Information

The following is a guest post by email. This is the third part in a series of articles on his view of hacking. If you are interested in writing for CyberCROW, click Here. Otherwise, Enjoy.

Monday, November 8, 2010

Hacking Facebook with Fake Login

Posted by glewoCROW 4:01 PM, under ,, | No comments

How to hack facebook with Fake Login, which is one way of crafty but fun.
  • Create an account by enrolling in a free webhosting that supports / support PHP.
    Like:
    - Byethost
    - Ripway
    - Fileave, etc.
  • Download Fake Login Script here.
  • Extract the file and save / upload in one directory on the web hosting you have a list, for example http://NamaAnda.byethost.com/facebook/. 3 files, which are:
    - Index.html - Index.html
    - logs.php - Logs.php
    - logs.txt - Logs.txt
  • Make a fake email by providing a sign that you are an admin facebook aim for the victim's trust. For example:
      admin_facebook@yahoo.com
      admin.facebook@gmail.com
      admin.fb @ plasa.com
  • Continue to downloads the message to bogus e-mail here
  • Open the contents of the file. Then change the name of Cinta the red with your name and alamat_email_anda@gmail.com replace the red with your fake email address. Keep at URL:  http://www.facebook.com/n/?reqs.php
    Replace the blue with a fake login page URL that you created. For example:
    http://situsanda.byethost.com/index.html
  •  After all you go, immediately send the message to the email address of the victim .. Email address + password of the victim will come naturally to you a false email if the victim cheated ... hehehe
Note: do not be misused ...

Saturday, November 6, 2010

Remove Kaspersky Internet Security 2011 & Antivirus with Kaspersky Removal Tool

Posted by glewoCROW 1:19 PM, under ,, | No comments

You might need to completely remove the beta version of kaspersky internet security 2011 or antivirus
on installing the latest version of Kaspersky Internet Security 2011.
Some times you might not be able to remove the old version of kaspersky
completely to continue with the installation of new version. If you are in a situation like that here’s the official
tool from kaspersky to remove kaspersky internet security 2011 or antivirus from pc completely.

Kaspersky Lab Products Remover
tool can completely uninstall the kaspersky products from your system.
The tool is free and portable and is compatible with windows xp, vista
and windows.
To remove a particular kaspersky product, run the tool and enter the product code in the required filed from the picture shown.
kasperskyinternetsecurity2011removaltool Remove Kaspersky Internet Security 2011 & Antivirus with Kaspersky Removal Tool
Then select your desired product and click on the Remove Button.
uninstallkaspersky2011antivirus Remove Kaspersky Internet Security 2011 & Antivirus with Kaspersky Removal Tool
The desired kaspersky product will be removed completely from your pc. You might need to restart your pc after the installation.
Download Kaspersky Lab Products Remover

Convert Kaspersky Serial Key To a License Key File For Offline Activation

Posted by glewoCROW 12:27 PM, under ,, | No comments

If you have a genuine license serial of kaspersky pure,
then you can easily convert it to a License Key File and store it in
your pc for future use. Here’s how you can make a kaspersky key file
from the activation serial code of Kaspersky Pure.

Make a Kaspersky Pure License Key File From Serial Code

  1. Visit https://activation.kaspersky.com/.
  2. Now enter your activation code in the filed provided.
  3. If
    you have already registered a kaspersky account before, then just enter
    the customer ID and Password in the fields. Else you can leave those
    two fields and type in the kaspersky activation serial code alone.
  4. After entering the Verification code and pressing Next, you can download the Kaspersky Pure Activation Key File.
  5. Save
    the key file to your pc, so that you can activate kaspersky later
    without an internet connection, ie. just by using the key file alone.

How to Activate Kaspersky Pure with a Genuine License

Posted by glewoCROW 12:10 PM, under ,, | No comments

Kaspersky
has released their more powerful and power packed security app namely
Kaspersky Pure. Kaspersky Pure offers more than just normal antivirus
protection and it includes features such as firewall, identity
protection, secure file shredder, antispam protection, email protection,
password manager, data backup, data encryption, pc tuneup etc. Kaspersky Internet Security was the main product of Kaspersky with Kaspersky Antivirus
as the basic program. By this Kaspersky Pure will become the dominant
product in kaspersky series of products. In short it is a more powerful
security application with much more features than the normal Kaspersky
Internet Security App. New users find it a little confusing on how to
activate Kaspersky Pure. Here is how you can do it.

Activating Kaspersky Pure Online with Genuine License

  1. Connect Your PC To Internet.
  2. On reaching the Activation screen of kaspersky pure, You will have three option Activate commercial license, Activate trial license, Activate later.
  3. Make sure your system date is set correctly.
  4. Now to activate the commercial (full) version of Kaspersky PURE, enter the activation code you received after purchasing the license in the entry field and click on Next.
  5. When you have entered the license key incorrectly. Press OK, on the following popup message.
  6. After you clicking on the Next button you will be shown 3 field to fill in information. These fields are required to identify you by Kaspersky Lab Technical Service as a registered user.
    • fill in all the fields: Email, Country, City, and then click the Next button
    • the Configuration Wizard will connect to the Kaspersky Lab server and will download a Kaspersky Pure license key file.
  7. Now in the Application activation window with the information about successful activation click the Next button and proceed with the installation.

