Friday, December 8, 2006

Mobile Phone Virus



Nowadays, even basic mobile phones can send and receive text messages which makes them vulnerable to attack by worms and viruses. Advanced mobile phones capable of e-mail can be susceptible to viruses that can multiply by sending messages through a phone's address book. Of more important concern, a virus may allow unauthorized users to access a phone to find passwords or corporate data stored on the device. Moreover, they can be used to commandeer the phone to make calls or send messages at the owner's expense.

Unlike computers that are restricted to only a few widespread operating systems, mobile phones use a variety of systems that require separate programs to be designed in order to disable each one. While reducing overall compatibilty from an application design standpoint, this has the beneficial effect of making it harder to design a mass attack. However, the rise of cellular phone operating system programming platforms shared by many manufacturers such as Java, Microsoft operating systems, Linux, or Symbian OS, may in the future change this status quo.

Bluetooth is a wireless communication feature now found in many higher-end phones, and the virus Cabir hijacked this function, sending Bluetooth phones on a search-and-destroy mission to infect other Bluetooth phones.

In November 2004, several web sites began offering a specific piece of software promising ringtones and screensavers for certain phones. Those who downloaded the software found that it turned each icon on the phone's screen into a skull-and-crossbones and disabled their phones, so they could no longer send or receive text messages or access contact lists or calendars. The virus has since been dubbed Skulls by security experts.

In March 2005, the Commwarrior.A virus was identified to attempt to replicate itself through MMS to others on the phone's contact list. Like Cabir, Commwarrior. A also tries to communicate via Bluetooth wireless connections with other devices, which can eventually lead to draining the battery. Bluetooth telephones are also subject to bluejacking, which is the generally benign transmission of messages from anonymous Bluetooth users.

No comments: