Armour Mobile boasts a raft of new features in latest version including in-call switching between Voice and Video

Government certified secure mobile communications app continues to lead market with expanded functionality

London, 15 January 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has today announced the release of the latest version of Armour Mobile.  Armour Mobile, which provides the same easy to use experience as consumer-grade (free) apps but with the benefit of significantly enhanced security, now enables users to switch between Voice and Video and back, mid-call, and introduces new capabilities for managing group chat members and group chat list owners.  Unlike other apps, Armour Mobile does not require all users to move to video simultaneously. With Armour Mobile, a single user may switch to video, which can be particularly useful when one caller is on a low bandwidth connection.

David Holman, a director of Armour Communications said: “At our customers request we have upgraded Armour Mobile to provide the option for a participant in a call to select voice or video during a call, giving users maximum flexibility with their communications and we have extended the management features of chat groups. This provides our users with all the great features they see in some consumer-grade apps, but from a known and trusted organisation.”

A government certified solution, Armour Mobile can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving enterprises high security, control and privacy for their corporate data.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

 

Comparing ‘Consumer’ to ‘Enterprise’ Messaging apps is like comparing ‘road cars’ to ‘racing cars’

So what exactly are the dangers of consumer (ie. free) apps?  And what do Enterprise-grade apps provide that the free apps don’t?  Sometimes when your end-users want to download a consumer app and start using it, it isn’t always clear what extra benefits enterprise-grade apps provide, so here we compare the two.

First a note about Encryption

Free apps have encryption and so to do enterprise apps.  There is so much more to security than encryption.  Encryption is (or should be) a given, it is rarely the weakest link, and therefore rarely the attack vector.  The dangers in using free apps for business revolve far more around how your sensitive data is managed, where it goes and who has access to it.

Secure Numbers

Consumer apps need a GSM number to use as the ‘secure number’.  This number is used to send activation codes in clear text via an SMS message.  This is easy to intercept and can compromise any security before it is even activated.

Enterprise apps can use GSM numbers as the secure number too, or a randomly assigned number for the ‘secure number’.  But activation is NOT via an insecure SMS, it can be via a variety of secure activation methods so it is very much harder to compromise.

Armour Mobile

We are able to utilise existing GSM numbers, or use another ‘secure number’. The process for activation and provisioning of Armour Mobile can be designed around the user’s specific requirements, using secure activation methods.

Harvesting your data

Consumer apps run on the vendor’s infrastructure only, and even if the content is protected, the metadata of each call or message is visible to the vendor. This can be cross matched with other user ID owned by the provider to build up a detailed picture of user habits, geo-location, and common friends/contacts, which can be used for profiling and targeted advertising.  Or sold to third parties for a similar purpose.

Enterprise apps run on a subscription business model, so there is no need to harvest user metadata in order to make a profit.  Serious cyber security vendors have no interest in selling data or advertising, their emphasis is on security and maintaining their credibility and brand value.

Armour Mobile

As well as our secure Cloud option, for fast provisioning, Armour Mobile is also available as an ‘on-premises’ option, meaning that not only is the content of the calls/messages secure, but nobody outside of the organisation has access to the metadata.  This ensures complete security and privacy regarding when, where and who users are communicating with.

Sharing your Contacts

Consumer apps typically upload users’ native contacts list to their global database upon activation. This enables them to cross match friends/contacts so that the user knows who else is using the same app. While this is certainly very user friendly, it does mean that the vendor has your GSM number, and also those of all your contacts for potential marketing purposes. All of those users will also have had their details cross matched to their social media profiles, so that the vendor can start to build up really detailed knowledge of the user, their contacts, what they like, and what they look like.  Yes, we are talking facial recognition here!

For more detail on this worrying scenario, read our blog Whose list are you on?

Enterprise apps do NOT need to upload the native phone directory.

Armour Mobile

With Armour Mobile you are able to import a bespoke directory of secure contacts for your users. In some cases real time integration between the app and the organisation’s internal Active Directory is possible. For certain public sector/government organisations there is also the option to link to address books of other departments that are also using Armour Mobile.