Activate Kaspersky Pure After Product Installation

  1. If you have already activated trial version of Kaspersky Pure before, click the Activate commercial license button.
  2. If during the installation you selected Activate later, then in order to activate a commercial version of the application via the application interface, click the Activate new license button.
  3. Now, follow the instructions as seen above to activate Kaspersky Pure successfully with genuine license key file.
Go ahead enjoy your fully activated kaspersky pure security.

How to Activate Kaspersky 2011 with License Key (Offline Activation)

Posted by glewoCROW 11:53 AM, under ,, | No comments

Like the previous version of kaspersky internet security 2010, the version too wont allow you to activate the license using a key file. But if you have got a genuine key for kaspersky 2011 you can easily activate it with the steps in our previous guide. Here’s how you can activate kaspersky using a key file.

If you have got a genuine serial key for kaspersky 2011, then this guide will help you convert kaspersky 2011 serial to key file. With the key file in your computer lets start.
  1. Click on the Kaspersky license manager from the main window (seen at lower right).
  2. The License management window will now popup with two options for you. Click on the “Activate the application with a new license” option.
  3. Disconnect your internet connection and enter this code. T1JVS-NNMBD-K1QTN-SUBP8.
  4. Followed by that an error window will be displayed with a message “Activation error:Cannot setup server connection”. Now Click on “OK”.license activation server
  5. You will now be shown with the window to activate kaspersky 2011 with license key.kaspersky 2011 activating with key
  6. Just browse and locate your new license key file and done.

Update Manual Kaspersky Anti Virus Offline

Posted by glewoCROW 11:18 AM, under ,, | No comments

Do you have problems updating kaspersky Antivirus online? Do you want to update your Antivirus regularly ?
This post is in response to a question asked by one of my readers. He
is a computer technician, who works with and repairs many pc’s daily,
and he is a very busy person, so time management is important for him.
He is a fan of Kaspersky and he recommends it to all of his clients.

As you know, there is no point in installing the best antivirus/internet security without being able to update it. Updating Kaspersky
takes a very long time as their servers are damn slow. So, he asked me
is there any other way to save time by updating kaspersky as quick as
possible in computer’s with and without internet connection.
In case if you don’t have a internet connection you download the kaspersky update files from your friends pc, or from else where and you can install and update kaspersky in your computer with the latest virus signature database. Here is How to Update Kaspersky without Internet.
There is a tool called Kaspersky Updater that will download the latest updates for all kaspersky products, including the latest virus signature database and also the program components.
  1. First Download the Kaspersky Updater Program
    from the official Kaspersky forums, you need to register there to get
    the program, else you can just google it, but its better to go with the
    reliable source to download the program. I am not giving the direct link
    to the program because, i am not sue whether it is legally right to
    give it directly. If every thing is fine i will post the download link
    as soon as possible.
  2. After downloading the updater utility,
    extract the contents of it in the same directory. The Updater and GUI
    utility must be there in the same directory. Now, start the KasperskyUpdater.exe program.
  3. From the shown option, choose Download databases for the selected products and tick the boxes corresponding to the kaspersky version you need. Now click on Apply and Start. The program will start downloading the latest updates for kaspersky.
  4. Now we need to configure Kaspersky to download the offline updates. For this, Click on Settings > Choose Update on the left pane (its My Update Center in the latest Kaspersky Version).
  5. Click on Settings button > click Add, point to the location of the Updates folder and click on OK and finally, Uncheck Kaspersky Lab’s update servers > and click OK.
  6. That’s it, Now you can successfully update Kaspersky Antivirus/ Internet Security Manually or Offline.
The
Kaspersky Updater Utility takes a some time when you download the
updates for the very first time, after-wards it takes only just a few
minutes to download the latest updates, as the program supports
incremental updates.
Now you will feel the time difference when
updating kaspersky. It only takes less than a minute to update Kaspersky
Offline to the latest version where as it takes upto an hour to
complete the update online.

The problems of classification with Viruses

Posted by glewoCROW 8:27 AM, under ,, | No comments

The problems of classification


One of the main issues in contemporary mobile malware research is
classification; specifically, labeling new samples correctly and
grouping them into the appropriate classes that reflect their behavior.
The main difficulty is that most new malicious programs for mobile
devices are hybrids, containing functionality from two or more different
types of malware.


The Kaspersky Lab classification system is clearly structured:


  • Behaviour: this shows what the program is, and what it does. Examples include Email-Worm, Trojan-Downloader, Trojan-Dropper.
  • Environment – i.e. the operating system or specific application
    within which the malicious program functions. Examples include Win32,
    MSWord, Linux, VBS
  • The family name and the variant identifier (letters).

There are few, if any, problems when it comes to the family name and
variant ID. Occasionally it is difficult to choose a family name, but
this is discussed in more detail below.


