Security Researcher WhiteOps
Software developer turned rogue, went from developing apps for small businesses to 2M+ DAU Facebook games while keeping an eye for everything shiny and new. For about four years I’ve shifted gear sand started tinkering at Ixia’s threat intelligence system as a security researcher while speaking at various conferences (SAS, AVAR, PHDays) in my free time showcasing whatever random hardware I hacked. With a background in electronics engineering and various programming languages, I like to dismantle and hopefully put back whatever I get my hands on.
Rotten to the core: Android worms in the wild
Starting as a developer’s best friend, the Android Debug Bridge has turned into a security nightmare as time passed. While having an open port available for debugging over the internet sounds great, forgetting to turn off that service in production environment can spell big trouble for you or even your customers.
My analysis will be of the protocol, the worms abusing it and how I discovered it all after putting my freshly built honeypot up. The Android Debug Bridge protocol was initially designed for accessing various critical services of an Android device over USB. However, it also got encapsulated over TCP/IP recently, opening up port 5555 for a remote debugger to attach itself. From a security standpoint however, no improvements have been made, and a remote attacker can freely connect and exploit a device over the air. This is why I started developing a low interaction honeypot to catch this kind of attacks following a surge in hits on that specific port in our sensors. Shortly after, I opensourced the project on GitHub. This led in a huge surge of honeypots being open by fellow security researchers, and thus awareness about this vulnerability significantly increased. After also publishing a blogpost about one of the new threats that I found, Trinity (p2p bot that spread a miner), the amount of vulnerable devices dropped by 50%, from more than 44000 to around 22000.
In the first part of the presentation I’ll be discussing the development procedure for the honeypot from the ground up as well as dissecting the ADB protocol in order to enable researchers to more easily implement their own honeypots. The second part of the talk will be focused on exploring various strands of malware that have started hitting the honeypot in the last months, some that are even quite hilarious. From apologetic miners to aggressive peer to peer botnets, I’ll be showcasing the whole ecosystem of ADB worms that have circulated around the internet.
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.