Malware and Spyware Attacking Cell Phones

 

Group 3

 

Christopher Gooch, Destiny Logan, and Jessica Russell

 

Key Words:  Malware, phishing scam, spyware, Trojan horse, virus, and worm.

 

Of the over two billion cell phones that exist today, more than 40 million smart phones were sold last year and it is projected that in 2009 there will be 350 million sold. These mobile devices do many jobs, from scanning information to working as a pocket computer and installing software applications from various sources. Many can take pictures, play video, act as a GPS navigator and act as MP3 players. These new cell phones all over the world are being compromised and infected with viruses, Trojan horses, and worms. The original cell phone just connected phone calls via satellite and there was no reason to be concerned about the safety of the consumer. Today there are more than 300 kinds of malware infecting smartphones. These infections can destroy not only the privacy of the consumer but, infect the entire financial network of the phone system. Protective software for smart phones is desperately needed to cork the holes that malicious individuals have found to exploit the system.

 

Researchers are studying the complex cellular system to stop cyber-criminals from stealing financial data, business secrets, and computer resources. Criminals are now able to assemble groups of hacked machines to forward bulk e-mail and phishing scams. There are even cases of blackmailers who extort money with threats of digital destruction or virtual blockades. Because there is a lack of technical expertise, these criminals are increasingly difficult to locate. The bigger the business is then there will be a bigger attraction to infect the system. Currently most of the worms and Trojan horses that have been released infect the Symbian operating system. The Symbian system runs more than 70 percent of smartphones including, Nokia, Samsung, Sony Ericson and Motorola. One reason that we have not heard much about the problem and companies have been slow to respond to the problem is because most of the Symbian systems are located in Europe and Southeast Asia. Carriers all over the world need to design not just software that can block these viruses but they need to look forward to design walls that will stop malware from mutating into a new species that will attack and subvert useful software. 

 

Smartphones protective software developers must address the difference between cell phones and computers, which is the fact that cell phones have a built in billing system unlike your personal computer. For example, there is amazing potential for profiteers to design viruses that will infect a phone to build huge bills that would cripple the unfortunate user. One Trojan called RedBrowser sends a continuous stream of text messages from any phone that it infects to a number in Russia. Each message is charged at a premium rate of around five dollars. Some carriers hold their customers liable for unauthorized transactions and the criminals, who own the premium number, rake in the premium fees. Other known malware discovered is the Cabir worm that connects to Bluetooth and copies itself causing the batteries to drain, the CommWarrior worm that replicates via the Bluetooth and sends itself as an MMs file to all the numbers in the phone address book incurring charges for every file the worm sends and some variants disable the phone entirely. Two Trojan horses out are Doomboot that entices users to download and install it and the before mentioned RedBrowser. There is even an infection that looks like Spyware called FlexiSpy that sends a log of your phone calls and copies of texts and messages to a commercial Internet server for viewing by a third party.

 

There is some current antivirus software to protect smartphones on the market. Few customers have installed it. Mobile spam might be annoying and interrupt the user so many do not feel the need but, a recent scam called "SMishing" uses text messaging to trick users into disclosing personal information. The problem is that products are still in their early stages and sometimes only available for certain phones. Cellular operators in North America have spread their markets across the various companies. Right now only a few varieties of malware infect the Pocket PC, the Blackberry, or Windows Mobile.  There has been the introduction of new protective software including F-Secure, McAfee Virus Scan Mobile, Symnatec an anti-virus for handhelds and Trend Micro a mobile security. Many users do not see a need for protection and those that have some warning, accept files when the device warns of a security risk. When asked if they will accept the anonymous information, some actually chose "no" but the worm will not accept “no” for an answer and will give the user no time to hit the menu option to disable their Bluetooth. 

 

The indispensable cell phone is becoming more vulnerable.  If cell phone service providers do not address the problem, consumers will change or downgrade their plans.  Software that was designed for parents to monitor their children's messages can be used by abusive spouses to keep track of what is going on with their partner. Because the abuse is endless, technology must keep up with the devious mind of the criminal. If the cellular industry ignores the warnings of global infiltration of their systems, the industry will fall apart. Not only do they lose customers but all of the companies that are connected to the new technology also lose. This young technology can survive if the research stays on top of the inevitable penetration by malicious malware. The security research community is looking into all the vulnerabilities but, it is a challenge. There is a group called the Trusted Computing Group that phone manufacturers have supported that sets the standards for the microcircuitry inside the phones so that it is harder for the malware to steal sensitive material or hack into the mechanisms. 

 

It is going to take the combination of industry standards, laws that crack down on hacking not just into computers but into the cell phones, and due diligence by the consumer. We do not sit idly by and let people steal our identities (although it sure seems to be happening a lot). We cannot let the bad guys steal our peace of mind while we are enjoying talking on our smartphones and using this new technology. Cellular companies must aggressively filter traffic on their networks. Businesses must educate their employees on security. The technology can only do so much. The consumer must be aware of sensitive documents that they are putting on their devices. If Houston Nutt’s messages are public domain, everything that you say and do on your cell phone is fair game.

References

 

eSchool News Staff. Malware migrates to cell phones. eSchool News Online. Retrieved April, 12 2007, from http://www.eschoolnews.com/news/showstory.cfm

 

Evers, Joris. Spy program snoops on cell phones. CNET News.com. Retrieved April, 12 2007, from http://www.news.com.com/2102-1029_3-6055760.html?tag=st.util.print

 

Hypponen, Mikko. (2006, November). Malware goes Mobile. Scientific American, 70-77.

 

Lemos, Robert. “Spat over cell-phone spy program.” Retrieved April, 12 2007, from http://www.securityfocus.com/brief/175

 

Murray, Mike. Can cell phones compromise your network? Business Week Online. Retrieved April 12, 2007, from http://www.businessweek.com/technology/content/apr2006/tc20060413_027470.htm

 

Naraine, Ryan. “New cell phone malware packs double punch.” Retrieved April 12, 2007, from http://www.eweek.com/article2/0,1895,1750109,00.asp

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Group 3 Questions

 

  1. What is the software that reveals private information about the user or computer system to eavesdroppers?

 

    1. Hardware
    2. Spyware
    3. Inspectorware
    4. Bushware

                                          

  1. How many Smartphones are expected to be sold in 2009?

 

    1. 350 million
    2. 15 million
    3. 200 million
    4. 900 zillion

 

  1. How many kinds of malware are infecting smartphones?

 

    1. more than 300
    2. 100
    3. 39
    4. 69

 

  1. RedBrowser is what kind of malware?

 

    1. Stallion Horse
    2. Trojan Horse
    3. Palomino Horse
    4. Seabiscuit

 

  1. Which one of these is not anti-virus software?

 

    1. F-Secure
    2. McAfee
    3. Symnatec
    4. FlexiSpy

 

  1. What is a self-replicating code that automatically spreads across a network?

 

    1. Worm
    2. Virus
    3. Trojan Horse
    4. Spyware

 

  1. What was the recent text messaging scam called?

 

A.WHishing

B. SMishing

C. PHishing

D. DHishing