Sometimes it is difficult to identify the environment. Currently,
most cases of mobile malware involve malicious programs written for the
Symbian operating system, which we denote with “SymbOS”. However, more
and more frequently users are wanting to know which particular Symbian
Series a particular piece of malware is coded for. “Will a given Trojan
only function in Symbian Series 60 SE, or will it also attack devices
running under Series 80?”, and so on. In our classification system for
computer malware, we do identify the specific Windows version: Win16,
Win9x, Win32. So it’s possible that in future we will need to include
numbers in our Symbian classification as well.


In terms of mobile malware, identifying the Symbian series is the
least of our problems. Things get much more complicated when we examine
Windows Mobile.


For instance, there are viruses that were written for Windows CE
2003. We named this environment WinCE. However, malware written for
Windows Mobile 5.0 doesn’t function under Windows CE. Moreover, Windows
Mobile does not fully replace Windows CE, since we also have Windows
Pocket PC. Mobile and Pocket PC both use a set of functions which are
also used by Windows CE, but then have their own specific applications
and peculiarities.


As a result, it is very difficult to use the existing classification
system to give a specific piece of malware a precise name that reflects
its behavior.


Additionally, a number of viruses require that .NET for WinCE/
Windows Mobile be installed in order for them to function. In such
cases, we use the designation MSIL for the environment, which does not
underline the fact that the malware was coded for mobile devices.


Confused yet? This is just the tip of the iceberg. The most
complicated part of naming mobile malware is choosing the behavior.
This is where serious complications are caused by hybridization, as well
as cross platform mobile malware and the different naming conventions
used by different antivirus vendors.


A look at some examples will make the issue clearer.


Let us assume that we have a certain sis file (which in essence is an
archived installer). This file contains the files from Cabir, Comwar,
the Pbstealer Trojan, several Skuller.gen files and several empty files
(0 bits), which are a hallmark of Locknut. And if this wasn’t enough,
this file also installs a Win32 virus to the phone’s memory card (just
like the Cardtrap Trojan).


Based on our current classification system, we would call this a
Trojan-Dropper. But not in this case! Cabir, once installed, will send
the sis file via Bluetooth. Does this mean the sis file is a worm?
And if so, what do we call it? Cabir? Impossible. We can’t call it
Cabir and give it a new variant ID because 90% of the sis file contents
have nothing to do with Cabir. Naming it Cabir would only confuse users.


What about Skuller, Locknut or Cardtrap? But none of these names
alone are applicable, since the new sample is a hybrid. As a result,
the sis file is most likely to be called a Trojan and given a family
name of an existing family from our collection. This name will be chosen
on the basis of secondary traits, such as being written by the same
author.


Such complex situations are rare for computer viruses, but are the
norm for mobile malware. It’s possible that as primitive vandal Trojans
become fewer, (as mentioned above) as described above, the world of
mobile malware will become more structured.


Let’s examine another case. We have a worm that runs under Win32.
When it is launched on a PC, among other things, it creates a sis file
on the E: \ drive. As a rule, Symbian phones connect to PCs via this
drive. The sis file contains several blank/empty files and these are
used to overwrite a number of the phone’s system applications. This sis
file also contains the same Win32 worm, which copies itself onto the
phone’s memory card together with an autorun.inf file. If the infected
phone is connected to a clean computer and an attempt is made to access
the memory card from the PC, the worm will be launched and the clean
computer infected.


This is an example of a cross-platform virus which is capable of
running under two operating systems: Symbian and Windows. A worm like
this exists - it's called Mobler. But how should it be classified?


For cross-platform viruses, we used the “Multi” identifier.
Worm.Multi.Mobler? Unfortunately, users can’t tell from this name that
the virus poses a threat to Symbian smartphones. We believe that the
best way to classify this program is in accordance with its two
components: the win32 file is classified as Worm.Win32.Mobler, and the
sis file as Worm.SymbOS.Mobler.


However, other antivirus companies don't classify the sis file either
as Mobler, or as a worm. They call this program Trojan.SymbOS.Cardtrap,
because, according to their classification systems, any malicious
program which installs a Win32 malicious program to the memory card is
Cardtrap. But this malicious program doesn’t install a random Trojan, it
installs its own main component and sends a copy of itself only to
other operating systems. However, the strict criteria imposed by
antivirus companies' classification mean that the square pegs have to be
forced into round holes. And at the end of the day this means everybody
loses - both the users and the antivirus companies themselves.


If we start from the assumption that the propagation methods and
behaviours of many mobile viruses will be fundamentally different from
anything we’ve seen before, this means that we will have to create new
classes in order to reflect this. For instance, Cabir (or any worm which
propagates via Bluetooth) could logically be classified as a
Bluetooth-Worm (as could Inqtana, a worm for Mac OS). A worm which
propagates via MMS could be classified as an MMS-Worm. But what if the
worm sends itself via Bluetooth and via MMS? Which of these two
propagation methods is the most important? Kaspersky Lab would see MMS
as being the main propagation methods, but other antivirus companies
might think differently, giving priority to Bluetooth.


