Vulnerabilities / Threats
3/19/2013
02:14 PM
50%
50%

Beware Smartphone Lurkers: Cloud Storage File Remnants

Security investigators recovered Box, Dropbox and SugarSync files and unique file IDs, via forensic dump of iPhone and Android smartphone memory.

What are the implications of these findings? As more people use smartphones, digital forensic investigators -- including police departments and law enforcement agencies -- are increasingly looking at such devices to recover usable evidence. Last year, for example, police in London announced that they were testing mobile phone data extraction devices to allow specialist teams to access, study and save any data stored on a suspect's mobile device. In the future, however, they may need to study not one device, but many, given the extent to which many people now own multiple devices.

On that front, the Glasgow researchers said they're now continuing their study to cross-reference forensic examinations of multiple devices used by the same person. "The very nature of the cloud environment encourages users to access data through multiple devices," they said, noting that they already have an experiment underway "to access residual artifacts from Gmail, Mozy, Ubuntu One and Evernote on end devices connected to these services." Their question is whether conducting a forensic analysis of multiple devices used by the same user will yield a greater number of recoverable files and artifacts.

"The first step was to say, is this an idea that's going to work, then we can say, in future research, how do we use this data to say something useful for a forensic investigator, in terms of merging evidence from different proxies into a single data set?" said paper co-author Tim Storer, speaking by phone. For example, if part of an Excel spreadsheet is found on one device, but not another two devices used by the same user, should it count as evidence? "There's often a tendency by forensic investigators to conflate data and evidence," he said, when a higher threshold is called for.

Going forward, the researchers said in their paper that they hope to detail "the data leakage risk that cloud applications introduce to corporate environments" in greater detail, as well as to "propose a set of security measures for both cloud providers and smartphone users to mitigate the potential risk of data leakage."

"These services are being used in corporate environments more and more ... so it's a potential source of risk for an organization," said Storer. "Sensitive documents may end up on someone's device that's subject to analysis." But businesses might minimize those types of risks by steering their employees to use devices from which it's more difficult to recover usable information, forensically speaking. Likewise, cloud service providers could offer their corporate customers specialized services that scrubbed all data stored by their mobile apps, once a user no longer needed to view it.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
3/22/2013 | 4:28:13 AM
re: Beware Smartphone Lurkers: Cloud Storage File Remnants
From my point of view, this makes the use of an appropriate MDM solution all that much more important in an organization with a BYOD policy that also leverages these kinds of cloud services. Being able to do a full out "device nuke" in the event of a device loss becomes critical in light of these findings.

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.