And that number's been the same for five or six years since

Brian:

we've been benchmarking them.

Brian:

What's also interesting is that when you carve into that static

Brian:

versus dynamic, almost everything we're finding is dynamically found.

Brian:

It's really hard to do dynamic analysis and dynamic testing

Brian:

at scale in a development.

Brian:

So a lot of 'em just don't do it.

Brian:

So they run a static analyzer until we find a very low proportion

Brian:

of static vulnerabilities in production apps, because most

Brian:

people are using static tools.

Brian:

Dynamic is really hard to do.

Brian:

It's expensive if you pay somebody to do it, not a lot of people do it.

Brian:

And that's why we find that's where most of the vulnerabilities

Brian:

are in storage in crypto, in network and backend APIs by far.

Mishaal:

Yeah, I'm not surprised because you know, they want to avoid detection.

Mishaal:

So if you just have all your malicious code statically, it's in the application

Mishaal:

itself and it's easy to find, then there's nothing in it for them.

Mishaal:

It's, it's gonna be detected and, you know, added to the database

Mishaal:

and then detected in the future again and over and over again.

Mishaal:

And I've heard stories of like these malicious applications

Mishaal:

that behave differently or.

Mishaal:

Different parts of code differently, depending on your location or

Mishaal:

what device you're running or a combination of those factors.

Mishaal:

So like you need to be able to test, and that

Brian:

can be hard to find exactly.

Brian:

It can be hard to find two dynamics.

Brian:

So, uh, screw an ator.

Brian:

You're not necessarily gonna see all the IC conversation to the ator.

Brian:

You're not necessarily gonna see the interaction with the OS layer all the

Brian:

way down through the hardware or the wifi chip before the carrier chip.

Brian:

Right.

Brian:

So what we have found.

Brian:

For a number of clients who have done emulator based

Brian:

testing, they bring it to us.

Brian:

We find stuff.

Brian:

I mean, you can't truly emulate the environment to get full coverage.

Brian:

And again, sometimes it's malware.

Brian:

A lot of it's just vulnerabilities.

Brian:

I mean, last year, Walgreens slack, they had vulnerabilities that were exploited.

Brian:

People stole prescription data to the Walgreens mobile app

Brian:

because of a vulnerability in it.

Brian:

Slack had a zero day.

Brian:

So even what you would think would be really great companies.

Brian:

They can make mistakes, their developers can make mistakes, it might be code.

Brian:

They write party libraries that put in it.

Brian:

But what we're actually seeing is the nation state actors and

Brian:

the criminals are finding these zero days in these applications.

Brian:

And they're exploiting them as bad or worse as they are the malware,

Brian:

the price of building malware and getting it into the app store

Brian:

is getting higher and higher.

Brian:

Cuz it's harder and harder cuz of everything we just talked about today.

Brian:

But you know what, if I can find a zero.

Brian:

In slack and go steal a bunch of corporate data or, you know, shopping cart X and

Brian:

there's numerous applications like that.

Brian:

Well, then I can harvest information off of that and use that, you know, there, uh,

Brian:

if I can diverge for a second, a couple years ago, British airway was preached.

Brian:

They found a weakness in the way British airways mobile app

Brian:

was talking to its back backend.

Brian:

So they learned how to attack the backend by the mobile app.

Brian:

Then they attacked the backend 380,000 records were stolen, including passport

Brian:

information, travel history, credit cards.

Brian:

They were fine.

Brian:

Bridge share was fined 158 million pounds by the EU as the first GDPR.

Brian:

Fine.

Brian:

Now all of that had to do with the fact of a poorly written mobile application.

Brian:

That was exploitable.

Brian:

There was no malware involved.

Brian:

It was just straight up good scientific research that discovered it.

Brian:

And then they used it to go after the back end.

Brian:

And that's what we need to think about is mobile's just part of the overall chain of

Brian:

all the it systems that some company has.

