Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/23/2009
03:49 PM
50%
50%

Trojan Steals Cash From Symbian Phones

A Trojan targeting Indonesian Symbian users hijacks the SMS system to transfer funds from the user's account to one held by criminals.

Symbian is the most popular mobile operating system for smartphones with about 45% of the worldwide market. But being the leader also means you're a prime target for hackers, and a security firm said it found an attack that enables malicious programmers to control a user's mobile phone account.

Kaspersky Lab said it has discovered a malicious program aimed at Indonesian Symbian mobile phone users. For the attack to work, the hackers need users to download a Trojan that's written in Python. It then sends SMS messages to a short code number with instructions to transfer money from the user's account to the criminal's account. The average transfer was between 45 and 90 cents, and the security firm said there are five known variants of the Trojan.

"Obviously, the authors of the Trojan want to make money," said Denis Maslennikov, a senior malware analyst at Kaspersky Lab, in a statement. "It seems that the focus on financial fraud in the mobile malware industry will only get more pronounced over time."

Maslennikov said the SMS malware was previously seen as purely a Russian phenomenon, but this latest attack is proof that mobile security is an international issue. Users of Kaspersky Lab's mobile security products are protected from the exploit. Symbian had not verified the exploit as of press time, but an over-the-air update could potentially fix the problem.

Another Symbian exploit recently brought to light could crash a phone's SMS system. The "Curse of Silence" enables hackers to specially format an e-mail to be sent as an SMS, and if the message has more than 32 characters, certain S60 devices would not be able to send or receive other SMS or MMS messages.

While there have yet to be large-scale mobile viruses or attacks, the threat continues to grow as more companies carry sensitive data on smartphones. InformationWeek took a look at how to make sure your smartphone data is secure on the go, and the report can be found here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13842
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
CVE-2020-13843
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020).
CVE-2020-13839
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
CVE-2020-13840
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
CVE-2020-13841
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).