際際滷

際際滷Share a Scribd company logo
An Overview of Mobile Remote
Access Trojans (mRATs) and
Targeted Mobile Attacks
Agenda


The Collapse of the Corporate Perimeter



Mobile Remote Access Trojans (mRATs)
What do they do?
What types are there?



Real-Life mRAT statistics



Infection vectors



Follow up videos
The Collapse Of The Corporate Perimeter
The Collapse Of The Corporate Perimeter
The Collapse Of The Corporate Perimeter

More than

60% of
organizations
enable BYOD
Gartner, Inc. October 2012
The Collapse Of The Corporate Perimeter
MOBILE REMOTE
ACCESS TROJANS
(mRATs)
mRAT Capabilities
Snooping on corporate emails
and application data
mRAT Capabilities
Snooping on corporate emails
and application data
Eavesdropping
mRAT Capabilities
Snooping on corporate emails
and application data
Eavesdropping
Extracting contact lists, call
&text logs
mRAT Capabilities
Snooping on corporate emails
and application data
Eavesdropping
Extracting contact lists, call
&text logs
Tracking location
mRAT Capabilities
Snooping on corporate emails
and application data
Eavesdropping
Extracting contact lists, call
&text logs
Tracking location
Infiltrating internal LANs
TYPES OF mRATS
The mRAT Threat-scape
mRATs / Spyphones

High End: Government / Military grade
Mid Range: Cybercrime toolkits
Low End: Commercial surveillance toolkits
HIGH END:
GOV / MIL mRATs

High End Mid Range Low End
High-Profiled Example
MID: CYBERCRIME
TOOLKITS

High End Mid Range Low End
High-Profiled Example
LOWER END:
COMMERCIAL
SURVEILLANCE
TOOLKITS
High End Mid Range Low End
Commercial mobile surveillance tools
REAL-LIFE
STATISTICS
Survey: Cellular Network 2M Subscribers
Sampling: 650K

Infection rates:

June 2013:

1 / 1000 devices
Survey: Cellular Network 2M Subscribers
Sampling: 650K
Infection Vectors
Android

iOS-based devices
Infection Vectors
For more Information:
Coming soon

Cyber-Threats to Android-Based Devices
Cyber-Threats to iOS-Based Devices
Lacoon Mobile Security
YouTube Channel
MOBILE DEVICE
MANAGEMENT
(MDM) SOLUTIONS
DO NOT
ADDRESS THIS THREAT
An Anatomy of an Attack against MDMs
For more Information:

Bypassing Secure Containers on Mobile
Lacoon Mobile Security
YouTube Channel
Thank You.
@LacoonSecurity
Lacoon Mobile Security
info@lacoon.com
Ad

Recommended

FaceTime Web 2.0
FaceTime Web 2.0
Chris Sparshott
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
Why Organisations Need_Barac
Why Organisations Need_Barac
Barac
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
Alex Smirnoff
Amphion Forum 2013: What to Do About Attacks Against MDMs
Amphion Forum 2013: What to Do About Attacks Against MDMs
Lacoon Mobile Security
"Bleeding-In-The-Browser" - Why reverse Heartbleed risk is dangerous to the E...
"Bleeding-In-The-Browser" - Why reverse Heartbleed risk is dangerous to the E...
Lacoon Mobile Security
Mobile Threats: Enterprises Under Attack
Mobile Threats: Enterprises Under Attack
Lacoon Mobile Security
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Lacoon Mobile Security
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
MaryJWilliams2
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
VAIBHAVSAHU55
Research and discuss an incident where it was discovered that a Remo.pdf
Research and discuss an incident where it was discovered that a Remo.pdf
fathimafancy
Trends in network security feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
Third Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
Mobile Malware
Mobile Malware
Martin Holovsk箪
Malware Applications Development.pptx
Malware Applications Development.pptx
FullstackSRM
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Accenture
Malware
Malware
Setiya Nugroho
Report on Mobile security
Report on Mobile security
Kavita Rastogi
Him
Him
Himanshu Kumar Paswan
Anatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
cellphone virus and security
cellphone virus and security
Akhil Kumar
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
White Paper: Defense In Breadth
White Paper: Defense In Breadth
Courtland Smith
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
Zimperium
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Lacoon Mobile Security
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
Lacoon Mobile Security

More Related Content

Similar to An Overview of mRATs (20)

Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
MaryJWilliams2
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
VAIBHAVSAHU55
Research and discuss an incident where it was discovered that a Remo.pdf
Research and discuss an incident where it was discovered that a Remo.pdf
fathimafancy
Trends in network security feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
Third Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
Mobile Malware
Mobile Malware
Martin Holovsk箪
Malware Applications Development.pptx
Malware Applications Development.pptx
FullstackSRM
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Accenture
Malware
Malware
Setiya Nugroho
Report on Mobile security
Report on Mobile security
Kavita Rastogi
Him
Him
Himanshu Kumar Paswan
Anatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
cellphone virus and security
cellphone virus and security
Akhil Kumar
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
White Paper: Defense In Breadth
White Paper: Defense In Breadth
Courtland Smith
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
Zimperium
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
MaryJWilliams2
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
Pagajdhvdhdhdvhdhdhdhdhhdhdududhjdjdjdjdjdj
VAIBHAVSAHU55
Research and discuss an incident where it was discovered that a Remo.pdf
Research and discuss an incident where it was discovered that a Remo.pdf
fathimafancy
Trends in network security feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
Third Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
Malware Applications Development.pptx
Malware Applications Development.pptx
FullstackSRM
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Accenture
Report on Mobile security
Report on Mobile security
Kavita Rastogi
Anatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
cellphone virus and security
cellphone virus and security
Akhil Kumar
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
White Paper: Defense In Breadth
White Paper: Defense In Breadth
Courtland Smith
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
Zimperium
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC

More from Lacoon Mobile Security (7)

iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Lacoon Mobile Security
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
Lacoon Mobile Security
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
Lacoon Mobile Security
How Mobile Malware Bypasses Secure Containers
How Mobile Malware Bypasses Secure Containers
Lacoon Mobile Security
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
Lacoon Mobile Security
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Lacoon Mobile Security
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
Lacoon Mobile Security
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Lacoon Mobile Security
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It)
Lacoon Mobile Security
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
Lacoon Mobile Security
How Mobile Malware Bypasses Secure Containers
How Mobile Malware Bypasses Secure Containers
Lacoon Mobile Security
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
Lacoon Mobile Security
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Lacoon Mobile Security
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
Lacoon Mobile Security
Ad

Recently uploaded (20)

A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
Ad

An Overview of mRATs

Editor's Notes

  • #25: Infection of mobile devices can be done remotely such as via receiving an email containing the malware, or locally for example, through the usage of a USB cable.