Fighting Targeted Malware in the Mobile Ecosystem

Presented at Black Hat USA 2017, July 26, 2017, 5:05 p.m. (25 minutes)

<span>Meet Chrysaor, one of the most sophisticated and elusive mobile spyware products. Chrysaor, which is believed to be created by the NSO Group Technologies, is related to the iOS Pegasus malware. However, Google and Lookout hunted for their Android version from the end of 2016 to beginning of 2017, and were able to expose it in April.<br><br>This talk will recount how we pursued Chrysaor using a combination of on-device and cloud based security services. In particular, we will detail the methodology and techniques that allowed us to detect this malware that affect only dozens of devices out of the billions of security reports we get from Safetynet. We will also discuss how we used our installation graph engine to determine attribution.</span>

Presenters:

  • Andrew Blaich - Security Researcher, Lookout
    Andrew Blaich is a security researcher at Lookout where he is focused on mobile threat hunting and vulnerability research. Prior to Lookout, Andrew was the Lead Security Analyst at Bluebox Security. He holds a Ph.D. in computer science, and engineering from the University of Notre Dame in enterprise security and wireless networking. Andrew has presented at conferences including BlackHat, RSA, and Kaspersky SAS. In his free time he loves to run.
  • Megan Ruthven - Software Engineer, Google Inc.
    Megan Ruthven is a software engineer on Google's Android Security team where she uses device and application data to combat malware on a global scale. Prior to joining Google, Megan was a graduate student at University of Texas at Austin. She is a Kleiner Perkins Caufield and Byers Engineering Fellow.

Links:

Similar Presentations: