Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
Author(s) -
Stoyan Mechev,
Elisaveta Staneva,
Mariyan Rachev
Publication year - 2020
Publication title -
information and security an international journal
Language(s) - English
Resource type - Journals
eISSN - 1314-2119
pISSN - 0861-5160
DOI - 10.11610/isij.4721
Subject(s) - computer security , computer science , mobile device , telecommunications , operating system
Mobile communications devices use a variety of communication modes some of which can put those devices at great risks. This article explores weaknesses in some protocols exploited by simple Denial-of-Service attacks. The authors present also a solution to one of them, where the attack is executed using an ESP8266 microchip. A R T I C L E I N F O : RECEIVED: 28 JUNE 2020 REVISED: 07 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : ESP8266, Deauth attacks, DOS attacks Creative Commons BY-NC 4.0 Introduction According to statista.com, in 2020 alone, nearly 1.560 billion mobile phones will be sold. This makes the issue of security of mobile operating systems particularly relevant. In this paper, we will look at attacks in which the attacker does not have physical access to the device. The Most Common Vulnerabilities of Mobile Devices The seven most dangerous mobile security threats in 2020, according to Kaspersky’s Lab 2 are data leakage, unsecured Wi-Fi, network spoofing, phishing attacks, spyware, corrupted cryptography and improper session management. Cybersecurity Problems and Solutions in OS of Mobile Communication Devices 301 • Data leakage Data leakage most often occurs after users grant mobile applications too many permissions during installation. These are usually free apps that can be downloaded from official app stores (Google Play Store, App Store, etc.) that perform their functionality as outlined in the app description, but also send personal and potentially corporate data on a remote server, where it is obtained from advertisers and sometimes from cybercriminals. • Unsecured Wi-Fi Users typically avoid using mobile data traffic when wireless hotspots are available. Unfortunately, free Wi-Fi networks are usually not secure, as a result of which mobile devices can be easily attacked. In some cases, attackers require users to create an "account" to access these free services, supplemented by a password. Because many users use the same combination of email and password for multiple services, hackers are then able to compromise email, e-commerce, and other sensitive user information. • Network Spoofing In Network Spoofing attack, hackers create fake access points that look like Wi-Fi networks, but are actually traps. This most often happens in public places with high internet traffic, such as cafes, libraries and airports. Cybercriminals give access points misleading names, such as “Free Wi-Fi from the airport” or “Café” to encourage users to connect. • Phishing attacks Because mobile devices are always on, they are usually the first to fall under most phishing attacks. Mobile users are more vulnerable because they often monitor their communications in real time, opening and reading emails as soon as they receive them. Mobile users are also more susceptible to such attacks, as e-mail applications show less information about the sender of the message due to the smaller screen sizes of mobile phones. For example, even when open, an email can only show the sender's name unless you expand the header information bar. • Spyware In many cases, users do not have to worry about malware from unknown attackers, but rather spyware installed by spouses, colleagues or employers to track their whereabouts and activities. Also known as stalkerware, many of these applications are designed to be loaded on victims' devices without their consent or knowledge. • Poor quality encryption Poor quality encryption can occur when application developers use weak encryption algorithms or incorrectly apply strong encryption. In the first case, developers can use known encryption algorithms, despite their known vulnerabilities, to speed up the application development process. As a result, any motiS. Mechev, E. Staneva & M. Rachev, ISIJ 47, no. 3 (2020): 300-305 302 vated attacker can use the vulnerabilities to crack the password and gain access. In the second example, the developers use strong encryption, but leave open other “back doors” that limit its effectiveness. For example, if developers leave flaws in the code that allow attackers to change high-level application features — such as sending or receiving text messages — they may not need passwords to cause problems. • Improper session management To facilitate access for mobile transactions, many applications use tokens, which allow users to perform multiple actions without being forced to authenticate. Like user passwords, tokens are generated by device identification and validation applications. Secure applications generate new tokens each time they try to access or “session” and must remain confidential. Session handling occurs incorrectly when applications inadvertently share tokens per session, for example with malicious participants, allowing them to impersonate legitimate users. This is often the result of a session that remains open after the user has left the application or website. For example, if you are logged in to a company intranet website. Using the specialized chip ESP8266 for wireless network attacks One way to attack wireless networks is by using the shortcomings of the 802.11 wireless standard. Attacks that can be implemented using the specialized chip ESP8266: de-authentication, flood beacon. • Flood beacon Definition and mechanism of action Flood beacon is an attack in which, the attacker transmits countless fake beacon frames. After a while, the available wireless networks are so many that the user is totally confused and lost in a large list of networks. • De-authentication Definition and mechanism of action De-authentication is a type of attack in which a malicious person (hacker) causes a breakdown in the connection between a workstation (such as a laptop or smartphone) and a wireless access point (access point) that meets IEEE 802.11 specifications. Mechanism of action: the attack is possible as a result of combining two factors: 1) The 802.11 standard provides for the possibility for each client in the network to request explicit de-authentication from the access point. 2) Standard 802.11 networks do not include a mechanism for verifying the correctness of the self-reported identity. As a result, a malicious person can clone the MAC address of a legitimate network client and apply for de-authentication on their behalf. The same actions are applied to the client from the access point, as a result of which the connection between the two stations breaks down. Application: this type of attack can be used simply to disconnect customers from the Cybersecurity Problems and Solutions in OS of Mobile Communication Devices 303 network, but also as a basis for another type of attack, for example in the form of social engineering. The solution: this shortcoming was eliminated in 2009 with the adoption of the 802.11w standard and in particular with the introduction of secure management frames. The modern access points support the 802.11w standard, but in practice it is not enabled by default, so it has to be explicitly turned on. For example, for Cisco devices WAP150, WAP361 and WAP371 those settings can be set trough web interface. Specific Characteristics of ESP8266 ESP8266 is a highly integrated microchip with microcontroller capabilities manufactured by Espressif Systems. It is designed to provide a full internet connection in a small volume device. The ESP8266 can be used as an external Wifi module, using the standard firmware for the AT Command set, by connecting it to any microcontroller using the serial UART. It can also directly serve as a Wifi-enabled microcontroller by programming new firmware using the provided SDK. For the experimental part a specialized device ESP8266 Deauther, was used, with the help of which scanning of wireless networks and their attack can be performed. The device supports microcontroller interface via Arduino SDK (Figure 1) and web interface with which its functionality can be used (Figure 2). Figure 1: Connection to ESP8266 Deauther trough Arduino SDK. S. Mechev, E. Staneva & M. Rachev, ISIJ 47, no. 3 (2020): 300-305 304 Figure 2: Example of wi-fi network scanning with ESP8266 Deauther trough web interface. Principle of operation during the attack 1) Scan for wireless access points 2) Choose the target and type of attack 3) The attack itself begins. These steps can be performed through the interface of the device, through the web interface (maybe using a mobile phone) or through the interface of the Arduino SDK.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom