Are Cell Viruses A Real Threat Now? 72
Celpha writes "According to security firm F-Secure, a Trojan virus (Cardtrap.A)
attacks Symbian mobile phone operating systems, attempting to infect users' PCs if they insert the phone's memory card into their computers. From the article: 'We expect to see more of this on the mobile front,' an F-Secure chief research officer said. Trend Micro issued a media alert stating it is a 'fully functioning' mobile threat. However, Antivirus firm Sophos slams the claim of this first example of a serious mobile malware threat as just plain bonkers."
Heh (Score:4, Insightful)
I bet you do, as you are probably already hard at work to make it happen.
Cell Phones (Score:3, Insightful)
Re:Cell Phones (Score:1)
Re:Cell Phones (Score:1)
You better believe it's a threat. (Score:5, Interesting)
TrendMicro claims that the Symbos_Cardtrp.A trojan is a "fully functioning threat", while Sophos dissmisses the entire thing as "bonkers". I'm thinking that the truth is rather in the middle.
The Symbos_Cardtrp.A trojan is one of the first clumsy attempts at this sort of thing, but we all know that the malware only gets more sophisticated and polished over time. People certainly should be alarmed about the appearance of this trojan...not because it itself is all that threatening, but because it clearly demonstrates the potential for mischief.
As Raimund Genes, president of the firm's European Operations, said: "This attack is really a proof of concept and may be an indication of a new type of blended threat to come." You can bet that as cellphones become more sophisicated and more interconnected to our computers, malware authors are going to turn this into a genuine threat.
In short, while it's rather sensationalistic to tout this as a "fully functioning threat", claiming that there is nothingto worry about disingenuous in the extreme. Sophos' claim that paying attenton to this threat distracts sysadmins from the "real threat" of attacks on Windows desktops is pure sheepdip. Imagine if we dismissed out of hand the new threat of infection via USB thumbdrives, because we were all too busy paying attention to the "real threat" of infection over the network?
Re:You better believe it's a threat. (Score:5, Interesting)
An objective observer (which the various anti-virus people probably aren't) might ask why a mobile phone needs to become "more sophisticated" in the first place. My phone was a freebie about four years ago when I signed up, and still has way more features than I ever want or need.
Give me a good phone book feature, voice, text messaging and some sort of answerphone if I can't take a call. I don't need it to be a low quality digital camera, hard-to-use PDA, sub-standard web browser, trivial calculator, poor-capacity MP3 player, pathetically quiet alarm clock, and all the other junk. Nor do I need it to run some super-complicated operating system that's ripe for attacking.
Re:You better believe it's a threat. (Score:4, Insightful)
Re:You better believe it's a threat. (Score:2)
Re:You better believe it's a threat. (Score:1)
I very much doubt most people would miss them if they weren't there. In my whole life, surrounded by people with mobile phones, I have met one person who I've ever seen use his WAP browser. I have seen a calculator used on a mobile phone twice, and both times I'd worked out the correct answer in my head faster. You get the idea.
I think all this stuff is a triumph of marketing over necessity. How many people would re
Re:You better believe it's a threat. (Score:2)
As regards the other features mentioned, it might be just me, but I think I've seen more than one instance of someone using their camera phone.
Re:You better believe it's a threat. (Score:2, Insightful)
How many people would REALLY miss their cell phone at all? If you get into such stupid questions as "Who NEEDS that?" the answer is always "Well, nobody really NEEDS it... it's just nice to have if you have a use for it."
Re:You better believe it's a threat. (Score:3, Interesting)
Re:You better believe it's a threat. (Score:2)
OK. I'm sure there must be someone somwhere who really does find more than one or two of the gizmos useful, and perhaps you're him. Fair enough.
Even so, I can't help noticing that your top-of-the-line phone is currently listed at around the $400 mark, give or take whatever special offer is running this week. If you'd only spent $50 on the phone, I wonder how much real computing hardware you could have bought, if you have a genuine use for the organiser and mathematical functions, and how much better at ev
Re:You better believe it's a threat. (Score:1)
"I have always wished that my computer would be as easy to use as my telephone. My wish has come true. I no longe
Re:You better believe it's a threat. (Score:2)
I need the digital camera, browser, calculator, and alarm clock (but like you said a bit louder). Having a camera on you at all times may actually come in handy during a car wreck or something that needs to have a picture taken at that moment like a crime in progress... Well, if you live in a place like Phildadelph
Re:You better believe it's a threat. (Score:1)
Why more sophisticated?? (Score:2)
Simple, it's called advertising and "Look here at what our phones can do!" type of bragging rights.
Or, as one of my other friends put it to me a long time ago, it's "creating a false market for other services." I mean, come-on. "Let's boost our economy by making our hardware run off of software so it can be infected and boost other markets
blatant karma whoring, don't mod me up (Score:2)
Proof of this can easily be obtained by comparing Windows 3.0 to Windows XP.
Cell Viruses are the most common! (Score:5, Funny)
yeah, my Motorola phone caught a cold, and it passed it along to my PC.
Re:Cell Viruses are the most common! (Score:2)
Just Windows. (Score:5, Informative)
From TFA(emphasis mine):
"We expect to see more of this on the mobile front," Hypponen said. "We may begin to see Windows viruses spreading to PDAs that are synched up to computers, or go from PCs to mobile phones with the memory card."
Re:Just Windows. (Score:1)
Re:Just Windows. (Score:2)
Re:Just Windows. (Score:1)
Cell phone viruses??? I'm immune! (Score:1, Interesting)
Still works fine though. My cell phone company (Telus, a canadian CDMA company) calls me occasionally to try and sell me a new phone. I keep saying the same thing, "I'd love to buy a new phone. Do you have any phones with infrared?"
