Information

The following is a guest post by email. This is the third part in a series of articles on his view of hacking. If you are interested in writing for CyberCROW, click Here. Otherwise, Enjoy.

Saturday, November 6, 2010

Current mobile malware types and families

Posted by glewoCROW 3:24 AM, under ,, | No comments

Autumn 2004 was when mobile malware started to evolve in three main
areas. One was Trojan programs which are designed for financial gain.
The first mobile Trojan was Mosquit.a. In theory, it’s a harmless
mobile phone game; however, at some point it starts to send numerous SMS
messages to telephone numbers in the address book, meaning that the
user’s phone bill will increase. In fact, Mosquit.a wasn’t only the
first Trojan for smartphones, but also the first piece of adware for
mobiles.

Skuller.a, a Trojan which appeared in November 2004, was the first of
what is now the largest family of mobile Trojans. This was the first
malicious program to take advantage of the design faults of Symbian,
which make it possible for any application to overwrite system files
with their own files without prompting the user. Skuller replaced
application icons with skull and crossbones, and also deleted
application files. As a result, the handset would stop working once it
had been switched off and switched on again. This type of “vandal
Trojan” became one of the most popular among virus writers.



Skuller.a

Three new variants of Cabir appeared practically at the same time as
Skuller.a. These new variants were not based on the source code of the
original worm. By this time virus writers had got their hands on Cabir,
and some of them did what script kiddies do: they renamed the worm
files and replaced some of the text in the files with their own. One
variant added Skuller to the original archive. The resulting hybrid
didn’t function as intended: the worm was unable to replicate because
the Trojan crashed the phone. However, this was the first time that
Cabir was used as a carrier for other malicious programs.

By the beginning of 2005, the main types of mobile malware had
evolved, and were used by virus writers over the next eighteen months:

  • worms that spread via smartphone protocols and services
  • vandal Trojans that install themselves to the system by exploiting Symbian design faults
  • Trojans designed for financial gain

However, although there are only a few main types of behavior, in
practice mobile malware comes in a variety of forms. Kaspersky Lab is
currently tracking 31 distinct mobile malware families. The table below
shows the main characteristics for each family.

Name Date OS Functionality Technology used Number of variants
Worm.SymbOS.Cabir June 2004 Symbian Spreads via Bluetooth Bluetooth 15
Virus.WinCE.Duts July 2004 Windows CE Infects files (File API) 1
Backdoor.WinCE.Brador August 2004 Windows CE Provides remote network access (Network API) 2
Trojan.SymbOS.Mosquit August 2004 Symbian Sends SMS messages SMS 1
Trojan.SymbOS.Skuller November 2004 Symbian Replaces files, icons, system applications OS vulnerability 31
Worm.SymbOS.Lasco January 2005 Symbian Spreads via Bluetooth, infects files Bluetooth, File API 1
Trojan.SymbOS.Locknut February 2005 Symbian Installs corrupted applications OS vulnerability 2
Trojan.SymbOS.Dampig March 2005 Symbian Replaces system applications OS vulnerability 1
Worm.SymbOS.ComWar March 2005 Symbian Spreads via Bluetooth and MMS, infects files Bluetooth, MMS, File API 7
Trojan.SymbOS.Drever March 2005 Symbian Replaces antivirus application loaders OS vulnerability 4
Trojan.SymbOS.Fontal April 2005 Symbian Replaces font files OS vulnerability 8
Trojan.SymbOS.Hobble April 2005 Symbian Replaces system applications OS vulnerability 1
Trojan.SymbOS.Appdisabler Ìàé 2005 Symbian Replaces system applications OS vulnerability 6
Trojan.SymbOS.Doombot May 2005 Symbian Replaces system applications, èíñòàëëÿöèÿ Comwar OS vulnerability 17
Trojan.SymbOS.Blankfont July 2005 Symbian Replaces font files OS vulnerability 1
Trojan.SymbOS.Skudoo August 2005 Symbian Installs damaged applications, installs Cabir, Skuller, Doombor OS vulnerability 3
Trojan.SymbOS.Singlejump August 2005 Symbian Disables system functions, replaces icons OS vulnerability 5
Trojan.SymbOS.Bootton August 2005 Symbian Installs damaged applications, installs Cabir OS vulnerability 2
Trojan.SymbOS.Cardtrap September 2005 Symbian Deletes antivirus files, replaces system applications, installs Win32 malware on memory cards OS vulnerability 26
Trojan.SymbOS.Cardblock October 2005 Symbian Blocks memory cards, deletes folders OS vulnerability, File API 1
Trojan.SymbOS.Pbstealer November 2005 Symbian Steals data Bluetooth, File API 5
Trojan-Dropper.SymbOS.Agent December 2005 Symbian Installs other malicious programs OS vulnerability 3
Trojan-SMS.J2ME.RedBrowser February 2006 J2ME Sends SMS Java, SMS 2
Worm.MSIL.Cxover March 2006 Windows Mobile/ .NET Deletes files, copies its body to other devices File (API), NetWork (API) 1
Worm.SymbOS.StealWar March 2006 Symbian Steals data, spreads via Bluetooth and MMS Bluetooth, MMS, File (API) 5
Email-Worm.MSIL.Letum March 2006 Windows Mobile/ .NET Spreads via email Email, File (API) 3
Trojan-Spy.SymbOS.Flexispy April 2006 Symbian Steals data 2
Trojan.SymbOS.Rommwar April 2006 Symbian Replaces system applications OS vulnerability 4
Trojan.SymbOS.Arifat April 2006 Symbian 1
Trojan.SymbOS.Romride June 2006 Symbian Replaces system applications OS vulnerability 8
Worm.SymbOS.Mobler.a August 2006 Symbian Deletes antivirus files, replaces system applications, spreads via memory card OS vulnerability 1
31 families, 170 variants


Complete (as of 30th August 2006) list of mobile virus families according to Kaspersky Lab classification



 “What can mobile viruses do?”:

  • Spread via Bluetooth, MMS
  • Send SMS messages
  • Infect files
  • Enable remote control of the smartphone
  • Modify or replace icons or system applications
  • Install “false” or non-operational fonts and applications
  • Combat antivirus programs
  • Install other malicious programs
  • Block memory cards
  • Steal data

We have to acknowledge that today’s mobile viruses are very similar
to computer viruses in terms of their payload. However, it took computer
viruses over twenty years to evolve, and mobile viruses have covered
the same ground in a mere two years. Without doubt, mobile malware is
the most quickly evolving type of malicious code, and clearly still has
great potential for further evolution.

0 comments:

Post a Comment