Get All Access for $5/mo

4 Types of Mobile Monsters and What We Can Learn From Their Horror Stories System bugs wreaked havoc on mobile devices in 2015, but they could have been prevented.

By Andrew Blaich Edited by Dan Bova

Opinions expressed by Entrepreneur contributors are their own.

It has been a frightening year for anyone with a mobile device, with several high-profile vulnerabilities and attacks on both Android and iOS users. In July, the owners of 950 million Android devices learned that they were susceptible to Stagefright attacks that could be launched in several ways, including via a single text message. iOS has had its own scares with the Masque Attack and XcodeGhost resulting in riskware and malware being distributed via both legitimate and spoofed apps, in and outside the App Store.

Looking at all the mobile security flaws that have recently come to light, the total number of users affected numbers well over a billion in 2015 alone. But these numbers are just the tip of the iceberg in terms of users affected by mobile security issues this year. What is scarier are the hundreds of additional vulnerabilities that come and go behind the scenes. They are just as critical, if not more so, despite never being given a name.

Related: 7 Cybersecurity Layers Every Entrepreneur Needs to Understand

Fortunately, we can learn some lessons from the security problems that have been made public and apply them to protect against other unknown and unnamed vulnerabilities.

1. Stagefright

Stagefright has become the common name for the numerous vulnerabilities that continue to be found in the default media playback framework on Android devices, making it the gift that keeps giving for vulnerability researchers. In October alone, the monthly Android patch cycle covered 15 more remote code executable vulnerabilities labeled as critical and related directly to Stagefright.

This particular bug will have a lasting impact as Android devices continue to be several months, if not years, away from getting critically needed patches for these types of vulnerabilities. Looking forward, we should address the core of the problem, which is the use of largely unaudited code libraries. Not carefully inspecting these libraries and continuing to use them in mobile devices and applications will result in these types of vulnerabilities living on.

2. iOS XcodeGhost

The XcodeGhost malware is noteworthy in that it did not stem from Apple's iOS but from the tools used to build iOS apps. iOS developers were unwittingly using a malicious version of the Xcode development tool and baking potentially malicious code into their apps. The result was weaponized apps that collected sensitive information from user devices.

Since its discovery, Apple has been working to remove the infected apps from the App Store, but that doesn't mean the trouble has ended. This type of exploit can happen again, as XCodeGhost has made malicious actors realize attacking at the developer level is an effective approach. For their part, developers must ensure their tools come from trusted sources -- or else place users' data at risk.

Related: Know Thy Enemy. Hire a Hacker to Enhance Your Cybersecurity.

3. Certifi-gate

Certifi-gate is a vulnerability affecting Android apps that has been used in the wild. It allows applications to gain illegitimate privileged access through mobile Remote Support Tool (mRST) apps' security certificates. These tools -- TeamViewer, Rsupport, and CommuniTake Remote Care to name a few -- are often pre-installed and usually have privileged access to functionality on Android devices from popular manufacturers. An exploit that takes advantage of this flaw would gain control of the device by impersonating the apps, leaving users completely vulnerable.

This attack is a perfect example of why manufacturers should be more careful when granting privileged app functions to third parties, and why mobile developers need to become more security-savvy to catch these problems earlier in the development cycle.

4. Masque attack

Among the 400 GB of information leaked as a result of the Hacking Team breach, FireEye discovered a new iteration of the Masque Attack. It involved reverse engineering and repackaging legitimate apps like Facebook, Twitter and WhatsApp to steal users' sensitive information and upload it to a remote server.

Eleven Masque Attack applications were found, any of which could replace legitimate apps on a victim's device when they were downloaded. It's important to note that this attack was made possible by spoofing legitimate apps, which could have been prevented if even the most basic anti-tampering controls were in place to prevent attackers from infiltrating and reverse engineering the apps' source code.

In all of the above cases, as well as more recent Android and iOS malware discoveries we're still learning about such as YiSpecter, KeyRaider and Ghost Push, there is a common underlying thread -- a lack of sufficient device and OS security. Even if patches are made available and publicized, there's no guarantee that your particular device will receive one due to the convoluted methods device manufacturers and mobile carriers use to push patches out. For instance, the second bundle of Stagefright patches is only currently available for certain Android models like the Nexus brand from Google, despite the need for all Android devices to be protected.

Ultimately, due to the OS's inherent vulnerabilities and the breakneck pace of new exploits, we -- consumers, enterprises and developers alike -- can no longer trust default device security measures and must turn our attention further into the mobile stack. Safeguards need to be applied closer to the data, at the app level, to improve mobile security to the extent that the OS provider, device manufacturers and carriers aren't addressing. Doing so will go a long way toward ensuring we don't see nearly as many mobile horror stories next year.

Related: How to Protect Your Small Business Against a Cyber Attack

Andrew Blaich

Lead security analyst at Bluebox Security

Andrew Blaich is the lead security analyst at Bluebox Security, where he is focused on all things mobile. He holds a Ph.D. in computer science and engineering from the University of Notre Dame in enterprise security and wireless network performance. Blaich has worked at both Samsung and Qualcomm Research on next generation access control, kernel security and indoor location systems for mobile devices.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Leadership

Why Your AI Strategy Will Fail Without the Right Talent in Place

Using fractional AI experts through specialized platforms allows companies to access top talent cost-effectively, drive innovation and scale agile strategies for growth.

Business News

Here's What the CPI Report Means for Your Wallet, According to JPMorgan and EY Experts

Most experts agree that there will be another rate cut next week.

Business News

These Companies Offer the Best Work-Life Balance, According to Employees

The ranking is based on Glassdoor ratings and reviews.

Productivity

6 Habits That Help Successful People Maximize Their Time

There aren't enough hours in the day, but these tips will make them feel slightly more productive.

Science & Technology

Use This Framework to Successfully Integrate AI Into Your Business Operations

Here's how to ensure both innovation and compliance when using AI in your organization.