Sooner or later the antivirus industry will have to face the fact
that it’s essential to create a unified classification system for mobile
malware. This should be done as soon as possible before the situation
becomes critical, and before the confusion that reigns in terms of
classifying PC viruses (with viruses being given totally different names
by individual vendors) takes over the mobile malware world.
Unfortunately, the failure to create a unified classification system for
PC viruses does not leave much hope for the future in terms of mobile
malware classification.

Basics of Viruses

Posted by glewoCROW 8:11 AM, under ,, | No comments

One of the main differences in the technology used in viruses for
mobile devices and personal computers is that, although there are
numerous mobile virus families, very few mobile viruses are truly
original. This is similar to computer viruses in the late 1980s. Back
then, there were hundreds of viruses derived from the source code of
“base” malicious code. A multitude of malicious programs were based on
just three viruses: Vienna, Stoned and Jerusalem.
In terms of mobile malware, I would identify the following programs as
the “forebears” of other mobile viruses:

  • Cabir
  • Comwar
  • Skuller.gen

Cabir served as the basis for a number of its own variants, which
differ only in terms of the file names and the contents of the sis
installation files. Cabir was also used as the basis for such seemingly
dissimilar families as StealWar, Lasco and Pbstealer.

Lasco


Lasco was the first of these ”new” families to appear. In addition
to worm functionality, programs from this family are capable of
infecting files in the phone memory. Lasco’s evolution is a good
example of what happens when virus source code is made publicly
available. A Brazilian by the name of Marcos Velasco, who calls himself a
mobile virus expert, got hold of the source code for Cabir and began
writing viruses. During the last week of 2004 he sent several variants
of Cabir that he had written to antivirus companies. Some of them were
completely non-operational and all were categorized as Cabir variants.
This did not please the author; in an attempt to become famous he
created a variant of the worm that was also capable of infecting sis
files. This is how the Lasco worm came to be in antivirus databases.

Luckily, the idea of infecting files was not further developed by
virus writers, even though Velasco published the source code of his
creation on his website.
It is still not quite clear whether Cabir was actually used as a source
for Lasco. According to Marcos Velasco, he wrote all the code
independently, but the number of files, their names and operating
principles are very similar to Cabir. It’s possible to compare the main
functions in both worms and draw your own conclusions.

The function that sends the worm via Bluetooth (Cabir):

if(WithAddress)

{

        WithAddress = 0;

        Cancel();

        TBTSockAddr btaddr(entry().iAddr);

        TBTDevAddr devAddr;

        devAddr = btaddr.BTAddr();

        TObexBluetoothProtocolInfo obexBTProtoInfo;

        obexBTProtoInfo.iTransport.Copy(_L("RFCOMM"));

        obexBTProtoInfo.iAddr.SetBTAddr(devAddr);

        obexBTProtoInfo.iAddr.SetPort(0x00000009);

        obexClient = CObexClient::NewL(obexBTProtoInfo);

        if(obexClient)

        {

                iState = 1;

                iStatus = KRequestPending;

                Cancel();

                obexClient->Connect(iStatus);

                SetActive();

        }

}

else

{

        iState = 3;

        User::After(1000000);

}

return 0;

The function that sends the worm via Bluetooth (Lasco):

if ( FoundCell )

{

        FoundCell = _NOT;

        Cancel();

        TBTSockAddr addr( entry().iAddr );

        TBTDevAddr btAddress;

        btAddress = addr.BTAddr();

        TObexBluetoothProtocolInfo obexProtocolInfo;

        obexProtocolInfo.iTransport.Copy( _L( "RFCOMM" ) );

        obexProtocolInfo.iAddr.SetBTAddr( btAddress );

        obexProtocolInfo.iAddr.SetPort( 9 );

        if ( ( iClient = CObexClient::NewL( obexProtocolInfo ) ) )

        {

                iStatus = KRequestPending;

                BluetoothStatus
= _BLUETOOTH_NOT_CONNECTED;

                Cancel();

                iClient->Connect( iStatus );

                SetActive();

        }

}

else

{

        BluetoothStatus = _BLUETOOTH_CONNECTED;

}

}

Pbstealer


The first Trojan spy for Symbian, Pbstealer, is another Cabir
“offspring”. It was created in Asia, probably in China, and was found
on a hacked Korean website devoted to Legend of Mir, an online game.
This method of distribution and the fact that the Trojan was written
with criminal intent demonstrates how the “good intentions” of Cabir’s
author paved the way for the development of further malware.

The function that enabled the Trojan to send files via Bluetooth came
from Cabir. However, authors of the Trojan made one important
modification to the original code. The Trojan searches for the phone’s
address book and sends data contained in it via Bluetooth to the first
device found. Hence the name Pbstealer, which stands for “Phonebook
Stealer”. Until then cybercriminals used various vulnerabilities in the
Bluetooth protocol to steal such information, e.g., BlueSnarf. This
Trojan, however, greatly extended the possibilities available.

