Vous êtes sur la page 1sur 7

Mobile Security Report 2009

Mobile Security Report 2009 Executive Summary


The mobile industry is going through a period of unprecedented
consolidation, both at the carrier level and among hardware and
software vendors.
Attempts to make the mobile ecosystem more user friendly have shown early signs of success. New
players in evolving markets have successfully managed to close the gap with more developed markets,
both in terms of the breadth of mobile service offerings and the range of devices available to subscribers.

Methodology Regardless of international consolidation, however, there have been few innovations anywhere able to
McAfee commissioned Informa Telecoms & Media (ITM) generate significant new revenue streams. Despite ongoing efforts to grow the market with new services
to conduct an online survey in November and December and functionality, voice and data access remain the main revenue generators—though often with less
2008. ITM canvassed mobile device manufacturers for attractive returns than a few years ago. At the same time, barriers to entry have emerged that prevent
their opinions on key aspects of mobile security. the development of new business models.

An email invitation, guaranteeing anonymity to the One of these barriers is security.


individuals participating in the survey, was sent to mobile
handset manufacturers and the software and hardware Attacks on mobile networks and devices have grown in number and sophistication. This has had a
component vendors that supply them. More than 30
negative impact on how market participants perceive the reliability of existing mobile security solutions.
international mobile device manufacturers responded.
This is particularly apparent in the areas of mobile payments and mobile commerce (m-commerce).
In addition to completing the survey, participants were
Devices, applications, and even networks are not sufficiently secured to allay users’ concerns.
given the opportunity to participate in follow-up inter-
views carried out by ITM. The purpose of the in-depth, For many respondents to our survey, device manufacturers are seen as being in the frontline when
confidential interviews was to complement, verify, it comes to providing security. They are at the forefront of balancing control with innovation, a dynamic
and expand on the survey results. that often determines the mobile ecosystem for as long as a complete lifecycle of a given device.
This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security
This summary incorporates responses from both the experiences, their concerns and priorities, and their approach to the major security challenges that
online questionnaire and the interviews. lie ahead of them in the near future.

We hope you find the McAfee Mobile Security Report 2009 interesting and valuable.

CONTENTS Victor Kouznetsov


Senior Vice President , McAfee Mobile Security
Executive Summary 1

Reality Check: The Situation Today 2

The Impact of Mobile Security Incidents 4

Focus Areas of Mobile Security Research 5

An Approach to Mobile Security 7

Summary and Outlook 9

McAfee Mobile Security Report 2009 1


Number of Devices Impacted by
Security Incident Category

< 10,000
10,000–1,000,000
> 1,000,000
60%

“ The growth of multimedia 50%

applications coupled with 40%

the opening of mobile 30%


operating systems will be
20%
the tipping point for mobile
security issues.” 10%

– Mobile Device Chipset Vendor 0%

Voice or text
spam attacks

Network or service
capacity issues

Phishing attacks
in any form

Virus/spyware
infections

Third party
application/content
problems

Privacy and
regulatory issues

Loss of user data


from devices

Denial of
service attacks
Reality Check: The Situation Today Source: Informa Telecoms & Media
©2009 Informa UK Ltd.
Figure 3-2. The number of devices
affected in each incident category
Within the last 12 months, manufactures over the last 12 months; percentage
For mobile device manufacturers and the software and hardware vendors of respondents.
have reported increased security issues
that supply them, malware and malicious content is only one of many mobile across all threat catagories.
security issues that need to be dealt with. New threats, including those that
compromise users’ data or privacy, have emerged, targeting widely supported
services such as text messaging and even voice.

