QuoStar safeguards communications and prevents hostile interception of sensitive IP with Armour Mobile

QuoStar

 “Armour Mobile was the standout solution for its superior functionality, use and ease of deployment. The client’s communications are now secure and the cost savings from no longer requiring hand delivery of documents has been immediate and substantial.”

  • Simon Gadsby, Chief Operating Officer, QuoStar

 

QuoStar is an IT support and consultancy provider that specialises in businesses going through growth and change. When one of its international clients reported that it was experiencing network traffic interception from global threat actors,the team at QuoStar set about finding a solution to secure telecommunications.  Armour Mobile was deployed into the client’s environment and, upon seeing the benefits, QuoStar adopted the Armour solution to safeguard their own sensitive communications.

Business Drivers

QuoStar’s client required a high assurance communications platform for secure conference calls, messaging and document sharing across teams in multiple international locations. The client was keen to protect communications that were at risk of interception. To mitigate risk, documents were dispatched via personal courier services ensuring all documents were hand-held until reaching the final destination. This method was hugely costly, both financially and in terms of resources, with documents travelling by hand from country to country and across continents. A new solution was required that could:

  • Provide secure conferencing for numerous participants
  • Secure intra-company and company to company communications
  • Ensure calls and associated metadata are kept private
  • Protect data sent in messages, text or as attachments

 

The Solution

It was important for a new solution to be cost-effective, easy to use and incorporate advanced security techniques to ensure communications could not be intercepted or compromised. After assessing several solutions Armour Mobile was selected for its wide range of features and ease of deployment.

Armour Mobile hosted on Armour’s secure cloud was deployed providing a trusted platform for communications to be set up, enterprise-wide, within hours, followed by an Armour Mobile On-Premises solution enabling complete control of all meta-data. The Armour solution has enabled the client to benefit from economies of scale, savings associated with using VoIP technology, all in a secure environment. 

Secure collaboration

Conference calls and group messaging is an important part of how teams communicate within the organisation. Using Armour Mobile allows multiple users to collaborate securely utilising the same communications platform. New team members can be provisioned quickly, with no additional hardware required. The Armour Mobile app is downloaded from the app store onto employees’ existing handsets and IT provisions the user in minutes, providing the employee with a safe and secure channel of communication.

One of the major benefits of Armour Mobile is its ease of use for the end-user.  With all the functionality and user experience associated with consumer-grade apps, there is no need to for training as the app is intuitive to use.

“Armour Mobile delivers the secure communications, information management and ease of deployment that the client wanted. The additional in-app security, closed group communications and encryption of data in motion provides the flexible and highly secure communications platform that the client required.”

Business Benefits

  • Secure communications – calls are protected from the risk of eavesdropping and documents from interception by outside agencies. Armour Mobile encrypts data in-transit and at rest, rendering it unreadable, and therefore protected. Sensitive corporate information sent via message or text is protected in line with EU General Data Protection Regulation (GDPR).
  • Substantial cost saving – deploying Armour Mobile has eliminated the need for couriers to hand deliver documents across the globe saving thousands of pounds within the first month of deployment and providing an instant Return on Investment.
  • Improved efficiency and productivity – the ability to securely transmit documents has resulted in greater productivity and efficiency. No longer hindered by the time delays of documents being delivered by hand, colleagues can quickly share information without delay.
  • Improved data security, governance and auditability – providing assured safe and secure communications across international operations has improved information assurance and data management processes. The client is able to assure its stakeholders that intra-firm communications are secure, encrypted and private. 

 

Appreciation drove adoption within QuoStar

“Seeing the real-world benefits of Armour Mobile in operation at the client’s premises prompted a review of our own secure communications. The ease of use and functionality across the whole communications spectrum drove the decision to adopt Armour Mobile for use amongst QuoStar’s executive management team. This is a testament to just how good Armour Mobile is.”