Brian:

Then you make sure the mobile app and what it talks to is secure, whether it's

Brian:

malware or whether it's a commercial app.

Brian:

So this

Mishaal:

whole time we've been talking mostly about malware

Mishaal:

and like malicious applications.

Mishaal:

But if you read online about like what Google pay, protect actually

Mishaal:

identifies it, doesn't usually.

Mishaal:

Positively identify actual malicious behavior.

Mishaal:

It identifies potentially harmful applications.

Mishaal:

Can you describe what exactly qualifies to potentially harmful application?

Brian:

Yeah, so potentially harmful application is the app is collecting and

Brian:

maybe transmitting over the error data.

Brian:

It shouldn't be the app is trying to execute system level commands.

Brian:

It shouldn't have rights to execute.

Brian:

It could be spyware.

Brian:

It could be fishing.

Brian:

You know, more common things.

Brian:

We know it could be ransomware in terms of its behavior.

Brian:

I haven't heard a lot of production ransomware on mobile, but we've seen some

Brian:

academic experiments along those lines.

Brian:

Uh, there's a lot of system logging going on, data harvesting going on.

Brian:

And so what kind of comes back is, Hey, this has some unusual beha,

Brian:

it's a camera app and it's great.

Brian:

The entire contact database and shipped it to the cloud.

Brian:

Right.

Brian:

And that's gonna get a flag.

Brian:

If it's picked up, right?

Brian:

Cause it doesn't make sense that someone who's taking photos is scraping the

Brian:

entire address book off the device or the history of all the wifi nodes that this

Brian:

device ever connected to with the S S I D and whatever passwords hashed or not.

Brian:

Right.

Brian:

So that's part of what it's looking for is it doesn't make sense that this app

Brian:

would be doing that thing, whether it's obviously malicious or possibly malicious.

Mishaal:

Right.

Mishaal:

And another thing is that potentially dodgy and sketchy or malicious behavior,

Mishaal:

isn't only limited to apps that you can install from the Google play store

Mishaal:

or outside of the Google play store.

Mishaal:

It can also be happening within pre-installed applications, which Google

Mishaal:

refers to as mobile bundle applications.

Mishaal:

This isn't really talked about much from what I can see, mostly because it's

Mishaal:

like a conversation Google has with O.

Mishaal:

They have like strict requirements about what these mobile bundle applications can.

Mishaal:

And can't do.

Mishaal:

I wanted to ask you, what do you know about the security risks

Mishaal:

with mobile bundle applications?

Mishaal:

I

Brian:

can't speak for all the carriers.

Brian:

I can't speak for all Google.

Brian:

I can't speak for all the device manufacturers.

Brian:

You need to talk to each of them.

Brian:

What I would say is that most manufacturers and carriers are

Brian:

working hard to do it the right way.

Brian:

So for example, we work with at and T and Google.

Brian:

And so the things that at and T sells are tested and certified by us.

Brian:

And we work with a lot of the other carriers.

Brian:

There are other vendors like us that work with the carriers

Brian:

to try to do the right thing.

Brian:

Google has some attestation and testing requirements that the device manufacturers

Brian:

and carriers must submit, especially if they're part of the Google play ecosystem.

Brian:

And if they're, you know, full GMs licensees.

Brian:

And so what they're trying to do is enable lots of people to grow

Brian:

vibrant businesses and enable.

Brian:

This very broad ecosystem that we have today that has so many users and

Brian:

so many kinds of applications on it.

Brian:

The trick is saying, Hey, here's a set of standards.

Brian:

We want you to align with.

Brian:

And we are either gonna test you or have used an independent third

Brian:

party or self attest that you are doing the right things here and here.

Brian:

And by and large, everybody's got the right idea and

Brian:

trying to do the right thing.

Brian:

You don't hear so much about really bad stuff happening.

Brian:

I will say that supply chain attacks like we've been hearing in the market

Brian:

overall on lots of different things, whether you're the colonial pipeline

Brian:

or what have you, those are out there, and those are hitting mobile, just like

Brian:

they're hitting other corporate systems.

