Malware and Spyware Attacking Cell Phones
Group 3
Christopher Gooch, Destiny Logan, and Jessica Russell
Key Words: Malware, phishing scam, spyware, Trojan horse, virus, and worm.
Of the over two billion cell phones that exist today, more than 40 million smart phones were sold last year and it is projected that in 2009 there will be 350 million sold. These mobile devices do many jobs, from scanning information to working as a pocket computer and installing software applications from various sources. Many can take pictures, play video, act as a GPS navigator and act as MP3 players. These new cell phones all over the world are being compromised and infected with viruses, Trojan horses, and worms. The original cell phone just connected phone calls via satellite and there was no reason to be concerned about the safety of the consumer. Today there are more than 300 kinds of malware infecting smartphones. These infections can destroy not only the privacy of the consumer but, infect the entire financial network of the phone system. Protective software for smart phones is desperately needed to cork the holes that malicious individuals have found to exploit the system.
Researchers are studying the complex cellular system to stop
cyber-criminals from stealing financial data, business secrets, and computer
resources. Criminals are now able to assemble groups of hacked machines to
forward bulk e-mail and phishing scams. There are
even cases of blackmailers who extort money with threats of digital destruction
or virtual blockades. Because there is a lack of technical expertise, these
criminals are increasingly difficult to locate. The bigger the business is then
there will be a bigger attraction to infect the system. Currently most of the
worms and Trojan horses that have been released infect the Symbian
operating system. The Symbian system runs more than
70 percent of smartphones including, Nokia, Samsung,
Sony Ericson and Motorola. One reason that we have not heard much about the
problem and companies have been slow to respond to the problem is because most
of the Symbian systems are located in
Smartphones protective software
developers must address the difference between cell phones and computers, which
is the fact that cell phones have a built in billing system unlike your
personal computer. For example, there is amazing potential for profiteers to
design viruses that will infect a phone to build huge bills that would cripple
the unfortunate user. One Trojan called RedBrowser
sends a continuous stream of text messages from any phone that it infects to a
number in
There is some current antivirus software to protect smartphones on the market. Few customers have installed it.
Mobile spam might be annoying and interrupt the user so many do not feel the
need but, a recent scam called "SMishing"
uses text messaging to trick users into disclosing personal information. The
problem is that products are still in their early stages and sometimes only
available for certain phones. Cellular operators in
The indispensable cell phone is becoming more vulnerable. If cell phone service providers do not address the problem, consumers will change or downgrade their plans. Software that was designed for parents to monitor their children's messages can be used by abusive spouses to keep track of what is going on with their partner. Because the abuse is endless, technology must keep up with the devious mind of the criminal. If the cellular industry ignores the warnings of global infiltration of their systems, the industry will fall apart. Not only do they lose customers but all of the companies that are connected to the new technology also lose. This young technology can survive if the research stays on top of the inevitable penetration by malicious malware. The security research community is looking into all the vulnerabilities but, it is a challenge. There is a group called the Trusted Computing Group that phone manufacturers have supported that sets the standards for the microcircuitry inside the phones so that it is harder for the malware to steal sensitive material or hack into the mechanisms.
It is going to take the combination of industry standards, laws that crack down on hacking not just into computers but into the cell phones, and due diligence by the consumer. We do not sit idly by and let people steal our identities (although it sure seems to be happening a lot). We cannot let the bad guys steal our peace of mind while we are enjoying talking on our smartphones and using this new technology. Cellular companies must aggressively filter traffic on their networks. Businesses must educate their employees on security. The technology can only do so much. The consumer must be aware of sensitive documents that they are putting on their devices. If Houston Nutt’s messages are public domain, everything that you say and do on your cell phone is fair game.
References
eSchool News Staff. Malware migrates to cell phones. eSchool News Online. Retrieved
Evers, Joris. Spy program snoops on cell phones. CNET News.com.
Retrieved
Hypponen, Mikko. (2006, November). Malware goes
Lemos, Robert. “Spat over cell-phone spy program.”
Retrieved
Murray, Mike. Can
cell phones compromise your network? Business Week Online. Retrieved
Naraine, Ryan. “New cell phone malware
packs double punch.” Retrieved
Group 3 Questions
A.WHishing
B. SMishing
C. PHishing
D. DHishing