Media file jacking vulnerability found in WhatsApp and Telegram

File Jacking

Time lapse can be exploited to manipulate sensitive files for malicious intent

WhatsApp is back in the news following the release of new research by Symantec that reveals a vulnerability, termed ‘media file jacking’, that can affect WhatsApp and Telegram for Android. The security flaw allows malicious attackers to manipulate and modify media files such as commercial documents, photos and recordings in WhatsApp and Telegram based on the users’ settings.

The challenge of default settings

Android apps can store files and data in two storage locations: ‘internal’ and ‘external’ storage. Files saved to internal storage are accessible only by the app itself, meaning other apps cannot access them. Files saved to external storage – whether this is a generally-accessible folder on the device, or a public (e.g. cloud) folder –   can be modified by other apps or users beyond the app’s control. WhatsApp and Telegram may store media files in external storage (depending on user settings); this means that, devoid of any proper security measures in place, other apps with write-to-external storage permission can maliciously access and alter files. Effectively these apps place their root of trust in the storage medium rather than controlling the root of trust themselves.

End-to-end encryption is one part of the story

There is a common perception that instant messaging apps are immune from privacy risks and manipulation of attachments due to security features such as end-to-end encryption. Whilst end-to-end encryption is an effective mechanism it doesn’t stop the altering of files on external storage before or after the content is encrypted in transit. A user may innocently download an app unaware that it contains malware capable of manipulating files stored in external storage. An app that appears to be legitimate but is in fact malicious can intercept files, such as a PDF invoice file received via WhatsApp, then programmatically swap the displayed bank account information in the invoice with that of a malicious actor. Equally feasible (as described by Symantec) could be substitution of an altered audio recording giving fraudulent instructions, manipulation of an image or map for deceptive purposes, or even changing a Telegram channel feed to insert ‘fake news’.

Not all applications are created equally

Just as there is no such thing as a free lunch, the saying can be equally applied to applications. Data is a valuable currency and cyber criminals are in the business of quick and easy paydays. With any free app you don’t really know who has access to your information and because it’s free you don’t have any recourse. If you aren’t paying for the product, it means you ARE the product.

Employees should take security seriously but in the absence of a secure and easy to use app, people will naturally seek their own workaround solutions. Armour Mobile is a cost-effective and easy to use solution that works on everyday smartphones. With the same usability as consumer-grade apps, but with significantly enhanced security (secure message attachments are stored in the app’s encrypted database, i.e. controlling the ‘root of trust’ mentioned earlier) it could be the answer to your security needs. Contact us today to discuss a solution.

Global phone carriers targeted by espionage campaign

David and Goliath

It’s not often that global telcos could be described as a ‘David’ in a ‘David and Goliath’ analogy, but that is exactly what we are looking at in the latest hacking scandal.

In a story that broke this week in El Reg https://www.theregister.co.uk/2019/06/25/global_telcos_hacked/ and CNBC https://www.cnbc.com/2019/06/25/hackers-hit-telecommunications-firms-cybereason.html, a long running espionage campaign has been waged by (it is alleged) the Chinese government against at least ten cellular telcos around the world.  While a telco might have a security team of 50 people, huge by comparison to most organisations, this is miniscule when compared to the resources of a nation state, hence the David and Goliath reference. The campaign, which has apparently been running for several years, has even involved VPNs being set up within the telcos’ own infrastructure so that the perpetrators could snoop more quickly and easily on their targets.  So the story goes, the campaign was aimed at 20 to 30 high value targets, and the snoopers were able to access hundreds of gigabytes of phone records, text messages, device and user metadata and location data for hundreds of millions of subscribers.

This is another reminder that you can’t necessarily rely on your telco or ISP to protect your data and metadata. This is not because they are particularly negligent or complicit, but simply that flaws in the old technology, that underpins most networks around the world, can be exploited by nation states with almost limitless resources.

If you don’t want to be tracked, if you want to keep your communications private, if you discuss company intellectual property or trade secrets that you don’t want your competitors to learn about, if you are a journalist, aid worker, or special/covert services operating in an unfriendly regime, you need to take steps to ensure that your mobile data is protected.

