{"id":5154,"date":"2012-09-22T22:50:13","date_gmt":"2012-09-23T02:50:13","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=5154"},"modified":"2022-08-31T12:45:51","modified_gmt":"2022-08-31T16:45:51","slug":"smart-phone-zombie-apocalypse","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/smart-phone-zombie-apocalypse\/","title":{"rendered":"SmartPhone Zombie Apocalypse"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20110106130502\/http:\/\/thecellphonejunkie.com:80\/2010\/12\/30\/android-trojan-discovered-in-china\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104155\" title=\"SmartPhone Zombie Apocalypse\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-2.jpg?resize=120%2C98&#038;ssl=1\" alt=\"SmartPhone Zombie Apocalypse\" width=\"120\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-2.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-2.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-2.jpg?w=270&amp;ssl=1 270w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>If you have a <a title=\"Smart phone\" href=\"https:\/\/web.archive.org\/web\/20180907144717\/http:\/\/www.wikinvest.com:80\/concept\/Smart_phone\" target=\"_blank\" rel=\"wikinvest noopener noreferrer\">smartphone<\/a>, online criminals may soon have your number. Smartphone malware is getting increasingly sophisticated, and <a title=\"Massachusetts Institute of Technology\" href=\"http:\/\/web.mit.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">MIT<\/a>&#8216;s <a href=\"http:\/\/www.technologyreview.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Technology Review<\/em><\/a> <a title=\"Smart Phone Zombie Apocalypse\" href=\"https:\/\/web.archive.org\/web\/20150912030551\/http:\/\/www.technologyreview.com\/news\/422458\/smart-phone-zombie-apocalypse\/\" target=\"_blank\" rel=\"nofollow noopener\">reports<\/a> that a security researcher has created software that turns a smartphone into a &#8220;zombie&#8221; that can be controlled remotely. The blog says <a title=\" Georgia Weidman Security\" href=\"https:\/\/twitter.com\/georgiaweidman\" target=\"_blank\" rel=\"noopener noreferrer\">Georgia Weidman<\/a> created the program, which controls a\u00a0<a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/code.google.com\/android\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Android phone<\/a> via <a title=\"SMS\" href=\"https:\/\/www.techopedia.com\/definition\/24898\/sms-phishing\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">short message service (SMS)<\/a> to bring about a smartphone zombie apocalypse.<\/p>\n<p><a href=\"https:\/\/www.marchcomms.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104158\" title=\"malicious software on mobile phones\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware.jpg?resize=95%2C100&#038;ssl=1\" alt=\"malicious software on mobile phones\" width=\"95\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware.jpg?resize=143%2C150&amp;ssl=1 143w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware.jpg?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware.jpg?w=285&amp;ssl=1 285w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>Once only theoretical, real-world cell-phone viruses are becoming more common. The article reports the most famous was a scam in Russia that tricked users into installing malicious software on Android phones and using the SMS functionality to send messages to a number that charged a premium fee. In late 2010, a <a title=\"Zombie Virus Strikes Chinese Cell Phones\" href=\"https:\/\/web.archive.org\/web\/20160924232810\/http:\/\/www.dailytech.com:80\/Zombie+Virus+Strikes+Chinese+Cell+Phones\/article20141.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Chinese virus<\/a> for Android devices stole personal data according to the article.<\/p>\n<p><a title=\"Botnet\" href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-botnet\" target=\"_blank\" rel=\"nofollow noopener\">Botnets<\/a> have become a staple of Internet crime. They can be used to attack other systems, host attack tools, send spam, or just steal data. The blog says this type of attack has been rare with mobile devices, but that seems to be changing. &#8220;We have been taking down Internet botnets for years now, but there is not as much understanding [of telecom networking],&#8221; Ms. Weidman says. &#8220;I definitely see criminals going more and more toward using the telco&#8217;s network.&#8221;<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ZombiesAhead-e1568412153473.jpg?ssl=1\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104160\" title=\"zombie nodes of a botnet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ZombiesAhead.jpg?resize=88%2C100&#038;ssl=1\" alt=\"zombie nodes of a botnet\" width=\"88\" height=\"100\" \/><\/a><em>TR<\/em> explains that Ms. Weidman&#8217;s program is one of the first known to turn <a title=\"Smartphone\" href=\"https:\/\/www.techopedia.com\/definition\/2977\/smartphone\" target=\"_blank\" rel=\"noopener noreferrer\">smartphones<\/a> into zombie nodes of a botnet. Her attack works like this: After infecting a phone with a <a title=\"Rootkit\" href=\"http:\/\/netsecurity.about.com\/od\/frequentlyaskedquestions\/f\/faq_rootkit.htm\" target=\"_blank\" rel=\"noopener noreferrer\">rootkit<\/a>, she uses that phone to send spam text messages, takes part in a <a title=\"Understanding Denial-of-Service Attacks\" href=\"https:\/\/web.archive.org\/web\/20130220134138\/https:\/\/www.us-cert.gov\/cas\/tips\/ST04-015.html\" target=\"_blank\" rel=\"noopener noreferrer\">denial-o<\/a><a title=\"Understanding Denial-of-Service Attacks\" href=\"https:\/\/web.archive.org\/web\/20130220134138\/https:\/\/www.us-cert.gov\/cas\/tips\/ST04-015.html\" target=\"_blank\" rel=\"noopener noreferrer\">f-service<\/a>, or degrade the communications of the phone\u2014all without the user knowing. The techniques apply to any smartphone, Weidman says.