Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:50 AM
Connect Directly

Viruses Without Borders

Hackers test a new generation of malware that attacks multiple platforms simultaneously

What if your smartphone could infect your laptop? Proof-of-concept code is out for malware that infects multiple operating system platforms simultaneously. This multiplatform -- or hybrid -- virus is typically aimed at both mobile devices and desktop machines.

Most malware today is written to attack a specific platform or application. But with mobile phones, PDAs, Bluetooth, and laptops, the standard tools of many users today, researchers say it's no surprise attackers would come up with ways to initiate an exploit that spans all of these platforms at once.

"The threat is real. There's proof-of-concept that multiplatform [viruses] do exist and some have been found in the wild," says Shane Coursen, senior technical consultant for Kaspersky Lab.

Mikko Hypponen, chief research officer for F-Secure, says so far his research team has only seen this malware in proof-of-concept code. "There's a real possibility of something more than proof-of-concept coming around the corner."

And so far, the good news is writers of this malware are more "old-school" hackers trying to win bragging rights for being the first to design such exploits rather than more profit-minded cybercriminals, Hypponen says.

The most popular of these is Mobler, a worm that F-Secure first discovered in late August. Mobler infects both Symbian Series 6 smartphones and Windows. Its dispersal requires physical effort on the user's part, however: The user would have to take a memory card from his smartphone and load it onto his PC to transfer photos or other apps, for instance. Mobler then would try to trick the user into clicking on a file that looks like a system folder icon, for example, to infect the PC, Hypponen says.

And this malware can continue propagating. "If you later stick another memory card from another phone onto that PC, it infects that phone, too," he adds.

This obviously wouldn't spread anything like an Internet worm since it relies on the user (unknowingly) physically moving it from device to device.

But if Bluetooth is in the picture, a multiplatform/hybrid virus could spread more readily. Hyponnen says, in the future, a laptop user with Bluetooth in a coffee shop could get hacked by an infected smartphone. "The infected phone could see you're a Bluetooth laptop and figure out you're running Windows [via the Bluetooth fingerprint] and send you a binary file," he says. "This wireless world we're living in will enable multiplatform viruses to jump" from one platform to another more easily.

The user would have to accept the file, of course, to get infected. But a little social engineering, Hyponnen says, goes a long way. These hybrid viruses are more difficult to write, too, and would have separate copies of the virus for each platform: "So when Mobler is running on a PC, the PC virus carries a copy of the Symbian virus," for example.

While these viruses are not a big problem yet today, security experts say to be on the lookout and to shore up user policies.

"It's not going to be a real serious threat until organized crime finds a way to make money with it," says Randy Abrams, director of technical education for Eset. "It's now a low-yield thing -- users are not transferring near the amount of money on smartphones as they are on PCs, so it's not yet attractive to go after from a financial standpoint."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • ESET
  • F-Secure Corp.
  • Kaspersky Lab Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    How to Think Like a Hacker
    Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
    7 SMB Security Tips That Will Keep Your Company Safe
    Steve Zurier, Contributing Writer,  10/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-17
    WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
    PUBLISHED: 2019-10-17
    WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
    PUBLISHED: 2019-10-17
    WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
    PUBLISHED: 2019-10-17
    WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
    PUBLISHED: 2019-10-17
    app/system/admin/admin/index.class.php in MetInfo 7.0.0beta allows a CSRF attack to add a user account via a doSaveSetup action to admin/index.php, as demonstrated by an admin/?n=admin&c=index&a=doSaveSetup URI.