Watch this space for more on this story in the coming weeks.

Royal Signals cyclist continues gruelling training schedule

A couple of months ago I reported that Armour Comms is proudly supporting Army Reservist Mark Howells.  We have now extended our support to include the whole cycling team of the Royal Signals.

Fresh back from training camp, Mark has been filling me in on his training schedule for the rest of the year – a budding team triathlete, this includes swimming as well as cycling.  Over the coming months he certainly has a packed diary, with events and qualifiers every weekend, including qualifiers for the Invictus Games.   As well as a few 100 milers (cycling) Mark will also be taking part in some criterium races (where participants race around a circuit, typically in a town), which tend to be fast and furious with a sprint finish.

We are very much looking forward to seeing Mark and the team in Armour colours, and wish everyone the very best of luck.

Watch this space for further updates.

Armour Comms expands into new office space as revenues double

Momentum

London, 4 June 2019: Armour Comms, the leading provider of specialist, secure communications solutions, has seen its most successful year to date with revenues set to double.  As a result of several significant new contracts, Armour Comms is taking on extra office space to house new appointments in product development, quality assurance and customer support. During the past year, Armour Comms has signed up another major Government department, taking the total number of central Government organisations using Armour Mobile to seven, as well as a whole host of other new clients across a range of industries, many of which were previously using less secure consumer-grade apps.

In April Armour Comms launched the latest version of its flagship product Armour Mobile at Cyber UK 2019 – the premier annual cyber security event run by NCSC (National Cyber Security Centre).  Armour Mobile v3.0, which introduces significant new features including biometric authentication (fingerprint and facial recognition), and rapid ‘auto’ provisioning of new users using secure QR codes or encrypted links within emails, was extremely well received, with enquiries from a broad range of sectors including NHS, transportation and financial services.

David Holman, Director at Armour Comms commented; “Armour Mobile is based on a Software as a Service delivery model, which has been gradually building up.  However, the last year has been particularly successful for Armour Comms, with many new contracts, new partners and recognition within the secure comms sector.  Several of our partner relationships are now approaching maturity and we expect to see significant revenue from this channel.”

Armour Comms’ solutions for secure communications work on everyday smartphones, tablets and Windows 10 desktops. With the same usability as consumer-grade apps, and  with significantly enhanced security, Armour Mobile supports voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Message Burn limits the lifespan of sensitive data at rest, where users can set a time at which their messages are automatically deleted (or as the name implies, ‘burn’) on the recipient’s device, for immediate action after being read, or at a given time after sending, according to confidentiality.

Using a FIPS 140-2 validated crypto core, Armour Mobile has been awarded many certifications including CPA (Commercial Product Assurance) from the NCSC and is included in the NATO Information Assurance catalogue.

In March 2019, Armour Mobile was shortlisted for the SC Awards Europe in the category of Best Mobile Security Solution.

In September 2019, Armour Comms will be exhibiting at DSEI, stand number N7-260, where a new technology solution will be previewed.

What does your smart phone say about you?

What does your smartphone say about you?

And we are not talking about design or style…

Keen fans of TV police dramas may be aware of the term ‘metadata’ which is frequently mentioned in the tense investigation scenes as the police narrow their focus on the perpetrator.  However how many of us actually know what metadata is?

Metadata is all the information relating to your phone call except the content of the call itself. It is the information we are used to seeing on itemised mobile phone bills; the when, how, from where and with whom we communicate. However, in the age of the smartphone, metadata collected from our daily activities actually reveals more about us than we realise. Most of us use our smartphone for more than just calls. It is our convenient go-to device for email, messaging, social media, banking, electronic wallet, GPS and camera, in addition to making calls. For many of us, losing our smartphones would impact our day-to-day lives far more than if we lost our credit card.