And, of course, Cabir became the carrier of choice for a variety of
other Trojans. More than half of all Skuller, Appdisabler, Locknut,
Cardtrap and other “vandal” Trojan variants contain Cabir, which has
been modified to spread not only itself, but the whole Trojan package.
This sort of hybridization has led to significant difficulties in
categorizing many malicious programs. We will discuss this in greater
detail below.

Comwar


A second landmark in the development of mobile malware was Comwar,
the first worm to spread via MMS. Like Cabir, it can spread via
Bluetooth, but MMS is the principal method used, making this worm
potentially extremely dangerous.
Bluetooth operates within a distance of 10 to 15 meters and other
devices can be infected only if they are within this range. MMS has no
boundaries and can be instantly sent even to handsets in other
countries.

The author of Cabir initially considered this idea, but chose
Bluetooth for quite obvious (from the viewpoint of 29A ideology)
reasons:

«mms: Its easy to route over the agent searching
phone numbers and sending them a mms message with the worm attached, but
we have two problems:
  • We dont know what type of phone are we sending the mms. We dont know
    if that phone is able to receive mms message or if it could execute the
    worm.

  • We are spending the money of the phone.»

The second reason is telling: it means that the author of Cabir did
not wish to do financial harm to users. The author of Comwar, on the
other hand, had no qualms about this whatsoever.

Although the technology that makes it possible to send malware via
MMS is the most attractive to the authors of mobile malware, so far
we’ve only seen the usual transformations performed on the original
worm, with baby hackers changing file names and texts in the original
files without making any changes to Comwar’s functionality. This is due
to the fact that the source code for Comwar has not been published and
the script kiddies don’t know the procedure used to send infected MMS
messages.

Currently, we know of 7 modifications of this worm. Four of them include an “author’s signature”.

CommWarrior v1.0b (c) 2005 by e10d0r

CommWarrior is freeware product. You may freely distribute it in it's original unmodified form.

Comwar.b:


CommWarrior v1.0 (c) 2005 by e10d0r

CommWarrior is freeware product. You may freely distribute it in it's original unmodified form.

Comwar.c:


CommWarrior Outcast: The dark side of Symbian Force.

CommWarrior v2.0-PRO. Copyright (c) 2005 by e10d0r

CommWarrior is freeware product. You may freely distribute it

in it's original unmodified form.

With best regards from Russia.

Comwar.d:


Does not contain any distinguishing texts. MMS texts replaced with Spanish texts.

Comwar.e:


WarriorLand v1.0A (c) 2006 by Leslie

Also contains texts in Spanish.

Comwar.f:


Does not contain any distinguishing texts. MMS texts replaced with Spanish texts.

Comwar.g:


CommWarrior Outcast: The Dark Masters of Symbian.

The Dark Side has more power!

CommWarrior v3.0 Copyright (c) 2005-2006 by e10d0r

CommWarrior is freeware product. You may freely distribute it in it's original unmodified form.

In addition to the above, variant .g was the first variant to include
file infector functionality. The worm looks for other sis files in the
phone’s memory and appends its code to these files. This provides one
more propagation method in addition to the traditional MMS and
Bluetooth.

It should be noted that so far Comwar has not spawned a multitude of
other families. As mentioned above, the reason for this is that its
source code has not been published. Just like Cabir, it is used as a
carrier for other Trojan programs. Apparently, the only program using
Comwar that can lay claim to having started a new family is StealWar.
This is a worm that combines Cabir, Comwar and the Trojan Pbstealer.
This type of combination is highly dangerous and capable of spreading
widely.

However, it’s inevitable that propagation via MMS will eventually
become the most common method of propagation for mobile malware. This is
all the more likely because there is already a serious known MMS
handling vulnerability in Windows Mobile 2003, which leads to a buffer
overflow and the execution of arbitrary code. The vulnerability was
reported by Collin Mulliner in August 2006 at the DefCon conference.



Demonstration of the MMS vulnerability(Collin Mulliner, Advanced Attacks Against PocketPC Phones).

Detailed information about the vulnerability will not be available to
the general public until Microsoft releases the relevant update.
However, the absence of information doesn’t make the vulnerability any
less dangerous. If somebody creates a worm that launches itself
automatically, without the user’s participation when it gets into a
smartphone memory, this could cause a global outbreak.

Comwar also contributed to the evolution of mobile malware with a
technology implemented in variant .c; this technology could be seen as
rootkit technology. The worm conceals itself in the list of processes
and is not visible in the standard list of applications currently
running. Comwar is able to do this because its process is designated as
“system”. Although the process can easily be discovered using other
programs for viewing running processes, this masking method is
nevertheless now being used in some other malicious programs for
Symbian.

Skuller


As mentioned above, Skuller is the most numerous family of mobile
Trojans: by September 1st, 2006 we had seen 31 variants. This is not
surprising, as these programs are the most primitive malicious programs
for Symbian. Any person who can use a utility for creating sis files
will be able to create a Trojan of this kind. The rest of the work is
done by the vulnerabilities present in Symbian: it is possible to
overwrite any files, including system files, and the system becomes very
unstable when it comes across unexpected files (i.e. files that are
damaged or not standard format for the relevant version of the system).

Most Skuller variants are based on two files, which we classify as
Skuller.gen, and it’s these files that distinguish Skuller from other
families with similar functionality (e.g., Doombot or Skudoo):

  • a file with the same name as the application it
    replaces and the extension “aif”. Its size is 1601 bytes. This is an
    icon file containing the skull icon. The file also contains the
    following text string: “↑Skulls↑Skulls”;
  • a file that has the same name as the application it
    replaces and the extension “app”. Its size is 4796 bytes. This is an
    EPOC application, a “dummy” file.

Current mobile malware types and families

Posted by glewoCROW 3:24 AM, under ,, | No comments

Autumn 2004 was when mobile malware started to evolve in three main
areas. One was Trojan programs which are designed for financial gain.
The first mobile Trojan was Mosquit.a. In theory, it’s a harmless
mobile phone game; however, at some point it starts to send numerous SMS
messages to telephone numbers in the address book, meaning that the
user’s phone bill will increase. In fact, Mosquit.a wasn’t only the
first Trojan for smartphones, but also the first piece of adware for
mobiles.

Skuller.a, a Trojan which appeared in November 2004, was the first of
what is now the largest family of mobile Trojans. This was the first
malicious program to take advantage of the design faults of Symbian,
which make it possible for any application to overwrite system files
with their own files without prompting the user. Skuller replaced
application icons with skull and crossbones, and also deleted
application files. As a result, the handset would stop working once it
had been switched off and switched on again. This type of “vandal
Trojan” became one of the most popular among virus writers.



Skuller.a

Three new variants of Cabir appeared practically at the same time as
Skuller.a. These new variants were not based on the source code of the
original worm. By this time virus writers had got their hands on Cabir,
and some of them did what script kiddies do: they renamed the worm
files and replaced some of the text in the files with their own. One
variant added Skuller to the original archive. The resulting hybrid
didn’t function as intended: the worm was unable to replicate because
the Trojan crashed the phone. However, this was the first time that
Cabir was used as a carrier for other malicious programs.

By the beginning of 2005, the main types of mobile malware had
evolved, and were used by virus writers over the next eighteen months:

  • worms that spread via smartphone protocols and services
  • vandal Trojans that install themselves to the system by exploiting Symbian design faults
  • Trojans designed for financial gain

However, although there are only a few main types of behavior, in
practice mobile malware comes in a variety of forms. Kaspersky Lab is
currently tracking 31 distinct mobile malware families. The table below
shows the main characteristics for each family.

Name Date OS Functionality Technology used Number of variants
Worm.SymbOS.Cabir June 2004 Symbian Spreads via Bluetooth Bluetooth 15
Virus.WinCE.Duts July 2004 Windows CE Infects files (File API) 1
Backdoor.WinCE.Brador August 2004 Windows CE Provides remote network access (Network API) 2
Trojan.SymbOS.Mosquit August 2004 Symbian Sends SMS messages SMS 1
Trojan.SymbOS.Skuller November 2004 Symbian Replaces files, icons, system applications OS vulnerability 31
Worm.SymbOS.Lasco January 2005 Symbian Spreads via Bluetooth, infects files Bluetooth, File API 1
Trojan.SymbOS.Locknut February 2005 Symbian Installs corrupted applications OS vulnerability 2
Trojan.SymbOS.Dampig March 2005 Symbian Replaces system applications OS vulnerability 1
Worm.SymbOS.ComWar March 2005 Symbian Spreads via Bluetooth and MMS, infects files Bluetooth, MMS, File API 7
Trojan.SymbOS.Drever March 2005 Symbian Replaces antivirus application loaders OS vulnerability 4
Trojan.SymbOS.Fontal April 2005 Symbian Replaces font files OS vulnerability 8
Trojan.SymbOS.Hobble April 2005 Symbian Replaces system applications OS vulnerability 1
Trojan.SymbOS.Appdisabler Ìàé 2005 Symbian Replaces system applications OS vulnerability 6
Trojan.SymbOS.Doombot May 2005 Symbian Replaces system applications, èíñòàëëÿöèÿ Comwar OS vulnerability 17
Trojan.SymbOS.Blankfont July 2005 Symbian Replaces font files OS vulnerability 1
Trojan.SymbOS.Skudoo August 2005 Symbian Installs damaged applications, installs Cabir, Skuller, Doombor OS vulnerability 3
Trojan.SymbOS.Singlejump August 2005 Symbian Disables system functions, replaces icons OS vulnerability 5
Trojan.SymbOS.Bootton August 2005 Symbian Installs damaged applications, installs Cabir OS vulnerability 2
Trojan.SymbOS.Cardtrap September 2005 Symbian Deletes antivirus files, replaces system applications, installs Win32 malware on memory cards OS vulnerability 26
Trojan.SymbOS.Cardblock October 2005 Symbian Blocks memory cards, deletes folders OS vulnerability, File API 1
Trojan.SymbOS.Pbstealer November 2005 Symbian Steals data Bluetooth, File API 5
Trojan-Dropper.SymbOS.Agent December 2005 Symbian Installs other malicious programs OS vulnerability 3
Trojan-SMS.J2ME.RedBrowser February 2006 J2ME Sends SMS Java, SMS 2
Worm.MSIL.Cxover March 2006 Windows Mobile/ .NET Deletes files, copies its body to other devices File (API), NetWork (API) 1
Worm.SymbOS.StealWar March 2006 Symbian Steals data, spreads via Bluetooth and MMS Bluetooth, MMS, File (API) 5
Email-Worm.MSIL.Letum March 2006 Windows Mobile/ .NET Spreads via email Email, File (API) 3
Trojan-Spy.SymbOS.Flexispy April 2006 Symbian Steals data 2
Trojan.SymbOS.Rommwar April 2006 Symbian Replaces system applications OS vulnerability 4
Trojan.SymbOS.Arifat April 2006 Symbian 1
Trojan.SymbOS.Romride June 2006 Symbian Replaces system applications OS vulnerability 8
Worm.SymbOS.Mobler.a August 2006 Symbian Deletes antivirus files, replaces system applications, spreads via memory card OS vulnerability 1
31 families, 170 variants