Securing your Communities

Consumer apps run on the vendor’s cloud and work in a single global group community where anyone can call anyone if you know their number. This is great for private communication between friends, but it is less than ideal for enterprise users.  Furthermore, it can put users at risk of phishing scams sent from within the messaging app, which can be perpetrated by anyone who has access to a list of valid GSM numbers, whether obtained legally or from the dark web.

Even when running in the ‘cloud’ Enterprise apps can offer cryptographically segregated user groups or ‘communities’ that are ring fenced from all other user groups.

Armour Mobile

We are able to offer to the option for different communities to be white listed to enable communication between communities for collaborative working purposes.  For On-premises installations, communities can be used to offer segregation between different departments or user groups, for increased security.

Third party certification

Consumer apps are rarely, if ever, subject to any independent certification of their security procedures.

Good enterprise apps are certified by Government cyber security experts or international bodies such as NATO.

Armour Mobile

Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Intelligent Support v Automation

Consumer apps typically have no human interaction during the activation process, which means no voice on the end of the phone for technical support if required.

Enterprise apps usually have an account manager assigned during the sales and trial process, with a technical support email and phone line available after the sale.  This is invaluable if, for example, a board level exec, senior manager or VIP user is having issues that need resolving quickly.

Armour Mobile

We provide a range of support services that enable organisations to be up and running with Armour Mobile secure communications within hours for our Cloud solution. We are also able to provide bespoke solutions tailored to specific high security requirements, based on individual use cases.

Management of sent and received files

Some consumer apps store sent and received files on the mobile device’s SD card, unencrypted, and then don’t delete them later. Sometimes this is the case, even when the delete option has been set. The files may remain, in an unencrypted form even if the app is uninstalled.

Enterprise apps that focus on security will keep sent and received files encrypted, only exposing them in unencrypted form to be read briefly by the third party viewer that displays them. Any such files are then removed as soon as the user has finished viewing them.

Armour Mobile

All files are kept encrypted, with data encrypted at rest as well as in transit. In addition, Armour Mobile will not run on a jail-broken phone meaning that security apps performed by the app stores and native in-built security remains intact.  Armour Mobile also isolates the microphone to prevent data leakage.

In Summary

When dealing with sensitive business communications of any type (voice, message, text, video, attachments) you need to be sure of exactly where your data and meta data is going, and who can see it.  You also need to think about what other information that you may be giving away, for example, your contacts list, and other personal information from social media that can be used for profiling.

And one final thought – if you don’t want the world and his wife to see your corporate communications, you need to use an enterprise-grade app, like Armour Mobile, rather than a consumer app downloaded for free.  In this instance, you really do get what you paid for.

Security Spectre Causes Meltdown – What’s Going On?

Spectre

You may be aware of significant security concerns raised in the last few days regarding the “Meltdown” and “Spectre” flaws identified in a variety of processors found in PCs, smartphones, servers and other products. This is an advisory to all our customers regarding Armour’s assessment of the effect of these issues.

What’s going on?

Firstly, a brief outline of these issues:*

“Meltdown” is the name given to a side-channel attack on memory isolation that affects most Intel chips since at least 2010, as well as a few Arm cores. “Meltdown” allows a normal (user) application to read (private) kernel memory, potentially allowing the app to steal passwords, cryptographic keys, and other secrets. It is easy to exploit, but easy to patch – and workarounds to kill the vulnerability are available for Windows and Linux, and are already in macOS High Sierra, for Intel parts. There are Linux kernel patches available for the Cortex-A75.

“Spectre” affects, to varying degrees, Intel, AMD, and Arm. Depending on your CPU, “Spectre” allows normal apps to potentially steal information from other apps, the kernel, or the underlying hypervisor. “Spectre” is difficult to exploit, but also difficult to fully patch, so could pose an ongoing threat for some time.

One always needs to ask whether a theoretical vulnerability can be exploited in the real world: in this case the (multiple) teams who reported these problems have proof-of-concept exploits to demonstrate the vulnerabilities so the threat is definitely real.

Although you might initially be concerned about the vulnerabilities this introduces to your personal computer or mobile phone, the wider danger is where data from many users is processed on the same machine, as happens in almost every cloud-based system where multiple applications (often from different companies) run alongside each other, but separated within ‘virtual’ environments (or ‘containers’). These vulnerabilities could allow a malicious application to examine the private data (e.g. customer passwords or cryptographic keys) for another company’s application when present on the same physical machine.