Mobile Security Issues Reported, 2006 – 2008 At the same time, mobile hackers using traditional Development of Incidents More than 40 percent of vendors have experi-
coding practices have developed an increased level enced all the types of security incidents listed
Within the last 12 months, vendors have reported
of sophistication. Throughout 2008, McAfee® in Figure 3-1 except domain name system (DNS)
60%
increased security issues with third-party applica-
Avert® Labs noticed a dramatic upswing in complex attacks. In addition to general security issues caus-
tions and content. During this time, McAfee
attacks targeting lower-level device functionality. ing network or service capacity problems on the
50% Avert Labs has seen a strong increase in the sharing
Some of these have challenged the entire plat- carrier side, viruses and spyware as well as voice
40%
and downloading of user-generated content and
form security concept of several vendors. Early or text spam attacks have grown to considerable
mobile applications in the developing markets of
security threats from independent young hackers levels throughout 2008.
30% the Middle East and Asia. The vulnerabilities on
have turned into sophisticated, profit-oriented
20%
devices or networks created by applications with
attacks driven by experienced criminals. There also Number of Devices Affected
unintentional malicious code can be as severe
continues to be a high level of threat of infections
10% as those deliberately created by mobile malware As voice and text services are supported by
from existing malware variants as vulnerable device
2008
2007
2006

2008
2007
2006

2008
2007
2006

2008
2007
2006

2008
2007
2006

2008
2007
2006

2008
2007
2006

2008
2007
2006

0% hackers. Interviewees have repeatedly reported almost all mobile devices, voice or text spam attacks
models have entered secondary life cycles. Figures cases of prematurely released applications causing have hit the greatest number of devices. Support-
Network or service
capacity issues

Virus/spyware
infections

Voice or text
spam attacks

Third party
application/content
problems

Loss of user data


from devices

Phishing attacks
in any form

Privacy and
regulatory issues

Denial of
service attacks

3-1 and 3-2 illustrate manufacturers’ experiences severe network capacity issues, as well as crashed ing findings from Figure 3-1, security issues arising
with the most common mobile security threats or locked devices. In some cases, hackers have from third-party applications and content have
over a period of three years. been able to get unauthorized network access impacted a considerable number of devices. Phish-
at the users’ expense. ing attacks and traditional problems with malware
have also affected a surprisingly high number of
Source: Informa Telecoms & Media Figure 3-1. The increase in security mobile devices in the past 12 months.
©2009 Informa UK Ltd.
issues experienced by mobile device
users from 2006 to 2008; percentage
of respondents.

2 McAfee Mobile Security Report 2009 McAfee Mobile Security Report 2009 3
The Impact of Mobile Security Incidents Focus Areas of Mobile Security Research
If security is not an integral part of mobile device and platform development, Results from interviews with manufacturers and component vendors enquiring
security incidents can have dire consequences for vendors’ businesses. about their top mobile security concerns showed close alignment with findings
Figure 4-1 shows participants’ experiences with mobile security issues and how from McAfee research conducted among mobile operators at the beginning
these issues impacted internal functions and third-party developer relations. of 20071 and mobile consumers in early 2008 2. Problems in PC environments,
which are now accessible by mobile devices, are now top-of-mind concerns
among mobile device manufacturers, operators, and mobile users.

Impact on Manufacturers’ Businesses Surprisingly, participants reported a very weak


connection between increase of incidents and
While mobile devices and services are still relatively
third-party developer activity. In fact, most previous
safe, individual incidents have already had a signif-
security incidents have prompted device manu-
icant impact on manufacturers’ businesses. Almost
facturers to introduce platform security and limit
half of participating vendors mentioned increased
third-party applications to those vendors fulfilling
costs for patching and fixing devices. More than
stringent technical and liability conditions. This initi-
a third suffered from negative public relations or
ated a considerable decline in developer activity and
other brand damage followed by loss of credibility
innovation output, for example, for the Symbian
and user satisfaction. Recent experiences with
operating systems and other platforms—a trend
releasing new mobile handset platforms, such as
not reflected in Figure 4-1.
Android, have demonstrated how costly, complex,
“ Testing applications is not
and annoying it can be for manufacturers, carriers,
and users to distribute security solutions and really our concern and it’s
patches for devices out in the field. not our business to deal with
those issues.”
– Mobile Network Operator