Brian:

And so to no fault of their own developers may wind up with an

Brian:

exploitable or malicious app because of some third party library they're

Brian:

using or system service they're using that suddenly changed because

Brian:

a bad actor got in there and made a.

Brian:

So that will be something I think we're gonna live on in the mobile world,

Brian:

the web world, the network world, and every other world, until we really get

Brian:

supply chain management under control and, and more safe use of components.

Brian:

All right.

Mishaal:

So on that front, what can app developers do to protect their

Mishaal:

applications from any malicious exploits?

Brian:

You know, I think there's a handful of things.

Brian:

So when we work with organizations who are application developers,

Brian:

whether they're large or small, we give them a set of recommendations.

Brian:

First one is make sure you've got some basic security

Brian:

training for your developers.

Brian:

Make sure they understand the fundamentals.

Brian:

Make sure we've got like a guide.

Brian:

That's like here's 10 APIs.

Brian:

You should make sure you use and how to configure them properly.

Brian:

And then a guide on permissioning.

Brian:

A lot of it has to do with just don't collect and store it.

Brian:

If you don't need it, then there are things about how to handle storage,

Brian:

how to handle crypto, how to handle network, how to handle backend API.

Brian:

They're not very difficult.

Brian:

In many instances, it's they didn't know there was a flag they should set.

Brian:

They didn't know there was a configuration option they should be using.

Brian:

They didn't know there was an ordering of operations.

Brian:

They should be using, make sure devs doing the right thing.

Brian:

The second thing is, make sure that there are product requirements that.

Brian:

What kind of security, this thing should have, right?

Brian:

If I'm building a banking app, there should be fundamental requirements

Brian:

that say I'm regulated by the industry.

Brian:

Here's a set of requirements.

Brian:

Well, if I'm not building a banking app, we've been building something else.

Brian:

This requirements may not clear, but just like you're saying, you want a

Brian:

really cool augmented reality experience, make sure that you're protecting

Brian:

using multifactor authentication and protecting my Phi while you do it.

Brian:

Right test it.

Brian:

Whether you using SAS in the pipeline or SA and da in the pipeline, there

Brian:

are open source and paid commercial tools that are cheap and easy to use.

Brian:

They can run autonomously, they catch all the low hanging through.

Brian:

They make your life easier.

Brian:

What's really cool about a lot of the DAS tools including now secure.

Brian:

Now, is it also identifies app store blockers?

Brian:

So you may have a build version issue.

Brian:

You may have a third party SDK issue.

Brian:

You may have some other reason.

Brian:

Google may say, Nope, I'm not gonna accept this binary because you're

Brian:

not following one of my rules.

Brian:

You can catch that too.

Brian:

So that's not just security and privacy.

Brian:

That's finding those rules.

Brian:

And if you're super high end app, you're that embedded health app, that's

Brian:

maintaining my heartbeat to a cardiac monitor or you're my banking app or

Brian:

my financial account management app.

Brian:

You should be doing pen testing once in a while and have really smart

Brian:

experts, tear it down just to make sure there isn't something exploitable.

Brian:

So teach requirements, automate your testing everywhere you.

Brian:

Pen test the high risk stuff.

Brian:

Be serious enough that say, Hey, we wanna have a great user experience

Brian:

and millions or billions of downloads.

Brian:

And we just wanna make sure that people's data does what it's supposed to do.

Mishaal:

Security is essential, of course, for every application and developer

Mishaal:

should be top of mind, but it should be even more top of mind, especially

Mishaal:

if you're dealing with sensitive data.

Mishaal:

And as Brian mentioned, medical financial, you don't want to be slapped with, uh,

Mishaal:

billions of dollars in a lawsuit for mishandling or having some data breach.

Mishaal:

That you could have solved by protecting your application better.

