📺 Stream EntrepreneurTV for Free 📺

4 Types of Mobile Monsters and What We Can Learn From Their Horror Stories System bugs wreaked havoc on mobile devices in 2015, but they could have been prevented.

By Andrew Blaich Edited by Dan Bova

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

It has been a frightening year for anyone with a mobile device, with several high-profile vulnerabilities and attacks on both Android and iOS users. In July, the owners of 950 million Android devices learned that they were susceptible to Stagefright attacks that could be launched in several ways, including via a single text message. iOS has had its own scares with the Masque Attack and XcodeGhost resulting in riskware and malware being distributed via both legitimate and spoofed apps, in and outside the App Store.

Looking at all the mobile security flaws that have recently come to light, the total number of users affected numbers well over a billion in 2015 alone. But these numbers are just the tip of the iceberg in terms of users affected by mobile security issues this year. What is scarier are the hundreds of additional vulnerabilities that come and go behind the scenes. They are just as critical, if not more so, despite never being given a name.

Related: 7 Cybersecurity Layers Every Entrepreneur Needs to Understand

Fortunately, we can learn some lessons from the security problems that have been made public and apply them to protect against other unknown and unnamed vulnerabilities.

1. Stagefright

Stagefright has become the common name for the numerous vulnerabilities that continue to be found in the default media playback framework on Android devices, making it the gift that keeps giving for vulnerability researchers. In October alone, the monthly Android patch cycle covered 15 more remote code executable vulnerabilities labeled as critical and related directly to Stagefright.

This particular bug will have a lasting impact as Android devices continue to be several months, if not years, away from getting critically needed patches for these types of vulnerabilities. Looking forward, we should address the core of the problem, which is the use of largely unaudited code libraries. Not carefully inspecting these libraries and continuing to use them in mobile devices and applications will result in these types of vulnerabilities living on.

2. iOS XcodeGhost

The XcodeGhost malware is noteworthy in that it did not stem from Apple's iOS but from the tools used to build iOS apps. iOS developers were unwittingly using a malicious version of the Xcode development tool and baking potentially malicious code into their apps. The result was weaponized apps that collected sensitive information from user devices.

Since its discovery, Apple has been working to remove the infected apps from the App Store, but that doesn't mean the trouble has ended. This type of exploit can happen again, as XCodeGhost has made malicious actors realize attacking at the developer level is an effective approach. For their part, developers must ensure their tools come from trusted sources -- or else place users' data at risk.

Related: Know Thy Enemy. Hire a Hacker to Enhance Your Cybersecurity.

3. Certifi-gate

Certifi-gate is a vulnerability affecting Android apps that has been used in the wild. It allows applications to gain illegitimate privileged access through mobile Remote Support Tool (mRST) apps' security certificates. These tools -- TeamViewer, Rsupport, and CommuniTake Remote Care to name a few -- are often pre-installed and usually have privileged access to functionality on Android devices from popular manufacturers. An exploit that takes advantage of this flaw would gain control of the device by impersonating the apps, leaving users completely vulnerable.

This attack is a perfect example of why manufacturers should be more careful when granting privileged app functions to third parties, and why mobile developers need to become more security-savvy to catch these problems earlier in the development cycle.

4. Masque attack

Among the 400 GB of information leaked as a result of the Hacking Team breach, FireEye discovered a new iteration of the Masque Attack. It involved reverse engineering and repackaging legitimate apps like Facebook, Twitter and WhatsApp to steal users' sensitive information and upload it to a remote server.

Eleven Masque Attack applications were found, any of which could replace legitimate apps on a victim's device when they were downloaded. It's important to note that this attack was made possible by spoofing legitimate apps, which could have been prevented if even the most basic anti-tampering controls were in place to prevent attackers from infiltrating and reverse engineering the apps' source code.

In all of the above cases, as well as more recent Android and iOS malware discoveries we're still learning about such as YiSpecter, KeyRaider and Ghost Push, there is a common underlying thread -- a lack of sufficient device and OS security. Even if patches are made available and publicized, there's no guarantee that your particular device will receive one due to the convoluted methods device manufacturers and mobile carriers use to push patches out. For instance, the second bundle of Stagefright patches is only currently available for certain Android models like the Nexus brand from Google, despite the need for all Android devices to be protected.

Ultimately, due to the OS's inherent vulnerabilities and the breakneck pace of new exploits, we -- consumers, enterprises and developers alike -- can no longer trust default device security measures and must turn our attention further into the mobile stack. Safeguards need to be applied closer to the data, at the app level, to improve mobile security to the extent that the OS provider, device manufacturers and carriers aren't addressing. Doing so will go a long way toward ensuring we don't see nearly as many mobile horror stories next year.

Related: How to Protect Your Small Business Against a Cyber Attack

Andrew Blaich

Lead security analyst at Bluebox Security

Andrew Blaich is the lead security analyst at Bluebox Security, where he is focused on all things mobile. He holds a Ph.D. in computer science and engineering from the University of Notre Dame in enterprise security and wireless network performance. Blaich has worked at both Samsung and Qualcomm Research on next generation access control, kernel security and indoor location systems for mobile devices.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Growing a Business

Clinton Sparks Podcast: The Struggles and Fame of Rapper Lil Yachty's Entrepreneurship Journey in Hip-Hop

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.

Leadership

You're Reading Body Language All Wrong — And It's Putting Your Next Business Deal On The Line. Decode Non-Verbal Cues By Following These 5 Steps.

In the intricate dance of business meeting negotiations, the nuances of communication become the fulcrum on which decisions balance. For the astute entrepreneur, understanding body language is not just a skill; it's an imperative. However, relying solely on isolated gestures can be deceptive. To truly harness the power of non-verbal cues, one must grasp the concept of "clusters."

Business News

The Music Giant Behind Beyoncé, Harry Styles and Adele Bars ChatGPT From Using Its Songs

The world's largest music publisher sent letters to more than 700 companies demanding information about how its artists' songs were used.

Business News

OpenAI's New Deal Sees the ChatGPT Trailblazer Following a Competitor's Lead

OpenAI is treading on Google's AI-training territory following its new deal with Reddit.

Productivity

Want to Be More Productive? Here's How Google Executives Structure Their Schedules

These five tactics from inside Google will help you focus and protect your time.

Side Hustle

These Coworkers-Turned-Friends Started a Side Hustle on Amazon — Now It's a 'Full Hustle' Earning Over $20 Million a Year: 'Jump in With Both Feet'

Achal Patel and Russell Gong met at a large consulting firm and "bonded over a shared vision to create a mission-led company."