The sales rep says, "No."
I say, "Why not? All your competitors sell phones with infrared."
The sales rep says, "I don't know. We have phones with bluetooth though."
I say, "Well, I have a laptop with infrared, and a PDA with infrared, and as soon as Telus s
Re:Cell phone viruses??? I'm immune! (Score:1)
Re:I'll give it 3 comments (Score:1, Offtopic)
You're assuming anyone ever did.
Re:I'll give it 3 comments (Score:3, Funny)
No, I came here for a good argument..
Re:I'll give it 3 comments (Score:3, Funny)
Re:I'll give it 3 comments (Score:2)
Focus you energy. (Score:5, Funny)
$39.99+ is far too much to pay per month. I want free calling. And I am not talking about cloning, I am talking about getting on Verizons antenna and placing calls from my phone without them seeing it, or seeing who owns the phone.
Re:Focus you energy. (Score:1)
Re:Focus you energy. (Score:1)
Re:Focus you energy. (Score:1)
Simplicity is the key to beating this easily... (Score:4, Insightful)
Re:Simplicity is the key to beating this easily... (Score:1, Flamebait)
I mean, what's the point of having a color cellphone anyways? And with web capabilities?
Web browsers on phones were just asking for trouble. And the worst part is no one can make an antivirus for phones, so if your phone gets infected, your provider will probably charge you an arm, a leg, and your first born to repair it instead of trying to fix the holes in the first place.
Get with the times, Grampa! (Score:2, Insightful)
But I suppose you drive around a horse and carriage too...
Re:Get with the times, Grampa! (Score:2)
That took me a good minute to stop laughing there. You don't buy a portable player for quality. The sound in my mobile phone is as good as your iPod. In fact, as mine can play way more formats, I'd bet at least one of them was superiour to the iPod suppporting ones.
Ah, the V60 (Score:2)
But when the new phone had to go in for repairs, I briefly re-activated the V60. That was a pleasure.
Well grampaw... (Score:2)
The days of a carbon microphone and battery at the end of a long wire are long gone...
Re:Simplicity is the key to beating this easily... (Score:2)
I use ring tones so I know it's my phone that's ringing.
We used to have it where almost everyone had the same ring tone. It sucked. Pay attention.
Got paid to develop Trojans (Score:5, Interesting)
The goal was not to release "in the wild" but to showcase the need for funding for mobile phone security.
Nevertheless, pretty much nothing has been done even though modern smartphone OSes are incredibly close to allowing excellent OS security (MMU enables kernel / user separation).
It's pretty easy to do fancy stuff once you get in the mindset of an attacker. Like waking up the phone at midnight to place calls to a premium number. One doesn't even need to stack-smash to have fun (that is harder on ARM platforms bc you have to develop your own shellcode anyway).
The problem is especially important for wireless operators because people pay with their mobile phone. While that is the basis of revenue, it also enables major fraud (very much akin to what the "dialer kits" do to modem owners by silently ringing 900 numbers).
Examples:
* There's a WAP (wireless browsing) service where you can download ringtones for $2. What if a program on your phone starts downloading those silently?
* In some countries SMS are charged with a premium. What if a program are sending premium SMS without your knowing?
Of course it's also important for users ("what if a Trojan posts my phone book to some website", "what if a Trojan gets my location from the network and gives it to my wife". It's also important for security that the phone not be transformed into a jammer by changes in the radio firmware / software, but that's harder to do.
Hopefully the players involved will wake up before we find a nasty one in the wild.
Still just a trojan... (Score:4, Informative)
It irritates me when trojans are lumped with the virus crowd. This requires a user to ACCEPT and INSTALL the application before it becomes an issue, it is useless without that user interaction.
Re:Still just a trojan... (Score:3, Interesting)
User gets notification on phone. Accept or reject? Reject.
User gets notification on phone again. Accept or reject? Reject.
Repeat line above a few times. A virus doesn't care about the user rejecting it, and will keep trying to give it. User (hooray for the general public, sigh) eventually presses acc
Cell "phones" (Score:2, Funny)
Cell viruses? (Score:2, Funny)
Surely it's cellphone viruses the article refers to guys.
Cell Phone Viruses would pose no threat if.... (Score:4, Informative)
Granted Symbian is nice, looks pretty, but everyone I know with a cell phone running Symbian also complains that the phone is so slow to respond.
All the old Nokia phones were extremely fast, responsive (no 3-4 second lag waiting to go back a screen just to look at one freaking phone number) and best of all, didn't require such an exploitable OS because at the time, it was all hardware logic-control.
I don't know what the OS is on my Kyocera Phantom phone, but even it's slow to respond to keystrokes, and it doesn't have all those little capabilities that most phones nowdays have.
Simply put, as long as phone companies use software instead of hardware to control a phone, there will always be a threat of software infection.
Just an opinion...
Re:Cell Phone Viruses would pose no threat if.... (Score:2)
Dirty telephone (Score:4, Funny)
Damn, we shouldn't have sent all those telephone cleaners off in the B ark!
Don't blame the user, they are human. (Score:3, Interesting)
Selected extract...
A good model to follow could be something similar to Flash files. Commonly seen used in animations, a program inside a flash file can do a lot. Here's a jigsaw puzzle. Here's a simple arcade game. Here's a collaborative document editing system.
Flash implements a full program language, but the program's wings are clipped. Unlike regular executables, a flash program can't interfere with other programs and it can't mess with files it doesn't own. Add a way allowing programs to interact with other components (including the file system) with a strict and manageable protocol, and there's no big need for any program to run unrestricted. (Except the operating system and the occasional device driver, that is.)
No Interface (Score:1, Redundant)
--
So who is hotter? Ali or Ali's sister?