Manufacturer’s Business Areas Impacted Areas of Highest Mobile Security Concern Mobile Usage Areas with Highest Security
Most Significantly by Mobile Security Incidents Concern for Manufacturers
Concern about mobile banking and payments
“ Wireless devices make use of security was mentioned most often by mobile de-
vice manufacturing companies. Initially introduced
precious resources as far as the 60% 90%
for the fixed line world, financial transactions have
communication infrastructure 50%
traditionally been a high attack and concern area.
75%

is concerned.” 40% Today, service providers, banks, and PC manu- 60%


– Mobile Device Chipset Vendor 30% facturers recommend the installation of personal 45%
protection products (often at no cost for the user.)
20% 30%
But the situation is different in the mobile space.
10% While mobile banking services are growing rapidly 15%
48%

36%

32%

32%

32%

28%

24%

81%

69%

69%

66%

59%

59%

53%

44%

44%

41%

41%

28%
0% in developing countries, where other payment 0%
methods are rare, mobile devices continue to
Increased costs for
patching/fixing devices

Negativity in public
relations or for brand

Loss of revenues from


services or device sales

Loss of credibility or
user satisfaction

Increased customer care


calls and enquiries

Customer switching to
competing manufacturer

Reduced developers
activity or content
availability

Payments and banking

Installing applications

External memory cards

WiFi/Bluetooth
connections
Download of
multimedia content

Internet browsing

Email messaging

PC synchronization

Geo-localization function

Text messaging

Voice-over-IP chat

Voice and voicemail


lack sufficient protection features.

Source: Informa Telecoms & Media Figure 4-1. Significance of the per- Source: Informa Telecoms & Media Figure 5-1. The security concern
©2009 Informa UK Ltd. ©2009 Informa UK Ltd.
ceived impact of previous security level for various mobile device
incidents on manufacturers busi- functions.
1 McAfee Mobile Security Report 2007, Research among 200 mobile
nesses; percentage of respondents.
operators about their experiences with mobile security incidents.
2 McAfee Mobile Security Report 2008, Research among 2000 consumers
in Japan, United Kingdom and United States about their mobile security
4 McAfee Mobile Security Report 2009 concerns on mobile devices and mobile services. McAfee Mobile Security Report 2009 5
An Approach to Mobile Security
“ Downloading security patches As mobile devices become increasingly
for wireless operating Systems multi-functional and connected to other What Drives Manufacturers to Implement
should become a transparent guarded and unguarded networks, McAfee
Security Features on Mobile Devices

process.”
sees the need for additional security mea-
– Mobile Device Chipset Vendor 90%
sures on the application, device platform,
75%
and network level. With limited control over 60%
“ Reliability and trustworthiness the network domain, manufacturers are 45%
of applications will become carefully examining security developments 30%
more of an issue.”
and threats to their platforms. However, past 15%
– Mobile Device Chipset Vendor
experience with previous security incidents has 0%

