Newsletter 高速鐵路簡訊 . 交通部高速鐵路工程局
行動裝置惡意App分析與防護 Analysis and Protection for Malware Applications on Mobile Devices

如何防止行動裝置感染機構內的電腦?除了避免員工個人的行動裝置直接與電腦連結外,更應建立行動裝置安全使用(個人安全防護)觀念。當下載APP進行安裝授權時,個人安全防護觀念應立即啟動,首先應先檢查該APP的評分、評論、下載次數及開發軟體公司等,若無任何評論,又不是新上架的,那麼應避免進行安裝授權。接著應啟動4A1D(行動化裝置安全防護):認證(Authentication)、授權(Authorization)、權限(Attribution)、稽核(Audit)、資料保護(Data Protection)︰1.確實審視APP授予使用權限;2.禁止任意將APP帳號交付他人;3.行動裝置於公共場所勿離開個人視線;4.無必要之通訊服務應關閉;5.限制下載APP。

With the rapid development of mobile communication devices, related security issues have raised extensive attention. When organizations open the choice for employees to carry and use their personal mobile devices, the advantages include reduction in IT equipment expenses, improvement of work efficiency and IT environment will be achieved; however, this may pose a threat to the defense of information security. In general, the organizations have a certain level of security defenses. When an employee's personal mobile device is infected with malware by charging the device by the computer via USB connection, the malware infects the computer. Then, the malware steals passwords or turns on the microphone or video camera to record environmental sounds or image and the stolen information will be sent to the hacker’s FTP via the mobile device.
Currently, there are numerous social network and video call applications for mobile devices such as Line, Facebook and E_MAIL, Juiker, WECHAT and QQ.
When using these social network applications, the malware can hack into the victim’s friends and groups and send messages. This kind of hacking method include the following four types: 1. By sending APP messages inclusive of malware links and infecting the cellphone with a virus then hacking personal information and conducting small fraud. 2. By demanding personal information and collect verification codes to conduct small fraud. 3. By purchasing game cards on behalf of the victim and asking for the password to exchange for cash. 4. By demanding the victim to call 0809031088 to complete verification and open a Ruten Online Auction seller account.
How will we prevent computers in the organization from being infected by mobile device virus attacks? In addition to avoiding direct connection of mobile device to computer, we have to establish the concept of application safety and the use of safety (personal security) when using mobile devices. When installing and authorizing system APPs, the concept of personal security should be activated simultaneously where the first step is to check ratings and reviews, download amount and the software development company. If the APP is not newly released but has no comments, installation and authorization of the APP should be avoided. The next step is to initiate the mobile device security management (4A1D: Authentication, Authorization, Attribution, Audit and Data Protection) indicated 1. To review APP granted utilization rights, 2. To prohibit arbitrarily giving APP accounts to others, 3. Not leave sight of mobile devices in public places, 4. To shut down unnecessary communication services and 5. Limited APP downloads.
Currently, the Executive Yuan has promoted Juiker, a domestically developed application, to be the dominant application for government agencies. The structure of Juiker was based on security considerations and presents better security features and network communication quality than Line. Moreover, Juiker can accomplish “cyber physical” function which is more convenient and safe.

  • 各類詐騙手法。
  • 分享: