Endpoint Security Complete

 View Only
  • 1.  New Blog Post: Stagefright vulnerabilities pose serious threat to Android users

    Posted Jul 30, 2015 06:44 AM

    Just raising awareness of this new Security Response blog post:

     

    Stagefright vulnerabilities pose serious threat to Android users
    https://www-secure.symantec.com/connect/blogs/stagefright-vulnerabilities-pose-serious-threat-android-users

    ...

    Symantec rates these vulnerabilities as critical due to the threat posed by exploitation and ease of exploit. All an attacker needs to do to successfully exploit these vulnerabilities is to send a specially crafted multimedia message (MMS) to any vulnerable Android device.  Exploitation requires little or no interaction on the part of the victim. In most cases, the victim simply has to look at the malicious MMS message to trigger the exploit.  In some cases, such as when a malicious message is sent via Google Hangouts, the exploit triggers once the message is received, before the victim even receives a notification.

     

    Patch as soon as is possible!



  • 2.  RE: New Blog Post: Stagefright vulnerabilities pose serious threat to Android users

    Posted Aug 03, 2015 02:43 AM

    Thanks for posting this.  Norton Mobile Security offers some protection against this vulnerability.  Enterprise management for NMS is available through Mobility.  This can be integrated into most MDM solutions. The specific benefit of NMS is mitigation by URL filtering and reporting of the device OS. There is no "patch" for this vulnerability through NMS, only through Google. It will scan for known malware which this vulnerability will be used to deliver. How can we identify a device that has been compromised? For example, with a business managing 10k plus devices the probability is high that some will be compromised. We need to deploy some kind of DLP for applications through a Secure App Proxy. For our own applications like Work Mail, touchdown, Work file, work web etc... communication can be proxied and monitored for suspicious traffic. Sandboxing applications will be key. Check out our project Red Onion, it is an SDK for just this kind of situation for 3rd party developers. No specific signature is directory associated with this vulnerability. Ultimately the administrator will need to decide how to act on the telemetry received from the NMS agent. 



  • 3.  RE: New Blog Post: Stagefright vulnerabilities pose serious threat to Android users

    Posted Aug 11, 2015 09:03 AM

    Cheers Adam!  Is there any link available for project Red Onion, should anyone wasnt to learn more?

    All the best,

    Mick