Anticipated future threats

Network carrier
requirements

End user
concerns/feedback

Service provider
requirements

Previous security incidents

Developer requirements
provided them with very limited guidance as
to where to expect the next attack. Figure 6-1
reveals the drivers behind the consideration
of proactive mobile security solutions at the
device level. Source: Informa Telecoms & Media
©2009 Informa UK Ltd.
Figure 6-1. The most important
Compounding the problem is the fact that Security Features Development drivers for integrating and offering
additional protection features can’t be installed mobile security in devices; percent-
Fortunately, most mobile device manufacturing age respondents.
on many devices once they have left the factory. companies do deploy or plan to deploy security
Other top areas of concern for mobile manufac- solutions addressing the concerns shown in
turers are downloading and installing applications Figure 5-1.
and multimedia, and exchanging information Drivers for Security Deployments The Preferred User Experience
or content via external memory cards. With manu- Figure 5-2 suggests that manufacturers have
facturers’ limited control of voice, voicemail, and “ Subscribers are suffering, Devices make mobile services and mobile content Mobile users want to be empowered with tools
started to implement additional security features consumable. More services spark more device sales and information that can help them enjoy their
text messaging services, these areas are of least but it is mainly the carriers
in some of their devices. However, interviewees and more device sales will trigger more services. devices and choose from the diverse mobile service
concern, despite the increase of related incidents that complain.”
confirmed that these were mostly limited to smart- To keep the mobile ecosystem of service and device and content offerings available today. However,
discussed in Figure 3-1. – Mobile Device Manufacturer
phone devices representing the minority of mobile usage intact, manufacturers need to position their detailed security options, warnings, and prompts
device portfolios. The most commonly deployed platform so that it attracts continuous innovation have traditionally not been successful in empower-
Security Features Implemented on Today’s Mobile Devices security features are mobile device data encryption by developers and content producers. All of them ing users and delivering the required security at the
solutions, followed by mobile application certifica- “ It is surprising how demand universal access rights to fully utilize the same time. Meanwhile, threats change continu-
tion, and platform security in the form of manda- little pressure enterprises power of today’s devices. At the same time, these ously, making managing security a complex task.
tory access control (MAC).
100%
put on mobile device rights can be just as easily abused for malicious
75% manufacturers to apply purposes that may impact a manufacturer’s brand, The majority of mobile device manufacturing com-
Recent attacks on various manufacturers’ platform trust, and revenue. Security helps device manufac- panies (69 percent) believe that device-integrated
60% security features have made it clear that MAC alone their security policies.”
turers balance control with open platforms that security is the most effective and efficient way
45% is a very vulnerable approach if it is not comple- – Member of
invite innovation. to protect devices, carriers, and users at the same
mented by other proactive security technology. Standardization Group
30% time. This means protection should be part of the
In fact, the increased focus on platform security did At the same time, network operators, service device, so it is secure without any additional user
15% not prevent security issues related to third-party providers, and, of course, users, have their security action required.
0% applications and content (Figure 3-1). Relevant needs as well. Users want to be free to do what
mitigating solutions such as anti-malware or other
Data encryption

Application certification

Platform security/
mandatory access control

Anti-theft/loss features

User data back-up


and restore

Anti-virus/spyware

Anti-spam for messaging

URL-address filtering

Wipe out applications

Call blocking or filtering

Content filtering/
parental control

ever they like on their devices, but networks can-


dynamic content security solutions—including the not always rely on consumers to make the right
ability to wipe out certain applications—have security choices. Here again, balancing end-user
not received equal deployment to date. requirements with security policies at the network
or device platform side requires additional, easy-
to-manage mobile security solutions.
Source: Informa Telecoms & Media Figure 5-2. The security features included
©2009 Informa UK Ltd.
in at least one of participating vendors’
device models; percentage of respondents.

6 McAfee Mobile Security Report 2009 McAfee Mobile Security Report 2009 7
How to Secure Devices and Deliver Mobile
Security to the Market
Nineteen percent of manufacturers believe that
preloaded protection is appropriate, supporting
Summary and Outlook
the trend that mobile security shouldn’t be a 6%
6% Integrated (security is part of the
user’s choice but rather should be professionally device and secures it without any user
action required)
Mobile device manufacturers are experiencing more mobile malware
managed as a part of communications vendors’
business discipline. Combining those groups leaves Preloaded (protection features are pre- attacks than ever before and spending more time and money on recovery
19% loaded, services provider utilizes them
a minority of just 12 percent who believe users when required)
from these attacks.
should bear the responsibility of proactively Activations (user activates a pre-installed
security feature when needed)
seeking their own security. 69%
After-market (user installs security
Infections from existing malware variants remain at a high level. Most
Three quarters of handset manufacturers and de-
software applications if and when they
want/need to) issues reported today effect carriers’ network capacity, indicating the type
vice component vendors excluded users from their of business risks that may result from a security incident.
business model for mobile security. Manufacturers
want to be in control of security for their devices Source: Informa Telecoms & Media Figure 6-2. The manufacturers’
©2009 Informa UK Ltd.
and are, therefore, including security technology preference for handling security
as preloaded and prepaid functionality or services. and deliver secured devices to
the market.
But manufacturers have experienced their own Fortunately, McAfee has been closely monitoring
Manufacturers have to manage their own issues with installing applications, handling user the mobile security landscape since 2001 and has
business risks and have started to create security data, and patching security solutions for devices developed solutions to protect manufacturers and
requirements that go beyond those requested by Who Should Bear the Cost for Securing Mobile Devices? out in the field. Manufacturers have mentioned operators. McAfee Integrated Content Security
carriers. The cost for protecting devices, services, that the increased cost for resolving problems was has been shipped on more than 100 million mobile
and content is, therefore, expected to be borne by the most significant effect from previous mobile devices, placing us in a unique position in the
manufacturers and carriers according to the security incidents. global marketplace.
majority of survey participants. 6%

