SlideShare a Scribd company logo
1 of 36
Download to read offline
Fake devices
Countering a hidden & growing threat
Introduction to Afilias
•  Afilias is an internet infrastructure company
•  Expertise in scalability, availability, security
•  Long-established device intelligence product in the Afilias portfolio
•  Repository of connected devices and their capabilities
•  Hundreds of top tier customers
•  Trillions of requests per month 
•  DeviceAssure is a new solution for verification of device authenticity
Problem overview
By the numbers
•  EU IPO report, 2017
•  €45.3 billion lost worldwide in 2015
•  13% of all legitimate sales
•  In the EU, €4.2 billion lost in 2015
•  8% of all legitimate sales
In the headlines
Widely Available
Pricing
•  Typically priced 10x less than genuine
device
•  Counterfeits always sold unlocked / SIM-
free
Channels
•  Direct sales from online stores
•  Local classified ad services
•  Marketplaces on large retail platforms
Impacts
Impacts
Subscribers
1.  Defrauded (if unwitting purchase)
2.  Safety hazard exposure
3.  Privacy risks
4.  Elevated exposure to further fraud
MNOs

1.  Duplicate IMEIs
2.  Reduced network data integrity
3.  Reduced cell capacity
4.  Increased power consumption
Device OEMs/brands

1.  Revenue loss - displaced sales
2.  Reputational damage
Impacts (contd.)
Enterprises & corporations
1.  Elevated exposure to cybersecurity
risks
2.  Potentially direct revenue loss
Environment
1.  Hazardous substances
2.  Elevated power consumption
Government
1.  Citizens exposed to fraud
2.  Excise revenue losses
3.  Breach of trade agreements
Characteristics
of Counterfeit Devices
Near-perfect physical replicas
•  Dimensions are millimetre-perfect
•  Fit & finish are excellent
•  Screens are (superficially) excellent
•  Packaging indistinguishable from genuine item
•  Accessories all present and functional
Cost savings made internally
cheaper cameras
lower capacity battery
absent NFC coils
underpowered SoC
poor antenna design
previous generation WiFi 
previous generation connectivity
lower spec screen
fake fingerprint sensor
Hidden extras in software
•  Heavily customised Android distributions skinned to look
correct for device
•  Old Android versions masquerading as more recent
releases
•  Key device characteristics deliberately misreported
•  Pre-installed malware is routine
•  Popular apps sometimes pre-installed, provenance
questionable
•  Alternative app stores are sometimes preconfigured…
with no user logins required
Unboxing
Security concerns
Malware
Malware appears to be part of business model
of counterfeiters
•  Many devices have pre-provisioned malware
•  Paid placement business model likely
•  Malware experienced:
•  Invasive adware, ADUPS, LovelyFont
•  Keyloggers
•  DoS/DDoS hosts
•  Ransomware
Alternative app stores, pre-installed apps
•  Counterfeit iPhones provisioned with well-
stocked alternative app store
•  Many counterfeit devices have popular apps
pre-installed
•  Unknown provenance
•  Unusual permissions required
App publishers
•  Counterfeit devices are a hostile platform
•  App makers can’t assume the environment is safe
•  Your user is vulnerable: keyloggers
•  Your backend systems are vulnerable: intercepted
requests
•  Your app ratings are threatened—counterfeit
phones are typically ~10x slower
User security
•  Insecure fingerprint readers (accept any touch)
•  Fake FaceID security—can be fooled with a photo
•  Old Android version
•  Unknown Android OS patch status
•  No security updates
•  Poor quality chargers and batteries
Solution overview
Smartphone layers
•  Smartphones can be thought of as 3
distinct layers
•  Hardware — CPU, GPU, screen, camera
•  Operating system — iOS, Android
•  Apps — web browser etc.
Identity claims
•  There are claims of identity at each layer
•  Apps: browser ID
•  Operating system: manufacturer & model
•  Hardware: TAC, MAC etc.
Deep hardware inspection
•  Modern phones have thousands of
properties & behaviours that can be
probed
•  Deep hardware inspection is quick &
doesn’t manifest to user
Known-good reference profiles
•  Reference data gathered globally and
updated daily
•  Precise details for every device type
•  DeviceAssure checks that the measured
properties are consistent with the claims
DeviceAssure components
•  Native app or web library
•  Properties fetched & sent to server for
analysis
•  Authenticity determination returned to
library or other destination
•  Can be surfaced to user …or not
app /
website
device details
result
result
back end service
Device

Assure
🏢
Results taxonomy
Device classifications - high level
AUTHENTIC
The device capabilities are consistent with the device identity claims.
The device has different identities but has at least one valid profile, and/or has an invalid
TAC.
“Designed to deceive”, infringes trademarks. The device capabilities do not match the
device claims.
NON-STANDARD
COUNTERFEIT
Additional classifications
Emulators
•  Typical hardware profile is a
server

Rooted devices
•  Identification of rooted device
•  Separate flag to supplement
device classification
Bots
•  Non-human traffic, specific
to web library

Proxies
•  Proxy masks actual device
profile (specific to web
library)
Use Cases
Example Use Case
Consumer Banking Protection
Scenario
End user installs retail banking app on their smartphone.
PROCESS
Validate device
authenticity
before capturing
user details.
GOAL
Protect consumer
and bank from
compromised
account
credentials.
ISSUE
Account is
compromised
when the device
is counterfeit.
OUTCOME
If the device is
compromised,
the app can exit
gracefully.
Example Use Case
Enterprise security assurance
Scenario
Employee uses home device in BYOD environment
PROCESS
Extend scope of
MDM/EMM to
include
authenticity
check.
GOAL
Protect enterprise
from malware
injection by
rogue device.
ISSUE
Existing EMM
solution does not
check device
authenticity.
OUTCOME
Improvement to
security posture.
Example Use Case
Warranty cost control
Scenario
End user experiencing dropped calls contacts operator helpline
PROCESS
Helpdesk directs
caller to web
page to test
device.

GOAL
Identify at the
outset whether
the root cause is
device
authenticity.
ISSUE
The end user is
using a non-
standard device.
OUTCOME
Quicker root
causing = faster
call resolution =
cost reduction.
Example Use Case
Duplicate IMEI resolution
Causes of duplicate IMEIs
• Laundered stolen devices
• Non-standard devices copying TACs
• IMEI modifications to unlock network
features
Managing duplicate IMEIs
• Capture IMSIs where TAC and hardware
don’t match*
• Measure scale and define policy
• Handle subscriber according to policy
Summing up
Non-authentic devices are here
•  Counterfeit devices are becoming easier to purchase and harder to spot
•  The devices are now perfectly usable
•  Like it or not, they are already here, hidden in plain sight
•  Three parallel trends increasing the threat:
•  Improved counterfeits
•  Improved distribution
•  More sophisticated malware
•  Counterfeits are here, the question is how you will respond to it
Contact us at
https://deviceassure.com

More Related Content

What's hot

Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFEpplester
 
Levitum Services Approach
Levitum Services ApproachLevitum Services Approach
Levitum Services ApproachLevitum
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAMAbhinaw Kumar
 
Buyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platformsBuyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platformsIBM Software India
 
331117584 1-1-understand-mobility-and-android.pptx
331117584 1-1-understand-mobility-and-android.pptx331117584 1-1-understand-mobility-and-android.pptx
331117584 1-1-understand-mobility-and-android.pptxAsyraf Zulhusni
 
Mobile computing fct
Mobile computing fctMobile computing fct
Mobile computing fctAneesh Zutshi
 

What's hot (11)

The Blackberry Experience
The Blackberry ExperienceThe Blackberry Experience
The Blackberry Experience
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFE
 
Levitum Services Approach
Levitum Services ApproachLevitum Services Approach
Levitum Services Approach
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Vodafone 360 and widgets
Vodafone 360 and widgetsVodafone 360 and widgets
Vodafone 360 and widgets
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
Buyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platformsBuyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platforms
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
331117584 1-1-understand-mobility-and-android.pptx
331117584 1-1-understand-mobility-and-android.pptx331117584 1-1-understand-mobility-and-android.pptx
331117584 1-1-understand-mobility-and-android.pptx
 
Mobile computing fct
Mobile computing fctMobile computing fct
Mobile computing fct
 

Similar to Fake Devices - Countering a Hidden and Growing Threat

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...eightbit
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 

Similar to Fake Devices - Countering a Hidden and Growing Threat (20)

Secure End User
Secure End UserSecure End User
Secure End User
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Call girls in Ahmedabad High profile
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (9)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

