Why So Many Mobile Attacks Succeed
The modern kill chain pathway begins with reconnaissance. Attackers learn all they can about the target agency and its employees, primarily via social media, including whether they use a single sign-on page.
Once the attacker has sufficient information, they can take a few approaches. One approach is using widely available phishing kits to mimic agencies’ SSO pages. Detailed social engineering messages, based on research, are then shared with targets via text messages or QR codes.
These attacks are much more likely to succeed because of a combination of factors, including smaller text obscuring threat details; a general lack of traditional endpoint protections for mobile; and an extensive ecosystem of mobile email and messaging applications. Victims fill out the fake SSO page with their real credentials, granting attackers access to the network. Once inside, the threat actor will try to expand their access into other apps and systems.
Alternatively, threat actors can send phishing messages containing malicious links that exploit browser vulnerabilities to install malicious code on the device. The commoditization of advanced malware and the ready availability of Malware as a Service kits make creating these codes an easy task for attackers. Lookout found that 60% of mobile devices run on vulnerable operating systems; if a target clicks on one of these links, attackers are very likely to successfully install malicious code and gain free rein to harvest all device activity.
RELATED: Mobility is key to mastering zero trust.
High-profile phishing and social engineering attacks targeted political figures at all levels of government in 2024, including the campaigns of former Vice President Kamala Harris and President Donald Trump. That trend is expected to continue in 2025, given the government’s emphasis on integrating mobile devices into systems and workflows.
For example, efforts to use mobile devices as digital IDs are becoming more prevalent, with more than 15 states adopting them, according to the American Association of Motor Vehicle Administrators.
These efforts undoubtedly help improve citizens’ experience, as 97% of Americans under 50 own a smartphone, according to the Pew Research Center, but agencies must ensure that cyberthreats are being considered.
Preparing Agencies for a Mobile Future
Many federal officials still believe that, if mobile workloads are sandboxed, breaches won't have a significant impact. However, traditional commercial surveillance won't stop things such as screenshots, data exfiltration or the compromise of an employee's mobile device.
MORE FROM FEDTECH: State Department employees keep their devices longer with Tech for Life.
Mobile endpoint detection and response solutions help defend the devices themselves, whether managed or unmanaged, by blocking risky third-party app behaviors and alerting administrators to vulnerable operating systems or overly permissive apps. Mobile EDR also enhances visibility into cyber events by allowing agencies to reconstruct the attack chain.
Meanwhile, mobile threat defense solutions significantly improve agencies’ visibility into their attack surface and help streamline response efforts. These solutions provide customized mobile threat intelligence to assist IT teams in proactively identifying and mitigating vulnerabilities.
Beyond solutions, policies that define and enforce consequences for such attacks must also be implemented. Without a definitive line in the sand to deter threat actors with harsh repercussions, these attacks will become more frequent and increase both in damage and sensitive data obtained.
In tandem, agencies should continue to encourage education about the security risks associated with mobile identity, helping ensure a comprehensive understanding of the risk. Through combined efforts with CISA, robust mobile threat solutions and cultural shifts that acknowledge the growing cyber risks of mobile devices, agencies can proactively protect employee devices and defend sensitive government data from evolving adversarial threats and cybercriminals — ensuring the safety of citizens and the success of government missions.