Network World - A new report from a mobile security vendor details how the most popular smartphones, including the iPhone, are vulnerable to man-in-the-middle attacks, carried out via public Wi-Fi connections.
According to the report by SMobile Systems, smartphone users connecting to unencrypted Wi-Fi hotspots can be easily compromised by knowledgeable attackers using an array of existing tools. The authors of the study used those tools to intercept username/password combinations sent from several different smartphones
The tests used a laptop with software tools to intercept communications between smartphones connecting to a Wi-Fi access point, and then to bypass SSL. That information was then used to access a variety of e-mail accounts. The same information could be used to access an online banking account or other information. More detail on the attack is found in the full report.
Smobile tested the Nokia N95, HTC Tilt running Windows Mobile, HTC G1 running Android, and the iPhone 3GS with the latest firmware. In each case, the user would have had no idea that their information had been compromised.
Examples of the tools used are Arpspoof, which redirects packets from a target host on the LAN to the intended host on the same LAN, by forging Address Resolution Protocol replies to the target host; SSLStrip, to hijack HTTP traffic; Ettercap, a utility for sniffing, intercepting and logging; or Wireshark, a network protocol analyzer used as a packet sniffer. Another tool, webspy, lets the attacker sniff out and open any Web pages accessed by the victim.
"Utilizing this method, the attacker has effectively told the victim device to route all traffic through the attacker's machine [laptop], and the attacker machine then forwards the requests to the Wi-Fi hotspot." The attack computer captures all the traffic and can modify or kill active connections. With SSL bypassed, as soon as the victim accesses an e-mail or other account, the login credentials will appear in plain text on the attack computer.
The authors of the study warn smartphone users to "seek out and identify applications that provide adequate encryption technologies to protect confidential or private information." Applications for doing so exist, but are still rare, the authors note. The goal should be end-to-end encryption between the client application and the target server. Lacking that, users need to be aware that their information can be visible to a snooper.
For enterprises, the key issue is to treat smartphones with Wi-Fi as if they were corporate laptops with Wi-Fi. That means client security software, for firewall and antivirus.
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!