No Filter – Part Two

Dangerous old exposed cracked brick wall due to structural foundation failure, soil subsidence, corrosion and deterioration of building materials, earthquake

Spear phishing attacks take advantage of gaps is network, application and browser protetctions 

Successfully blocking malicious links is the fundamental technical defence against spear phishing attacks.  However, on mobile devices, this protection is far less effective than many realize, leaving enterprises exposed to various threats.

To understand why we’ll use a recent phishing text that was delivered to the phones of one of our staff members as a case study..  While this isn’t the kind of highly targeted attacks we see delivered to our enterprise clients, it nonetheless will serve to illustrate how unreliable the build-in protections provided by networks, applications and browsers.  

The First Line of Defense: Carrier-Level Filtering

For SMS based attacks, the first line of defence should be an SMS firewall deployed on the carrier network.  But this is where the problems start: its not mandatory for carriers to implement such firewalls in all jurisdictions.  Even where such firewalls exist they simply cannot be tuned to reliably spot every zero day malicious url without generating large numbers of false positives (and angry customers).  They face the same problem when they filter based on keywords e.g. messages with the name of a bank or postal service are often blocked. 

It’s worth noting that text message services aren’t just about text.  With the use of iMessage and the wider adoption of RCS the ‘texting’ channel increasingly sees multimedia content.  Recently we’ve seen attackers adopt detection by sending links in pdfs.  To avoid keyword filtering the ‘text’ accompanying  is now being sent as an image

So lots of attacks get through the carrier.  Similar issues arise if you’re receiving a link over another channel whether its iMessage, RCS, WhatsApp or Teams. The operators of these services struggle to filter out spear phishing attacks as their filtering is designed to block ‘consumer’ grade fraud.  Today most of these services over end-to-end encryption for messages sent between two devices.  In this scenario filtering is limited to the connections they offer to businesses.

 But getting back to our recent phishing text.  Where are the other opportunities to filter out these malicious messages ?

The Browser’s Role in Blocking Malicious Links

The next line of defence is the browser.  On mobile the predominate browsers are Chrome and Safari.  Both use the Google Safe browsing block list but the refresh rates appear to vary.  In the case of the recent phishing text received by our employee we found that while Safari correctly identified it as malicious, Chrome did not.

Phishing site blocked by Safari but allowed by Chrome

A check on VirusTotal showed that at  of ninety four vendors, only Google detected this link as problematic. This is worrying as it suggests that the next line of defence, web filtering solutions, might not be updated sufficiently quickly to block the malicious link in the message.  Web filtering can be deployed on network (for example if you’re connecting to your corporate wifi network or using a vpn or equivalent to connect to a gateway ) or on device (if you’re device is running an mobile endpoint security solution).  But some such solutions have blindspots.  Their threat intelligence can be out of date.  When we tested the malicious link using a leading mobile threat defense solution the link was not marked as dangerous.  Another issue is when filtering is limited to DNS ‘sniffing.’  This is a lightweight approach to filtering by examining only DNS traffic (a tiny proportion of all IP traffic going to and from a device) which, when introduced first, was very effective.  However, Corrata research shows that circa 20% of devices are now using encrypted DNS making DNS sniffing completely ineffective.  Secure Web Gateway solutions can overcome this blindspot but bring with them challenges around latency and privacy.  On device solutions can avoid these shortcoming, but none of them, with the exception of Corrata, incorporate the host firewall technology required to accurate identity malicious domains.  

Effectiveness of consumer and enterprise protections

 

Attackers’ Evasion Tactics

Coming back to our case study – it turns out that our attackers took further measures to avoid detection.  The domain’s DNS information initially directed the browser to Cloudflare’s infrastructure.  And the attackers used this to take advantage of Cloudflare’s support for Encrypted Client Hello (ECH).  ECH hides the name of the requested domain which would otherwise be transmitted in the clear and therefore detectable at the firewall level.   The net/net of this is that, for those 20% of devices which use encrypted dns, the malicious site would be completely undetectable.  The Corrata Labs team has identified that over 90% of phishing sites are now using Cloudflare ECH to bypass security controls. 

 

Defense LayerWeaknesses
Carrier-Level FilteringNot mandatory; weak against zero-day threats; easily bypassed with images/PDFs
Messaging Apps (iMessage, RCS, WhatsApp, Teams)Limited filtering capabilities; phishing links often go undetected
Browser ProtectionGoogle Safe Browsing updates inconsistently; Chrome and Safari results vary
Web Filtering SolutionsThreat intelligence delays; encrypted DNS bypasses detection
Secure Web GatewayCloudflare ECH encrypts domain requests, making firewall-based filtering ineffective

Table summarising the gaps in protections

The combination of ‘permissive filtering’ by service providers and browser vendors and gaps in ‘lightweight’ enterprise solutions means that organizations are more exposed to spear phishing attacks on mobile that they appreciate.  This is a marked contrast to the corporate email box: defenders and solution providers have worked relentlessly to augment the limitations in the built-in protections.  Attackers are fully aware that other messaging platforms are both growing in popularity within the enterprise and that such channels are poorly defended.  Its time for organizations to re-visit their risk assessments in light of the challenges that mobile brings. 

Related Resources

Related Resources

Read the latest news on enterprise mobile security direct from the specialists.

Read the latest news on enterprise mobile security direct from the specialists.