Risk
1/24/2011
10:08 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

New Age of Mobile Malware On Way

New types of malware are emerging, designed specifically to exploit the unique features of mobile handsets.

New types of malware are emerging, designed specifically to exploit the unique features of mobile handsets.People carry their mobile handsets everywhere. And they're increasingly using their smartphones as the portals into their lives: GPS navigation, social networking, camera, and staying in touch via e-mail and, sometimes, even phone calls.

Such as the Geinimi Trojan, we covered in December, that was targeting Android phones. Or the virus that infected 1 million cell phones in China, and would automatically send text messages. There have been many others, including proof-of-concept viruses and bogus applications aimed at app stores.

Recently researchers at the City University of Hong Kong and Indiana University decided to see what malware they could develop that would take advantage of some of the capabilities specific to mobile handsets.

What came from their research they're calling Soundminer, an emerging kind of sensory-based malware:

In this paper, we report our research on sensory malware, a new strain of smartphone malware that uses on-board sen- sors to collect private user information. We present Sound- miner, a stealthy Trojan with innocuous permissions that can sense the context of its audible surroundings to target and extract a very small amount of high-value data.

As sensor-rich smartphones become more ubiquitous, sensory malware has the potential to breach the privacy of individuals at mass scales. While naive approaches may up- load raw sensor data to the malware master, we show that sensory malware can be stealthy and put minimal load on the malware master's resources.

Soundminer snoops on phone calls and can reportedly record when a user keys in, or speaks, a credit card number into their phone. And it can, its creators claim, successfully avoid anti-virus detection.

The student's research paper is available here [.pdf].

Get ready for a new kind of malware. Malware that takes advantage of the phone, text messages, camera, GPS, downloaded applications, and mobile transactions.

The malware that is produced will only be limited by malware authors' imaginations and the ability of mobile operating systems and security software to detect and stop it.

It's going to be a fascinating few years.

For my security and technology observations, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1556
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php.

CVE-2014-2008
Published: 2014-09-12
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.

CVE-2014-2009
Published: 2014-09-12
The mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to obtain credentials, the installation path, and other sensitive information via a direct request to api/curllog.log.

CVE-2014-4735
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in MyWebSQL 3.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter to index.php.

CVE-2014-5259
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in cattranslate.php in the CatTranslate JQuery plugin in BlackCat CMS 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant