Tag Archive for Phone

SmartPhone Zombie Apocalypse

SmartPhone Zombie ApocalypseIf you have a smartphone, online criminals may soon have your number. Smartphone malware is getting increasingly sophisticated, and MIT‘s Technology Review reports that a security researcher has created software that turns a smartphone into a “zombie” that can be controlled remotely. The blog says Georgia Weidman created the program, which controls a Google (GOOG) Android phone via short message service (SMS) to bring about a smartphone zombie apocalypse.

malicious software on mobile phonesOnce only theoretical, real-world cell-phone viruses are becoming more common. The article reports the most famous was a scam in Russia that tricked users into installing malicious software on Android phones and using the SMS functionality to send messages to a number that charged a premium fee. In late 2010, a Chinese virus for Android devices stole personal data according to the article.

Botnets have become a staple of Internet crime. They can be used to attack other systems, host attack tools, send spam, or just steal data. The blog says this type of attack has been rare with mobile devices, but that seems to be changing. “We have been taking down Internet botnets for years now, but there is not as much understanding [of telecom networking],” Ms. Weidman says. “I definitely see criminals going more and more toward using the telco’s network.”

zombie nodes of a botnetTR explains that Ms. Weidman’s program is one of the first known to turn smartphones into zombie nodes of a botnet. Her attack works like this: After infecting a phone with a rootkit, she uses that phone to send spam text messages, takes part in a denial-of-service, or degrade the communications of the phone—all without the user knowing. The techniques apply to any smartphone, Weidman says.

Today’s smartphones have multiple layers of defense. For one, they can block malicious applications. They also have managed channels, such as the Apple (AAPL) App Store and Google’s Android Marketplace, for applications.

botnet controlAs a result, Weidman says, infecting a smartphone is not easy. “The hurdle with any malware is infecting the phone,” she told Technology Review, noting that the methods used by cybercriminals usually do not work. “More of what you see of malware is people downloading applications for their phone that are infected,” she says.

The problem of cyber-criminals targeting consumers’ phones will only get worse Kevin Mahaffey, chief technology officer of mobile-security startup Lookout told the author. Because the control of phones is so easy to turn into cash via premium text messages, criminals will be drawn to attack the devices.

Lookout logo“I always tend to look at the economics of the problem to ask myself whether it will continue in the future,” the CTO explained. “And because there is an incentive for attackers to compromise mobile phones, and the cost of compromising is not that high, that says it will become more prevalent in the future.”

Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users. When the attacker does it using malicious software, the user has little chance of detecting it, says Weidman.

smartphone botnet zombie“When I infected a phone in my botnet—my lab botnet—with malware, the smartphone would receive a message through SMS and I would check to see if it has botnet instructions in it,” she says. “If it does, it would perform the functionality requests, and then it would swallow the message, so the user does not know that there was a message at all.”

While phones do not have the computing power of more traditional computers, they are hefty enough to handle many of the tasks that cyber-criminals desire, she says. She adds that the sheer number of smartphones means that any botnet could be “a real threat” to create a smartphone zombie apocalypse.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IDC Predicts MSFT Smartphone Comeback

IDC Predicts MSFT Smartphone ComebackThe prognosticators at research firm International Data Corporation (IDC) have looked into their crystal ball and predicted that by 2015 Microsoft (MSFT) will take second place to Google’s (GOOG) Android in the smartphone market. IDC claims that in 2015, Windows 7 will pass Apple (AAPL) iOS as the alternative operating system to Android. Android will have about half the market and what is left will be divided between Research In Motion’s (RIMM) Blackberry and Apple.

TechEye points out in their indubitable way:

For that to happen, Apple followers will have to suddenly have a realisation that Jobs’ Mob’s walled garden of delights is not all it’s cracked up to be and would have to defect to the arch-enema of the Apple cargo cult – Steve Ballmer.

Symbian market will blindly follow Nokia to MSFTThe latest stats show how far Ballmer’s Boys have to go to meet IDG’s projections. MSFT has 5.5 percent of the market, apparently, IDG believes that all the Symbian market will blindly follow Nokia to MSFT because the firms made a billion-dollar deal. Sometimes it is also about functionality, copy and paste, multi-touch.

IDC Smartphone Market Share Predictions

20112015
Android 39.5 %Android 45.4 %
Symbian 20.9 %Windows 7 / Windows Mobile 20.9 %
iPhone 15.7 %iPhone 15.3 %
Research In Motion Ltd. BlackBerry 14.9 %Research In Motion Ltd. BlackBerry 13.7 %
Windows 7 / Windows Mobile 5.5 %Others 4.6 %
Others 3.5%Symbian 0.2 %

rb-

Well good for IDG, TechEye says they failed to see the rise of the iPhone or Android in 2006. History says that a full-frontal assault on a firm’s core business is not effective. MSFT has to create a market to make iPhone and Android irrelevant. I think the MSFT for MSFT sake opportunity is long gone.

What do you think?

Is IDG dreaming?

Can Windows Phone 7 reach second place on the market by 2015?

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.