<\/p>\n<p>Today&#8217;s smartphones have multiple layers of defense. For one, they can block malicious applications. They also have managed channels, such as the <a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"App Store (iOS)\" href=\"http:\/\/www.apple.com\/itunes\" target=\"_blank\" rel=\"homepage noopener noreferrer\">App Store<\/a> and <a title=\"Google's Android Marketplace\" href=\"http:\/\/www.android.com\/apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google&#8217;s Android Marketplace<\/a>, for applications.<\/p>\n<p><a href=\"http:\/\/www.theoldrobots.com\/smallbot14.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104162\" title=\"botnet control\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot_robbie_t-e1568412466352-150x127.jpg?resize=118%2C100&#038;ssl=1\" alt=\"botnet control\" width=\"118\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot_robbie_t-e1568412466352.jpg?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot_robbie_t-e1568412466352.jpg?resize=75%2C64&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot_robbie_t-e1568412466352.jpg?w=599&amp;ssl=1 599w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/><\/a>As a result, Weidman says, infecting a smartphone is not easy. &#8220;The hurdle with any malware is infecting the phone,&#8221; she told <em>Technology Review<\/em>, noting that the methods used by cybercriminals usually do not work. &#8220;More of what you see of malware is people downloading applications for their phone that are infected,&#8221; she says.<\/p>\n<p>The problem of cyber-criminals targeting consumers&#8217; phones will only get worse <a title=\"Kevin Mahaffey\" href=\"https:\/\/www.crunchbase.com\/person\/kevin-mahaffey\" target=\"_blank\" rel=\"crunchbase noopener noreferrer\">Kevin Mahaffey<\/a>, chief technology officer of mobile-security startup <a title=\"Lookout\" href=\"https:\/\/web.archive.org\/web\/20171015121852\/https:\/\/www.mylookout.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lookout<\/a> told the author. Because the control of phones is so easy to turn into cash via premium text messages, criminals will be drawn to attack the devices.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20171015121852\/https:\/\/www.mylookout.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104164 size-medium\" title=\"Lookout logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?resize=150%2C40&#038;ssl=1\" alt=\"Lookout logo\" width=\"150\" height=\"40\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?resize=150%2C40&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?resize=75%2C20&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?resize=768%2C207&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?resize=1024%2C276&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lookout_logo.png?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>&#8220;I always tend to look at the economics of the problem to ask myself whether it will continue in the future,&#8221; the CTO explained. &#8220;And because there is an incentive for attackers to compromise mobile phones, and the cost of compromising is not that high, that says it will become more prevalent in the future.&#8221;<\/p>\n<p>Using the telecommunications network, rather than the Internet, for <a title=\"Botnet\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a> control allows attackers to hide their actions from users. When the attacker does it using malicious software, the user has little chance of detecting it, says Weidman.<\/p>\n<p><a href=\"http:\/\/web.archive.org\/web\/20121208021707\/http:\/\/www.infosecurity-magazine.com:80\/view\/24987\/comment-botnets-the-dark-side-of-cloud-computing\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104166\" title=\"smartphone botnet zombie\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/zombie-botnet-e1568412388479-150x70.png?resize=119%2C56&#038;ssl=1\" alt=\"smartphone botnet zombie\" width=\"119\" height=\"56\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/zombie-botnet-e1568412388479.png?resize=150%2C70&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/zombie-botnet-e1568412388479.png?resize=75%2C35&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/zombie-botnet-e1568412388479.png?w=228&amp;ssl=1 228w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>&#8220;When I infected a phone in my botnet\u2014my lab botnet\u2014with malware, the smartphone would receive a message through SMS and I would check to see if it has botnet instructions in it,&#8221; she says. &#8220;If it does, it would perform the functionality requests, and then it would swallow the message, so the user does not know that there was a message at all.&#8221;<\/p>\n<p>While phones do not have the computing power of more traditional computers, they are hefty enough to handle many of the tasks that cyber-criminals desire, she says. She adds that the sheer number of smartphones means that any botnet could be &#8220;a real threat&#8221; to create a smartphone zombie apocalypse.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20181221075811\/https:\/\/www.escapistmagazine.com\/news\/view\/119435-Android-Malware-Infections-Increase-By-700\" target=\"_blank\" rel=\"noopener noreferrer\">Android Malware Infections Increase By 700%<\/a> (escapistmagazine.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security researcher has created software that turns a smartphone into a botnet zombie that can be controlled remotely to send spam or be part of a DDOS<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,420,202,101,58,536,92,23,1772,4,1769,1384,95],"class_list":["post-5154","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-aapl","tag-android","tag-apple","tag-botnet","tag-goog","tag-google","tag-malware","tag-phone","tag-security","tag-smart","tag-sms","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=5154"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5154\/revisions"}],"predecessor-version":[{"id":132797,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5154\/revisions\/132797"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=5154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=5154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=5154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}