19% For more than 70 percent of manufacturers, McAfee Mobile Security Solutions
Carrier/service provider pays mobile security is necessary in anticipation of Effective protection of networks, devices, applica-
44% Manufacturer pays future threats. Attacks on networks and devices tions, and content is necessary to safeguard a user’s
User pays are more sophisticated than ever. The recent current and future experience, lower adoption
Other payer increase in the level of sophistication of attacks barriers, and protect mobile players’ businesses and
has raised concerns about security for many brands. To achieve success in the market, new ser-
31% existing and emerging services. vices, such as mobile payments or mobile localiza-
tion, will require multiple levels of security.
Manufacturers want to be in control of security
for their devices. About 75 percent prefer to include McAfee® mobile security products and services
Source: Informa Telecoms & Media Figure 6-3. The manufacturers pre- security technology as a preloaded and prepaid
©2009 Informa UK Ltd.
ferred business models for deploying
help mobile device manufacturers and network
functionality or service on their devices, limiting
core level mobile security on devices. operators take proactive measures to stay on top
user interaction and responsibility. of these developments and to not only prevent
costly disruptions, but also prepare their environ-
Most commonly deployed security measures ment for the level of security required by new
“ We use inbuilt security on include mobile encryption solutions, application service offerings.
our devices to prevent other certification, and platform security in the form of
mandatory access control (MAC). However, the re-
applications and malware cent attacks on multiple vendors’ platform security
For more information visit:
http://www.mcafee.com/mobile
being downloaded.” have demonstrated the need for complementary
– Mobile Device Manufacturer security technology, such as dynamic content
security, including the ability to wipe out or block
malicious or unwanted content or services.

“ The majority of users are not


in a position to make intel-
ligent security decisions based
on warnings and prompts.”
– Member of Standardization Group

8 McAfee Mobile Security Report 2009 McAfee Mobile Security Report 2009 9
About McAfee, Inc. About Informa Telecoms & Media

McAfee, Inc., headquartered in Santa Clara, Informa Telecoms & Media is the leading provider
California, is the world’s largest dedicated security of business intelligence and strategic services to
technology company. McAfee is relentlessly com- the global telecoms and media markets through
mitted to tackling the world’s toughest security two key strands.
challenges. The company delivers proactive and
proven solutions and services that help secure Providing business critical information—ITM
systems and networks around the world, allowing products offer innovative formats and powerful
users to safely connect to the Internet, browse and channels to meet customers’ real business needs,
shop the web more securely. Backed by an award- with research services, reports and consultancy
winning research team, McAfee creates innovative that guides the decisions of over 10,000 leading
products that empower home users, businesses, decision makers.
the public sector and service providers by enabling
them to prove compliance with regulations, Creating communities—ITM actively fosters and
protect data, prevent disruptions, identify vulner- empowers the communities it works with, pro-
abilities, and continuously monitor and improve moting debates and sharing best practice, solving
their security. problems and stimulating innovation through its
magazines, online portals, large exhibitions,
focused conferences and networking lunches.

McAfee, Inc. McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or
3965 Freedom Circle its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other
Santa Clara, CA 95054 non-McAfee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of
888 847 8766 their respective owners. © 2009 McAfee, Inc. All rights reserved.
www.mcafee.com

Vous aimerez peut-être aussi