Digital footprint

A smartphone passively generates a vast amount of metadata, leaving behind a digital trace of the activity of its user. Each action and interaction provides a snapshot of our daily activities. Email addresses, websites visited, photos taken and files downloaded all present many new opportunities to gather metadata. Pieced together this information provides a comprehensive record of our associations and public movements, revealing a wealth of detail about our interactions, points of view and personal and professional associations. The reason metadata is so valuable is that it doesn’t lie, it is a digital footprint of our activities.

Stealing metadata

There are many ways that hackers can obtain metadata illegally. The SS7 vulnerability is well documented, and was one of the first topics that we wrote about in this blog (What’s up with WhatsApp). SS7 was designed over 40 years ago, long before phone hacking was considered a serious threat. SS7 stands for Signalling System No 7, also called the Common Channel Signalling System 7 in the US or Channel Interoffice Signalling 7 in the UK, and is the system that connects mobile phone and landline networks to each other. SS7 protocols enable phone networks to exchange information needed to process calls and text messages across disparate networks, including roaming on foreign networks, and to ensure correct billing. It also enables local number portability, prepaid payments, SMS and number translation.

Limitations in the SS7 protocols enable an attacker to mimic a victim’s device, steal personal data and to snoop on a users’ network communications. While this technique is used by nation states, there is equipment available on the dark web for a few hundred dollars that brings this type of attack into the domain of almost any tech-savvy criminal!

Fake base station

Exploiting the SS7 vulnerability isn’t the only means to access metadata. IMSI (international mobile subscriber identity) catchers, also known as fake base stations, are well established pieces of surveillance technology used by law enforcement all over the world. This portable device is used to intercept digital communications by essentially impersonating a legitimate mobile phone mast. The device can capture the IMSI of every phone in the area and intercept messages, calls and metadata, and even block phones from operating.

IMSI catchers are illegal to operate by parties other than law enforcement agencies and, even then, there are strict codes of conduct. However, for an attacker motivated by financial or commercial gain, remaining on the correct side of the law is rarely of concern! Videos freely available on YouTube show how a DIY IMSI catcher is relatively trivial to setup for a tech savvy criminal. The technology is available to anyone with a cheap laptop, $20 of readily available hardware and the ability to essentially copy and paste some commands into a computer terminal.

The power to control your own metadata

The fact that metadata is collated and sold by telecom carriers and internet companies shows how valuable it can be. Social media companies in particular are regularly sharing our metadata to third parties as a way of targeting advertising and this is typically the key value creator for such companies. Applying this capability across a population, it is possible to compile a very detailed, even invasive, picture of the population including behaviours and interactions which governments, organisations and cyber criminals can act upon.

Whilst it’s not possible to stop metadata from being generated, steps can be taken to control access to it. Armour Comms securely manages communications in the cloud ensuring metadata is minimised and protected. We also offer an on-premises solution for those who want complete control, allowing customers to store metadata on their own servers. Our solutions not only protect the content of communications, but also consider the broader aspects of securing your data and privacy

The weakest link

As the cyber security threat landscape evolves, it’s clear that securing modern methods of communication requires a new approach. Without secure practices, smartphones can effectively be viewed as surveillance devices, exposing confidential business dealings, intellectual property, state secrets, or commercially valuable information to risk. As the saying goes, you’re only as strong as your weakest link. If you fear that your mobile comms could be vulnerable to eavesdroppers, competitors or criminals then it’s time to act. Contact us today to discuss a solution.

Latest WhatsApp hack highlights dangers of using consumer-grade (free) apps for business

WhatsApp Hack

Businesses using Consumer Apps risk facing stiff regulatory fines for data loss or worse

London, 14 May 2019: Armour Communications, the leading provider of specialist, secure communications solutions, calls for organisations to stop using consumer-grade, free apps when handling sensitive or commercial information. For people with jobs where security is paramount, for example, journalists, humanitarians, activists or special services working in unfriendly regimes, a phone that has been hacked via an app could put life at risk. For others, the risk of individual’s private information or commercial data being accessed will damage an organisation’s brand integrity and share price.

