{"id":2311,"date":"2010-03-13T16:55:49","date_gmt":"2010-03-13T21:55:49","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=2311"},"modified":"2022-12-30T12:45:24","modified_gmt":"2022-12-30T17:45:24","slug":"mobile-botnet","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/mobile-botnet\/","title":{"rendered":"Mobile Botnet"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20170713104329\/https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2005\/10\/va_dutchbotarrests.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2321\" style=\"border: 0pt none; margin-left: 2px; margin-right: 2px;\" title=\"Mobile Botnet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/botnet-computers2-150x1501-e1560549939822.gif?resize=95%2C95&#038;ssl=1\" alt=\"Mobile Botnet\" width=\"95\" height=\"95\" \/><\/a>Two researchers from <a title=\"TippingPoint\" href=\"https:\/\/finance.yahoo.com\/news\/trend-micro-finalizes-acquisition-tippingpoint-032252147.html\" target=\"_blank\" rel=\"noopener noreferrer\">TippingPoint&#8217;s<\/a> <a href=\"https:\/\/finance.yahoo.com\/news\/trend-micro-finalizes-acquisition-tippingpoint-032252147.html\" target=\"_blank\" rel=\"noopener noreferrer\">Digital Vaccine Group<\/a> duped thousands of smartphone users into joining a mobile botnet by spreading a seemingly innocuous weather application. Kelly Jackson Higgins at <em><a title=\"DarkReading\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20100810014727\/http:\/\/www.darkreading.com:80\/insiderthreat\/security\/client\/showArticle.jhtml?articleID=223200001\" target=\"_blank\" rel=\"noopener noreferrer\">writes<\/a> that Derek Brown and Daniel Tijerina created a smartphone application called WeatherFist. Over 8,000 users downloaded WeatherFist, which grabbed users&#8217; PII. The info they grabbed included GPS coordinates and telephone numbers, before displaying local weather information.<\/p>\n<p><a href=\"https:\/\/finance.yahoo.com\/news\/trend-micro-finalizes-acquisition-tippingpoint-032252147.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2331 size-full\" style=\"border: 0pt none; margin: 4px 2px;\" title=\"tippingpoint_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/tippingpoint_logo.jpg?resize=134%2C26&#038;ssl=1\" alt=\"TippingPoint\" width=\"134\" height=\"26\" \/><\/a>The researchers did not distribute their application via the official iPhone and Android application stores. Rather, they distributed the WeatherFist application via third-party app markets like<a href=\"http:\/\/cydia.saurik.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cydia<\/a>, <a href=\"https:\/\/slideme.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SlideME<\/a>, and <a href=\"http:\/\/modmyi.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Modmyi<\/a>. The apps could only be installed on jailbroken <a href=\"http:\/\/www.apple.com\/iphone\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPhones<\/a> or <a href=\"https:\/\/web.archive.org\/web\/20110307115049\/http:\/\/www.google.com\/phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> devices where users had specifically given permission for non-approved applications to be run. &#8220;<em>We wanted people to feel comfortable using the application and putting it on their phone so we would have permission to do a lot of things like pass GPS coordinates, write to the file system, and surf,<\/em>&#8221; Brown told <em>DarkReading<\/em>.<\/p>\n<h3>Mobile Botnet<\/h3>\n<p>At the 2010 RSA Security Conference the researchers claimed they also wrote a malicious version of their mobile botnet, which they dubbed WeatherFistBadMonkey. According to <em>DarkReading,<\/em>\u00a0the malicious app behaves more like traditional botnet code, stealing information and capable of distributing spam. &#8220;<em>We could enable or disable system services [with a malicious app],<\/em>&#8221; Brown says. The TippingPoint researchers told <em>DarkReading<\/em> they wanted to prove how an app could behave like much of the traditional Windows malware which, steals information, and allows hackers to gain remote control of hijacked devices.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Smartphones are a part of today\u2019s network and Brown and Tijerina claim that this research shows a security hole in networks. Some of the ways to plug these new holes are to:<\/em><\/p>\n<ol>\n<li><em> Update policies for the\u00a0 proper use of smartphones<br \/>\n<\/em><\/li>\n<li><em>Prohibit unsafe modifications of smartphones<\/em><\/li>\n<li><em>Allow apps only from reputable app stores<br \/>\n<\/em><\/li>\n<li><em>Provide training on smartphone application usage<\/em><\/li>\n<li><em>Lockdown the Wi-Fi network settings to keep smartphones from \u2018phoning home\u2019 any information that shouldn\u2019t leave the firm.<\/em><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iPhone and Android smartphone users are tricked into into joining a mobile botnet by downloading a seemingly innocuous weather application.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,420,202,101,58,536,92,304,2534,4,129],"class_list":["post-2311","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-aapl","tag-android","tag-apple","tag-botnet","tag-goog","tag-google","tag-iphone","tag-jailbreak","tag-security","tag-smartphone"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2311"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2311\/revisions"}],"predecessor-version":[{"id":132757,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2311\/revisions\/132757"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}