Hackers, Virus Writers Target Mobile Phones

Hackers can scoop up calendars, contact lists and other sensitive
information, or turn a mobile phone into a bugging device to secretly
listen in on conversations. Mobile viruses that spread through the air
can disable phones completely.
Few mobile phone users have been seriously harmed yet by security
breaches. But experts say serious threats are likely to emerge as
mobile phones evolve into tiny computers capable of communicating in a
variety of ways.
"There is a very large pool of vulnerable devices already in use, and
inevitably this will lead to issues with the owners of those devices,"
said Adam Laurie, a U.K. security expert who has uncovered several
security holes.
"Problems like this are only just beginning to surface," Laurie said
in an e-mail interview.
Because mobile providers like Cingular maintain tight control over
their networks, users have so far largely avoided the spam, spyware
and other hassles that plague computer users.
But that doesn't mean they're immune from other threats.
Laurie demonstrated last spring that he could copy
the calendars and contact lists of 46 British lawmakers and turn their
phones into bugging devices that could pick up nearby conversation,
simply by hanging around Parliament and waiting for victims to walk
Laurie was able to tap into their phones using Bluetooth, a
short-range wireless technology included on many new phones that
allows users to zap each other their contact information, talk through
their car stereos and sync up with computers without a cable.
Bluetooth also allows viruses to spread through the air like a common
The Cabir virus that surfaced last June is relatively nontoxic,
antivirus firms say. It requires the user to click "OK" before it
installs itself, it doesn't harm the phones it infects, and it can
only spread to one other phone until the host phone is rebooted.
Cabir has managed to spread to nine countries so far, paving the way
for other, more harmful viruses.
Early computer viruses did little more than flood networks with
unwanted traffic, but more recent viruses like Bagle enable criminals
to secretly take control of infected computers and use them to commit
identity theft or extort protection money from online businesses.
That pattern is emerging with mobile viruses as well.
A virus called Skulls disables phone applications and replaces their
icons with a skull-and-crossbones symbol, while another disguised as a
video game called Mosquito automatically places calls to toll numbers,
according to descriptions by several antivirus firms.
Antivirus analysts at Kaspersky Labs in Russia are currently
investigating a report that Lexus car stereos have been infected with
a Bluetooth virus.
"In the future we can come across viruses for nearly any complicated
device. Imagine your fridge throwing food in the microwave oven,"
Kaspersky spokeswoman Olga Kobzareva said in an e-mail interview.
Some experts say mobile viruses aren't likely to become as widespread
as computer viruses because no single operating system predominates,
unlike the 90 percent of personal computers that run some version of
Microsoft Windows.
Only 1.8 percent of the 164 million mobile phones sold in the last
three months use Symbian, the operating system targeted by virus
writers, said Greg Mastoras, a senior security analyst at the
anti-virus company Sophos.
"We don't think it's a big issue to think about right now," he said.
Nokia and Sony Ericsson offer patches for phones that have proven
susceptible to viruses and Bluetooth hacks, and industry engineers now
check for security holes before releasing new products.
Users can install antivirus software on their phones, or simply place
Bluetooth in "hidden" mode so it is not visible to other devices.
"We're trying to design the future in a way that will prevent as many
hacks as possible," said Joe Farren, a spokesman for the Cellular
Telecommunications and Internet Association, a Washington-based trade
But new headaches are likely to emerge as the industry consolidates
around one or two operating systems and adds Wi-Fi Internet
capability, said Tristan Henderson, a research assistant professor at
Dartmouth College's Center for Mobile computing.
"Once we have cell phones that are connected to the Internet, someone
sitting in China or Russia or anywhere can attack a cell phone in New
York, and that will be fun," he said.
NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
formatting link
. New articles daily.
*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S. Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance Reuters News Service.
For more information go to:
formatting link

Reply to
Lisa Minter
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.