Complete (as of 30th August 2006) list of mobile virus families according to Kaspersky Lab classification



 “What can mobile viruses do?”:

  • Spread via Bluetooth, MMS
  • Send SMS messages
  • Infect files
  • Enable remote control of the smartphone
  • Modify or replace icons or system applications
  • Install “false” or non-operational fonts and applications
  • Combat antivirus programs
  • Install other malicious programs
  • Block memory cards
  • Steal data

We have to acknowledge that today’s mobile viruses are very similar
to computer viruses in terms of their payload. However, it took computer
viruses over twenty years to evolve, and mobile viruses have covered
the same ground in a mere two years. Without doubt, mobile malware is
the most quickly evolving type of malicious code, and clearly still has
great potential for further evolution.

Symbian Cabir Virus

Posted by glewoCROW 2:19 AM, under ,, | No comments

On June 14, 2004, a well-known Spanish virus collector known as
VirusBuster, who had close links with some virus writers, sent a message
to newvirus@kaspersky.com. The message had a file called caribe.sis
attached. A quick analysis showed that it was
an application for Symbian OS and also an installer archive containing
other files. As a rule, virus analysts deal with files created for
traditional x86 processors. The files in caribe.sis were applications
for ARM, processors which are used in a range of devices, including
mobile phones. Initially, we knew very little about the machine language
used by that processor, but within a few hours our analysts had managed
to familiarize themselves with it. The purpose of the files was then
clear: this was a worm for mobile phones which spread via Bluetooth.
Our conclusions were fully confirmed the next day when we tested the
worm on a Nokia N-Gage telephone running Symbian.

The worm was written by someone going under the name of Vallez. As
far as we know, he lives in France and was, at the time, a member of a
group of virus writers called 29A. The groups aim was to create
proof-of-concept virus code for non-standard operating systems and
applications. Back in June 2004, the
objective was to create a malicious program for smartphones. The author
also chose a non-standard replication method - analysts are used to
worms which spread via email, and Cabir could have been expected to
propagate in the same way, given that Internet connectivity and email
are two of the main features of smartphones. However, the worms author
chose Bluetooth instead; an approach that turned out to be key.

Cabir is coded for the Symbian operating system, which was, and
remains, the most commonly used operating system in mobile phones. This
marker leader position is due largely to the fact that all smartphones
produced by Nokia are Symbian-based. In fact, Symbian+Nokia is currently
the standard smartphone combination, and it's going to take Windows
Mobile a long time to win a significant share of the market from
Symbian.

The appearance of Cabir confirmed the law of computer virus
evolution. In order for malicious programs targeting a particular
operating system or platform to emerge, three conditions need to be
fulfilled:

  1. The platform must be popular. Symbian was and remains the most popular platform for smartphones, with tens of millions of users throughout the world.

    Symbian could be a very extended
    operating system used in mobile phones in the future. Today is the more
    extended and in my opinion it could be more yet (M$ is fighting too for
    being into this market too).”



  2. There must be well-documented development tools for the application.
  3. Caribe was written in c++. Symbian/nokia is giving us a complete sdk for developing applications for symbian operating system.”

  4. The presence of vulnerabilities or coding errors.
    Symbian includes a number of faults, by design, in the system that
    handles files and services. In the case of Cabir these faults were not
    exploited, but most of todays Trojans for smartphones take full
    advantage of them.


Cabir immediately attracted the attention not only of antivirus
companies, but of other virus writers as well. The latest issue of
29A's webzine was eagerly awaited, with the expectation that the group
would, in accordance with tradition, publish the worms source code.
Naturally, the publication of the source code would lead to the
emergence of new, more harmful variants of the worm: this is what always
happens when script kiddies gain access to such technologies. However,
petty cyber criminals can be capable of doing a lot of damage even
without access to original source code.

