Book of the Month – Mobile Malware Attacks and Defense

As mobile devices becoming more and more sophisticated with their computing power and memory, the attackers are slowing shifting their focus from PC to these Mobile devices. Unlike earlier generation of mobile devices, current mobile devices are as powerful as our computer systems with increased memory and performance along with built-in internet connectivity. All of us still may not have one computer system per user now, but each of us enjoy at least one geek cellphone in our pocket. More than just a fancy electronic gadget it has become necessity of the time.

.

For attackers it brings in great opportunity with high success rate as mobile devices represent low hanging fruit with more than 80% of mobile users have no knowledge of its intrinsic and security aspects. In addition to this, early days of mobile evolution with a low security profiles making it more vulnerable to easy traps.

.

In this direction, this book ‘Mobile Malware Attacks and Defense’ throws light on evolving trend of malwares targeted towards these mobile devices. It describes how to perform analysis of such malwares and ways to protect against such threats.

.

.

Here is the core information about the book,

Title: Mobile Malware Attacks and Defense
Author: Ken Dunham
Publisher: Syngress
Hardcover: 440 pages
Release Date: November 14, 2008
Rating(Amazon):

.

Here is the ‘Table of Contents’

  • Chapter 1 – Introduction to Mobile Malware
  • Chapter 2 – Visual Payloads
  • Chapter 3 – Timeline of Mobile Malware, Hoaxes, and Threats
  • Chapter 4 – Overview of Mobile Malware Families
  • Chapter 5 – Taxonomy of Mobile Malware
  • Chapter 6 – Phishing, SMishing, and Vishing
  • Chapter 7 – Operating System and Device Vulnerabilities
  • Chapter 8 – Analyzing Mobile Malware
  • Chapter 9 – Forensic Analysis of Mobile Malware
  • Chapter 10 – Debugging and Disassembly of MMC
  • Chapter 11 – Mobile Malware Mitigation Measures

.

First half of the book covers basics of mobile malwares, different types, how they are different from traditional PC malwares, real life examples of such threats etc. This mainly prepares the ground for second half of the book where it gets more interesting with more technical stuff.

.

Chapter 6 puts focus on how attackers are using SMS  (SMishing) and Phone based Phishing (Vishing) to lure naive users into their traps. It illustrates different types and presents techniques to detect & mitigate such attacks. Next chapter explain mobile OS aspects, how its different from traditional PC model and explains about security vulnerabilities specific to these devices.

.

I found last 3 chapters interesting as it covers specific techniques required for analyzing mobile malwares compared to PC viruses. It describes in detail on using MobileSandbox to safely analyze such malwares like we do using virtual boxes for normal PC viruses. Though ‘Mobile Forensics’ deserves a book in itself, author does a good job covering some of the fine prints to set the basics right. Debugging/Disassembling of malwares using various tools such as IDA Pro etc brings in more energy (if you are of my type ;)). This process is similar to our traditional reversing/debugging but there are some specifics w.r.t executable for different mobile platforms which are clearly illustrated here using real malwares.

.

Though you will crave for more, this book offers one of best insights on mobile malwares, their trends, analysis and protections against such threats for novice as well as experts.

.

For more details and reviews on top security books read our ‘Book of the Month’ page list. Also look at complete collection of ‘Best Security Books’ recommended by us.

.

eBook Link: http://www.megaupload.com/?d=9IOGHZM0

Similar posts
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting various Communications Of HeartBeat [...]
  • Advanced Malware Analysis Training Se...   Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting The [...]
  • Detailed Overview and Internals of PE... A win32 portable executable(PE) file consists of: DOS Header, PE Header, Section Table, Sections. Analyzing a PE file gives us a lot of information like the address in memory where the file will be located (ImageBase), address of entry point, imported and exported functions, packed or unpacked etc. Thus this static analysis can indicate whether [...]
  • SEH Exploitation to Get Shell Access   Structured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for debuggers as well. SEH exploitation is based on stack buffer overflow technique. It becomes easy to exploit a [...]
  • Bamital Analysis using Malpimp and Py... A couple of months ago, I released my two new tools Malpimp and PyMal for malware analysis. Malpimp aims at API tracing and PyMal is a general purpose malware analysis tool. In this blog I will discuss how to use both of them in malware analysis. As a case study I am using Bamital botnet [...]

Leave a Reply

Our Company

Follow us on Facebook


Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list