How does this affect Armour customers?

There are three key ways these vulnerabilities need to be addressed:

  • Vulnerable Devices – it’s common sense, but we recommend that all customers ensure that their individual devices (PCs, smartphones) have the latest operating system security updates – not all systems have fixes for “Meltdown” or “Spectre” yet, so keep an eye out for further updates.
  • Vulnerable Servers – follow the same principle as for other devices; make sure you apply the latest operating system updates. (It is possible that patching for these vulnerabilities may have some performance impact, but this has still to be fully evaluated.)
  • Virtualisation – Armour’s server components can be run in a virtual environment, which could be affected by these vulnerabilities; however, it’s important to note that the Armour security architecture already minimises any potential effects:

Customers running an on-premises Armour system have total control over how and where the Armour components are run: if there are no third-party applications or organisations running in the same virtual environments, then the Armour components can’t be attacked by these vulnerabilities.

The really sensitive data (e.g. cryptographic keys) in any Armour system are not exposed to the front-end servers (which is where an attacker might try to insert malware to exploit these vulnerabilities) because this information is stored in the ‘inner’ (more secure) servers.

* For more detail, we suggest you check your preferred, technical web site, as understanding of these issues, their effects and how to counter them, is continually evolving at this time; the formal vulnerability description is on the CERT web page under ID 584653 and MITRE vulnerabilities CVE-2017-5753 and CVE-2017-5715 (for “Spectre”) and CVE-2017-5754 (for “Meltdown”). Of course it’s obligatory for any cyber issue to be given its own web page and fancy icon, hence you could look at https://meltdownattack.com/ or https://spectreattack.com/, though these both direct you to the same joint page.

KRACK WiFi hacks and your mobile phone – How smart are you?

Cracked Wifi

When news of the KRACK vulnerability in Wi-Fi networks protected by WPA2 hit the headlines a while back there was widespread concern that so many devices were affected, particularly those unloved, back room (internet of things) type devices that are often forgotten about and therefore rarely patched or managed.  While KRACK (Key Reinstallation Attack) is not as much of a problem as at first reported (miscreants need to be within Wi-Fi distance to execute the attack, and it mainly only affects Android and Linux users due to peculiarities in the way that Windows and iOS use WPA2) it does serve to highlight just how complex our networks and technology stack have become.

A couple of weeks later we heard about Eavesdropper, a vulnerability caused by software developers hardcoding credentials into mobile apps, that could potentially result in large-scale exposure of data and metadata in about 700 mobile apps.

Mobile Security = Enterprise Cybersecurity

All of this brings me to the point that I made in my presentation at DSEI, with the escalation in complexity of technology, and the pervasive nature of wireless connectivity of all kinds, mobile devices are now a key part of enterprise cybersecurity.  Mobility increases productivity, communication and collaboration, but it also increases risk. Smartphones and tablets are the new end point, handling increasing amounts of sensitive, corporate data – according to Gartner 27% of corporate data traffic will bypass perimeter security by 2021.

Data is Valuable

There is much more valuable data held on mobile phones than most users would credit. Documents, chat/messages, videos, voice calls and messages, address book, calendar and location are all data, all valuable and to the right criminal, it is well worth stealing.

For everyday users of Wi-Fi KRACK is unlikely to pose much of a threat, however, for those that may be actively targeted due to the work they do, government officials, journalists, law enforcement, covert opps, board level executives, high net worth individuals/royalty/celebrities, it could be an easy way to hijack sensitive and therefore valuable information.

For those holding security conscious positions, selecting the right apps and security solutions can make all the difference when a new vulnerability is uncovered.  In the case of Armour Mobile users, even if Wi-Fi traffic is intercepted using KRACK, all that can be seen is encrypted data. The most that the hacker will be able to deduce is that the user has Armour, they certainly won’t be able to listen in.

Certified Apps, Additional Assurance

The WPA2 KRACK vulnerability is one of a myriad of ways that mobile data can be intercepted, but if users have end-to-end encryption, and apps are from a trusted, certified source, so that you know exactly who developed them and where the data sits/goes, most users will be protected from a lot of these issues. This also helps to minimize the likelihood of malware getting on your mobile device, because once a device is infected, even securely designed apps can be at risk of attack.

Knowing and trusting the provenance of your apps, and that the app developer employs industry best practice should be another key point. Software that has been certified by an independent third party (such as NCSC) provides additional assurance that you are buying exactly what you think you are buying. It also provides a level of assurance that the app is being carefully monitored and should any vulnerabilities be found, you will be notified in good time, and patches will be made available as soon as possible.

The mobile is the new end point, it has improved productivity immeasurably, but so too has the risk. Your data is too valuable to trust to ‘free’ security. Be smart with your users’ smartphones and ensure you only use certified apps.

Is there an ‘eavesdropper’ in your mobile apps?

Just recently a story caught my eye that illustrated like no other the importance of trusting your software developers, and really checking the provenance of any apps that you use.

The story, broken by Appthority, was about a vulnerability dubbed ‘eavesdropper’ that could have resulted in a large-scale exposure of data and metadata in mobile apps. The vulnerability is caused by software developers carelessly hardcoding their credentials into mobile apps that use the Twilio Rest API or SDK. Twilio has responded quickly to news of the vulnerability and reached out to all the developers with affected apps, of which there are apparently 700, some 170 of which are still available on the app stores.

Appthority claim that over a lifetime of poor coding practice, developers using the same credentials can expose massive amounts of sensitive data including call records, minutes of calls, minutes of call audio recordings, and SMS and MMS texts.  We’ve written before about the importance of protecting metadata, and once again, here is another instance where metadata has potentially been compromised.

While Apple are fairly aggressive at pushing security updates to end users, once Android devices have ceased to be the latest model, the same cannot be said. Android devices are notoriously under-patched and under-maintained – a headache for any IT department with users that insist on using older Android devices for business use.

This is another example, if any were needed, of the advantages of using an app that is reviewed and certified by a recognized and trusted authority. This type of vulnerability, caused by poor practice, is exactly the type of flaw that NCSC looks for during its certification process.

Unlike some other suppliers in the ‘secure communications’ space, Armour would never use any third-party analytics or tracking libraries and our app does not communicate with any such third-party servers. It’s for the same reason (the trust of our users) that we don’t outsource any of our development work and only use carefully selected third-party libraries (which are also constantly monitored for security updates). Nor will you find any bitcoin miners slipped into the app when you are not looking!

There is a reason why some of these apps are free to use.  It is worth keeping in mind that if you want genuine security, you do need to pay a little for it.

Armour Comms sees momentum building with three new Government organisations and 15 new partners globally

Growth accelerates as demand for Secure Mobile communications increases across Government and Enterprise 

London, 14 November 2017: Armour Communications, a leading provider of specialist, secure communications solutions, has seen unprecedented growth in the last few months with many new customers and industry partners. During the last quarter Armour Comms has agreed terms/installed its flagship Armour Mobile at three high profile Government departments, and has got its fledgling US operation off to a flying start with signed deals. Armour is now working with 15 technology and innovation partners to deliver its higher assurance solution Armour Black, and its Push To Talk variant Armour Blue. In order to support partners and customers Armour has also launched a new website which will include portals for specific content and marketing material for partner and customer audiences.

David Holman, a director at Armour Communications said: “We’ve had a very strong quarter. As well as three major contracts signed, we have pilot projects running with several more government departments and law enforcement agencies. We have a number of new technology partners, who will be instrumental in our development of further higher assurance solutions through our Armour Black family of products. To support all this growth and development we have recruited several new members of staff for development, quality and testing.”

As well as 15 technology and innovation partners that Armour Comms is currently working with internationally, the company is actively looking to increase that number and expects to have four more partners to announce by the end of the year.

In the US, Armour Mobile has been selected by Huckworthy, a HUBZone certified small business and US Department of Defence Mentor Protégé Program Participant under The Boeing Company, to be an integral part of Huckworthy’s technology solutions. The company selected Armour Mobile for its ability to be offered as a private or cloud hosted solution, its ability to deliver voice, video, messaging and data transfer security with internationally recognised certifications, and a trusted UK based pedigree.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. It is FIPS-140-2 validated and has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Off means off – well not always!