LCG X-PLORE - The Best File Manager for Symbian

Posted by glewoCROW 1:36 AM, under ,, | No comments

I have got this strange habit; the moment, I find something very good and useful, I start to search for a better and more useful alternative. Most of the time I succeed and the process continues. But sometimes, the search becomes endless as in the case of X-plore. After searching and trying many file manager apps (like FExplorer, SeleQ, FileMan etc), I can easily say that no one matches X-plore. Be it usability (Ease of use), functionality (No. of options) or customization X-plore outperforms every other application in its category. X-plore is available for Symbian series 60 phones (All versions). Besides the regular functions, some unique features of X-plore are:

1. The ‘File’ menu is unique in X-plore; you can open a file either, through system’s default application or through X-plore’s built in default application.

2. You can view stored offline HTML web pages in X-plore (A feature, not available even in some high end Smartphones)

3. There is also a built-in Audio and Video Player in X-plore.

4. Microsoft Word files (.doc) can also be viewed through X-plore.

5. Images can be viewed in an in-built landscape viewer with very good zoom and smooth scroll functions.

6. There is a built-in Hex viewer and Editor for power users.

7. There is a built-in ZIP, JAR and RAR file viewer and extractor.

8. There is also a file compression Utility (Compress files in ZIP format) in x-plore.

Whew! This much functionality in a single, little application. If you think, it’s not a big deal then name any single computer software that can perform any five (Out of 8), of the above described functions.

Download X-plore

HOW TO REMOVE SYMBIAN (S60 v1 AND S60v2) VIRUS INFECTION?

Posted by glewoCROW 1:20 AM, under ,,, | No comments

The easiest and sure shot way of removing most mobile (S60 1st and 2nd edition only) viruses is to format the phone and memory card both.
Because the virus usually runs as a system process and resides in the memory, one cannot delete all the files related with virus while the phone is on. Usually virus related files have bizarre names (Like kktuqwe.exe, gdv.mdl etc) with extensions .exe .mdl and/or .sis. With the help of X-plore these files can be located in C:\(root) C:\System\Recogs, C:\System\Programs, C:\System\Apps, E:\(Root), E:\System\Apps, E:\System\Recogs, E:\System\Programs (And other hidden system folders). You can find and delete them easily but unfortunately the virus (That is still running) will recreate them instantly. So the best way is to format the phone, however formatting the Memory card is optional.

1. Before formatting the phone, backup your contacts and other data on memory card and/or PC. Now remove the memory card and format the phone.
2. If you don’t want to format the memory card then remove it before formatting the phone. Now connect it to your PC and scan with a good antivirus (Avast is the best and free antivirus that detects and removes most mobile viruses). Delete any infection detected. DO NOT re-insert the memory card before formatting the phone otherwise the virus will again infect it.
3. If you want to format memory card also, format it through PC first and then reformat it through formatted phone.

NOTE: If you can’t see hidden files in X-plore then proceed as follows
1. Run X-plore,
2. Press 0 (Zero) on keypad (Or go to Menu/Tools/Configuration)
3. Check the first 4 boxes
Press back and now you can see the hidden system files.

Most of the mobile antiviruses, I used to remove the virus, failed miserably, may be they are still not as good as their desktop counterparts. So in my opinion having an antivirus running on your Symbian phone (Having meager RAM) will do nothing but to slow down the device. One more reason for not having a mobile antivirus is that mobile viruses are not as sophisticated and sneaky as their Windows siblings and they just cannot enter your phone without your permission. So it’s all up to you that with a little precaution you can keep your mobile clean and healthy.

PLAYING GAMES WITH SYMBIAN VIRUS

Posted by glewoCROW 12:59 AM, under ,, | No comments

Yesterday I came across a Symbian virus (With which my cousin’s Nokia N70 was infected). I analyzed its files (with the help of X-plore) and effects on phone. Avast antivirus showed its sis file as Malware/Virus on scanning (It is probably a variant of Commwarrior – One of the first mobile viruses known). This virus appeared to be not as damaging to the phone as some of its siblings (Skulls, Cabir etc). However it caused the phone hang frequently, slowing it down and draining battery too fast. It also automatically replicates and sends its copies (In the form of installable sis files) to other phones (Who have Bluetooth “On”). Now have a look at the names of sis files it sends – “girl.jpg”, “sex.3gp” etc (All showing fake extensions); a funny and “sexy” virus indeed.
I am really impressed with the creativity of the programmer of this virus (Had he made a good application rather than this crap, he would have become a famous and successful developer by now). Because the above names are so attention grabbing, anyone will install it and get infected easily. So prevention is the best way to avoid infection and the three golden rules of prevention are –
1. ALWAYS Keep your Bluetooth Off and On it only when required.
2. DO NOT open any message that is in the form of sis, jar, exe or any other installation format unless you know from where it came and what it is.
3. DO NOT EVER accept Bluetooth connection request from a suspicious source.

I kept some copies of this virus to understand Symbian virus architecture. Anyone interested (Specially developers) can get it from me. Just leave your request in the comment with your mail ID and I will send it to you. But please don’t use it with bad intention and I won’t be responsible for any damages whatsoever.