Mishaal:

And if you are dealing with any mission critical application or you need to

Mishaal:

deploy mission critical applications onto fleets of dedicated devices, and

Mishaal:

you wanna make sure that the firmware it's running on and the data you

Mishaal:

depend on secured, come talk to us.

Mishaal:

That SPER we specialize in helping companies manage fleets of dedicated

Mishaal:

devices, including deploying and keeping your apps updated on them.

Mishaal:

If you're trying to deploy a kiosk or point of sale terminal,

Mishaal:

you need to lock it down.

Mishaal:

So potentially malicious applications, can't be side loaded onto.

Mishaal:

That's especially important because most of the time, these dedicated

Mishaal:

devices won't have GMs on them.

Mishaal:

So you can't count on Google, play, protect for protection.

Mishaal:

And if you're worried about any mobile bundle applications that are pre-installed

Mishaal:

on the off the shelf hardware that you've picked up for your dedicated device

Mishaal:

fleet, you'll need to look at deploying your own firmware based on AOS P.

Mishaal:

We can also help with that.

Mishaal:

Check us out@esper.io and Brian, thanks for joining us on

Mishaal:

this episode of Android bites.

Mishaal:

Is there anything you'd like to close us off with?

Mishaal:

Can you like work?

Mishaal:

Can people find you online and work?

Mishaal:

Can people work with now secure on securing their application?

Brian:

Yeah, so you, you can find us online.

Brian:

There's a bunch of great resources.

Brian:

I'm gonna talk out real quick.

Brian:

So now secure.com/nasa, M a S a that will help you understand the app defense

Brian:

Alliance and the independent security.

Brian:

If you're a user look to see that the apps you're choosing have

Brian:

an independent security review.

Brian:

If you're a developer, get your independent security review, we

Brian:

can help you expedite that process.

Brian:

That's cheap and easy to go do.

Brian:

If you want some training@cat.now secure.com is a free training environment.

Brian:

It's for development, QA, DevOps, and security teams to learn everything they

Brian:

needed to know about building testing and running secure apps in production.

Brian:

Again, that's a free resource.

Brian:

You can find me all over the place.

Brian:

I'm actually known as read on the run is my handle.

Brian:

So you can find me on, you know, LinkedIn, Twitter, and other kinds of fun places.

Brian:

Speaking to events of all kinds.

Brian:

The last thing I'll give you is O O is growing dramatically.

Brian:

The O OS mobile project is advancing.

Brian:

There's some really great things coming from O O this fall.

Brian:

And until later this year with the evolution of the

Brian:

mobile app security project.

Brian:

So if you're into the community activities, come join us at OAS, spend the

Brian:

mobile project and get involved because there's some really great stuff going on.

Brian:

It's a place you can learn a place you can contribute.

Brian:

And really be part of a community.

Brian:

Who's trying to do the right thing for mobile application

Mishaal:

security.

Mishaal:

And just to clarify, what is O OSP?

Mishaal:

Exactly?

Mishaal:

What does it stand for?

Mishaal:

Oh,

Brian:

O OSP is the open web application security project or program.

Brian:

It's an independent vendor, agnostic community of, uh, security professionals.

Brian:

Who've been building standards and specifications for how to build secure web

Brian:

apps, mobile apps, how to secure your APIs on the back end and things of that nature.

Brian:

So O O for those who are in the security.

Brian:

Are generally familiar with it as a non-for-profit that drives that

Brian:

O OSP has a number of initiatives going on in the development world.

Brian:

And what's really great about it is that Google has fully embraced O O

Brian:

so the app defense Alliance master certification program, which gets you

Brian:

that independent security verification actually is using the O OSP standard.

Brian:

And you're gonna see the O OSP standard in many other places.

Brian:

As a mechanism for a common industry standard for what security means, whether

Brian:

it's web mobile network, device or API.

Brian:

So there's some really great things going on at that

Mishaal:

standards body.

Mishaal:

All right.

Mishaal:

Thank you, Brian.

Mishaal:

And thank you everyone again for listening to another episode of Android bites.