David Holman, Director at Armour Comms said; “This latest case of a serious vulnerability in a consumer-grade app highlights the dangers of using free apps, and that they are simply not robust enough for business. While such apps claim that they are secure because they are encrypted, there is so much more to security than just encryption.  Encryption is rarely the weakest link, and therefore, unlikely to be targeted by hackers.

“While this particular exploit may have been to target people with specific jobs, there are various other everyday hacks that can be executed relatively easily by low level criminals against these types of product that put users’ data at risk.  Breaches of GDPR are a risk to every type of business and come with significant fines.”  https://www.armourcomms.com/2018/07/31/free-apps-you-might-get-more-than-you-bargained-for/?cat-slug=10

In 2018, German automotive supplier Continental AG banned its workers from using the messenger services WhatsApp and Snapchat on company phones, due to concerns about GDPR compliance and general security. https://www.cnbc.com/2018/06/05/continental-bans-facebooks-whatsapp-and-snap-incs-snapchat.html

Holman continued; “These free apps proliferate by stealth through organisations, unless firms take positive action, like in the case of Continental AG last year. There are enterprise-grade apps available that provide the same convenient user experience of consumer grade apps, while keeping the user in control of their data and metadata. Some of these apps, like

Armour Mobile, have been certified by the National Cyber Security Centre (NCSC), so users can be confident that the software is secure by design.”

Armour Comms’ solutions for secure communications work on everyday smartphones, tablets and Windows 10 desktops. With the same usability as consumer-grade apps, and  with significantly enhanced security, Armour Mobile supports voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments, sent/received/read message status and message ‘burn’ (automatic timed deletion).

Using a FIPS 140-2 validated crypto core, Armour Mobile has been awarded many certifications including CPA (Commercial Product Assurance) from the NCSC and is included in the NATO Information Assurance catalogue.

Biometrics – An extra layer of security

Biometrics

We will be showing the latest version of Armour Mobile at Cyber UK (24-25 April 2019), and one of our most exciting upgrades is the provision of the ability to use biometrics as an extra layer of authentication.

We haven’t just jumped on a bandwagon here, biometrics is an important development for security.  While our products use identity-based cryptography and are designed to enable secure, cross-platform communications by identifying and authenticating the end points, this doesn’t necessarily identify who is actually using the device.  (More about identity-based encryption (IBE) and its benefits in our previous blog post here: https://www.armourcomms.com/2018/02/27/are-you-talking-to-me/?cat-slug=10)

When biometric authentication is added to Armour Mobile, it also confirms that it is the right person using the phone.  Armour Mobile integrates with the biometric authentication algorithms on the latest smartphones (iOS and Android) and uses them to open the Armour Mobile app. The user simply logs in to our app using their fingerprint or face ID, which is authenticated by the device and – through its link into the mobile’s built-in, secure key store – can then unlock our app (when closed, our app’s data-at-rest is kept encrypted).

The biometric component makes it simpler to login without needing to retype a password every time. This convenience removes another of the (perceived) ease-of-use barriers to using a secure, enterprise app that has been designed for purpose, rather than a consumer-grade app.

We will be demoing exactly how it works on our stand B9 at Cyber UK, at the Scottish Event Campus,  Glasgow,  24 – 25 April.

In addition, we will be demonstrating full integration with Secure Chorus’ interoperability standards for encrypted voice calls, to a live audience, with Leonardo, BAE Applied Intelligence and a defence organisation. The interactive workshop, hosted by the NCSC and led by Secure Chorus takes place on 24 April at 14.00 and is part of Stream G.

Several of our partners are also exhibiting, including BAE Systems on stand E22, Amiosec on stand E20, Leonardo on stand E15, Qinetiq on stand B2, Nine23 on stand SBH15 and Templar Executives on stand SBH7.

So all in all, well worth a visit!  For more information and to register visit:  https://www.ncsc.gov.uk/section/cyberuk/overview