Fake Devices - Countering a Hidden and Growing Threat

  • 1. Fake devices Countering a hidden & growing threat
  • 2. Introduction to Afilias •  Afilias is an internet infrastructure company •  Expertise in scalability, availability, security •  Long-established device intelligence product in the Afilias portfolio •  Repository of connected devices and their capabilities •  Hundreds of top tier customers •  Trillions of requests per month •  DeviceAssure is a new solution for verification of device authenticity
  • 4. By the numbers •  EU IPO report, 2017 •  €45.3 billion lost worldwide in 2015 •  13% of all legitimate sales •  In the EU, €4.2 billion lost in 2015 •  8% of all legitimate sales
  • 6. Widely Available Pricing •  Typically priced 10x less than genuine device •  Counterfeits always sold unlocked / SIM- free Channels •  Direct sales from online stores •  Local classified ad services •  Marketplaces on large retail platforms
  • 8. Impacts Subscribers 1.  Defrauded (if unwitting purchase) 2.  Safety hazard exposure 3.  Privacy risks 4.  Elevated exposure to further fraud MNOs 1.  Duplicate IMEIs 2.  Reduced network data integrity 3.  Reduced cell capacity 4.  Increased power consumption Device OEMs/brands 1.  Revenue loss - displaced sales 2.  Reputational damage
  • 9. Impacts (contd.) Enterprises & corporations 1.  Elevated exposure to cybersecurity risks 2.  Potentially direct revenue loss Environment 1.  Hazardous substances 2.  Elevated power consumption Government 1.  Citizens exposed to fraud 2.  Excise revenue losses 3.  Breach of trade agreements
  • 11. Near-perfect physical replicas •  Dimensions are millimetre-perfect •  Fit & finish are excellent •  Screens are (superficially) excellent •  Packaging indistinguishable from genuine item •  Accessories all present and functional
  • 12. Cost savings made internally cheaper cameras lower capacity battery absent NFC coils underpowered SoC poor antenna design previous generation WiFi previous generation connectivity lower spec screen fake fingerprint sensor
  • 13. Hidden extras in software •  Heavily customised Android distributions skinned to look correct for device •  Old Android versions masquerading as more recent releases •  Key device characteristics deliberately misreported •  Pre-installed malware is routine •  Popular apps sometimes pre-installed, provenance questionable •  Alternative app stores are sometimes preconfigured… with no user logins required
  • 16. Malware Malware appears to be part of business model of counterfeiters •  Many devices have pre-provisioned malware •  Paid placement business model likely •  Malware experienced: •  Invasive adware, ADUPS, LovelyFont •  Keyloggers •  DoS/DDoS hosts •  Ransomware
  • 17. Alternative app stores, pre-installed apps •  Counterfeit iPhones provisioned with well- stocked alternative app store •  Many counterfeit devices have popular apps pre-installed •  Unknown provenance •  Unusual permissions required
  • 18. App publishers •  Counterfeit devices are a hostile platform •  App makers can’t assume the environment is safe •  Your user is vulnerable: keyloggers •  Your backend systems are vulnerable: intercepted requests •  Your app ratings are threatened—counterfeit phones are typically ~10x slower
  • 19. User security •  Insecure fingerprint readers (accept any touch) •  Fake FaceID security—can be fooled with a photo •  Old Android version •  Unknown Android OS patch status •  No security updates •  Poor quality chargers and batteries
  • 21. Smartphone layers •  Smartphones can be thought of as 3 distinct layers •  Hardware — CPU, GPU, screen, camera •  Operating system — iOS, Android •  Apps — web browser etc.
  • 22. Identity claims •  There are claims of identity at each layer •  Apps: browser ID •  Operating system: manufacturer & model •  Hardware: TAC, MAC etc.
  • 23. Deep hardware inspection •  Modern phones have thousands of properties & behaviours that can be probed •  Deep hardware inspection is quick & doesn’t manifest to user
  • 24. Known-good reference profiles •  Reference data gathered globally and updated daily •  Precise details for every device type •  DeviceAssure checks that the measured properties are consistent with the claims
  • 25. DeviceAssure components •  Native app or web library •  Properties fetched & sent to server for analysis •  Authenticity determination returned to library or other destination •  Can be surfaced to user …or not app / website device details result result back end service Device
 Assure 🏢
  • 27. Device classifications - high level AUTHENTIC The device capabilities are consistent with the device identity claims. The device has different identities but has at least one valid profile, and/or has an invalid TAC. “Designed to deceive”, infringes trademarks. The device capabilities do not match the device claims. NON-STANDARD COUNTERFEIT
  • 28. Additional classifications Emulators •  Typical hardware profile is a server Rooted devices •  Identification of rooted device •  Separate flag to supplement device classification Bots •  Non-human traffic, specific to web library Proxies •  Proxy masks actual device profile (specific to web library)
  • 30. Example Use Case Consumer Banking Protection Scenario End user installs retail banking app on their smartphone. PROCESS Validate device authenticity before capturing user details. GOAL Protect consumer and bank from compromised account credentials. ISSUE Account is compromised when the device is counterfeit. OUTCOME If the device is compromised, the app can exit gracefully.
  • 31. Example Use Case Enterprise security assurance Scenario Employee uses home device in BYOD environment PROCESS Extend scope of MDM/EMM to include authenticity check. GOAL Protect enterprise from malware injection by rogue device. ISSUE Existing EMM solution does not check device authenticity. OUTCOME Improvement to security posture.
  • 32. Example Use Case Warranty cost control Scenario End user experiencing dropped calls contacts operator helpline PROCESS Helpdesk directs caller to web page to test device. GOAL Identify at the outset whether the root cause is device authenticity. ISSUE The end user is using a non- standard device. OUTCOME Quicker root causing = faster call resolution = cost reduction.
  • 33. Example Use Case Duplicate IMEI resolution Causes of duplicate IMEIs • Laundered stolen devices • Non-standard devices copying TACs • IMEI modifications to unlock network features Managing duplicate IMEIs • Capture IMSIs where TAC and hardware don’t match* • Measure scale and define policy • Handle subscriber according to policy
  • 35. Non-authentic devices are here •  Counterfeit devices are becoming easier to purchase and harder to spot •  The devices are now perfectly usable •  Like it or not, they are already here, hidden in plain sight •  Three parallel trends increasing the threat: •  Improved counterfeits •  Improved distribution •  More sophisticated malware •  Counterfeits are here, the question is how you will respond to it