Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

BayThreat Follow-up: More About Mobile Devices and Privacy

We just saw a recent post here on SpiderLabs Anterior about one of mostly used functionalities used on mobile devices and it's applications and how this could be exploited by malware apps and real criminals. Unfortunately, this is not the only piece of information mobile devices are mostly sharing with the humanity.

Last week I presented at the BayThreat conference some concerns about a possible combination of facts that shows the mobile ecosystem today:

  • The ease of configuration/ usability
  • the behavior of some technologies implemented on these devices
  • how some combinations of those could affect the privacy of the users.

So, what does this all mean?

Any electronic device capable of using the internet (phone, media player, computer, tablet, laptop computer) has a name associated to it. When one first starts any of these devices, there is a configuration phase/ wizard when the users name these devices. Most of these wizard programs ask the user for the user's name, and not the name the user wants to give to the device. The result of this is that many devices out there are named something like FirstName-LastName-TypeOfDevice. Is this a problem? Not necessarily, let's put that aside for a second.

Once a device joins a local network (home, work, hotspot), there are several ways to "get to the internet", and all of these ways try to be the more transparent as possible for the user. Obviously, in a corporate network, some security controls should be in place and the user might have to go through some additional steps to get to the network. At home, the user might simply have a passphrase for the WiFi network, at a hotspot a web-portal login and so on.

In the background, several things happen and our usual network protocols are out there. Part of the usability experience, devices have to be discovered or in a very transparent way to the user, find other devices on the network.

Some of the protocols used are very application specific, like controlling your media player using your tablet. Other protocols are out there for the device to discover and be discovered. In one of these protocols, what do we see?


I am sure at this point you understand the implications of this in a public hotspot for example. But other similar protocols will give out information from corporate networks, like company names, domain names that might reveal regional offices names/ locations, etc.

There are other "discover-like" multicast based protocols, in either ipv4 or ipv6 that attention could be spent on.

But the device has to be connected to a network in order for any protocols to communicate, correct? Yes.

What happens when a device has its WiFi interface on but doesn't connect to anything? It repeatedly cycles through the list of known networks.

Known networks are, at least a very good amount of the ESSIDs a device has been connected to. And that is simply how WiFi works, although one should be able to delete WiFi profiles from a device. Could this be a privacy problem?

It will always depend on the context.

Let's analyze the made-up list below assuming it is the list of ESSIDs a mobile device not connected to any network will be looking for to connect:

Coffee Shop

McCarran WiFi

Airline VIP Lounge



Miami Airport WiFi




Hospital General

Putting a little thought on it and use of foreign language skills, we can safely assume this person is in the dentistry field, went to Las Vegas for a conference, had a connection in Miami, probably flies a lot since it has access to airlines lounges, lives in a Spanish speaking country and probably also teaches at an University on top of working at a hospital.

The example above seems to be a little bit overkill, but it is not. The ESSIDs at most of the public places have really obvious names; sometimes companies also use ESSID names that will give away where the person who owns that device works.

All of the above is mostly food for thought, but if you start putting all of this together, our trusty mobile devices could easily reveal very important information about us.

Latest SpiderLabs Blogs

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a...

Read More

The Sentinel’s Watch: Building a Security Reporting Framework

Imagine being on shift as the guard of a fortress. Your job is to identify threats as they approach the perimeter. The more methods you have for detecting those threats, the better your chances of...

Read More

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the Advanced IP Scanner installer, which contained a backdoored DLL module. Our client had been searching for...

Read More