Apple

Changes in iOS 11 that could jeopardize your users’ security settings

It’s hard enough to get users to manage their security settings.  Now Apple have thrown another complication into the equation.  With the latest iOS v11, users may think that they have turned off Wi-Fi and/or Bluetooth from their control centre, only to find that both have mysteriously switched themselves back on again later.

This is because in iOS 11, when a user turns off Wi-Fi and Bluetooth from the control centre (which they are used to doing in iOS 10), although the button indicates that they are off, they are still in fact connected to some Apple services. That’s not all, should the user move location, the Wi-Fi and Bluetooth will come back on, and, both reset themselves the next morning at 5am anyway.

The only way for users to completely disable Wi-Fi and Bluetooth is either to enable Airplane mode or navigate to Settings and switch them off from there.

With the known vulnerabilities in Bluetooth and the latest WiFi key attack (KRACK), it is very important that users understand exactly what their security settings are really doing. These recent changes only serve to highlight just how dependent we all are on the operating systems that underpin our mobile devices, and on the manufacturers for fully informing us regarding updates to how the security settings work. IT departments need to be ever-vigilant to such changes, in order to keep their users fully up to date.

These changes to iOS 11 also highlight just how important it is for those in high threat situations to have a locked down, totally controlled application for secure communications – certainly one that doesn’t just reset itself each morning!

With prices like these – anyone could be listening to your mobile calls!

Eavesdrop

IMSI catchers now available for EU300

With Mobile World Congress drawing to a close for another year, we were very interested to see this story, highlighted to us by one of our colleagues in Spain. It confirms what we were already well aware of; that you don’t need to be a nation state, major law enforcement (or even the now defunct News of the World!) to have the resources to tap into people’s mobile calls anymore.  IMSI catchers (see our previous blog for further explanation) can be purchased online for EU300 according to this story: http://www.elconfidencialdigital.com/seguridad/Maletines-espiar-conversaciones-moviles-euros_0_2881511824.html.  For non-Spanish speakers, Google Translate does a good job at the click of a button.

Not only are the number of attack vectors increasing exponentially, so too are the number of people/organisations/criminals able to execute these attacks. With the barrier to entry dropped so low, this means that the number of potential victims of phone tapping also increases and is now well beyond the high threat targets that we would expect (intelligence community, law enforcement, government officials, celebrities). Anyone that talks about or exchanges commercially sensitive information such as new product details, formulae, industrial secrets, or intellectual property is now at risk!

This only serves to highlight that we all need to be a lot more aware of the potential hazards with the technology we use.

And if you do fancy treating yourself to an IMSI catcher (to find out what your friends, neighbours, work colleagues are up to), you might want to consider a more streamlined rucksack than the one shown in the article!!

NOTE: Much-respected cryptography expert Bruce Schneier recognised these same risks in his blog https://www.schneier.com/blog/archives/2017/04/surveillance_an_2.html

Whose list are you on?

Big data – big trouble

If you’re using WhatsApp, you’ll be on a list somewhere. But not just the lists of friends, family, and work colleagues that you’d expect. Turns out that it is very easy to build a super list using WhatsApp in a web browser.

APIs are available on the web that enable developers, or anyone else for that matter, to request information about any number registered in WhatsApp, it doesn’t need to be in your address book. Information that is freely available includes your profile picture, your about text and your online/offline status. Using this method it is possible to build a database of almost limitless size and construct timelines showing your activity.

Such a database opens up a lot of nefarious possibilities. As the database builds it becomes possible to run queries such as; When was this phone number online? When profile pictures are brought into the equation, with facial recognition technology (which most people use on Facebook), it becomes possible to take a photo of someone and then query the database to find out who they are and their phone number. Apart from being downright creepy, in certain oppressive regimes this could be extremely dangerous.  For those that travel to exotic locations for business, these possibilities are certainly worth keeping in mind.

There are some steps that savvy users can take to guard against this type of abuse of their data.  Casual WhatsApp users should check their privacy settings.

Remember WhatsApp is just an example that has featured in the news of late – almost any other social media app is likely to have similar vulnerabilities and issues with privacy, including where and how your data is stored.

For any sensitive, official or corporate communications social media apps such as WhatsApp should never be used. Better to use an app that you control so that you know where your data is at all times, and that has security and privacy baked in.