New smartphone Trojan has a profit motive
An ugly trend makes the leap to the Symbian platform
TechWorld.com - Antivirus researchers have turned up three Trojan horse variants that are the most successful attempts yet to steal money from smartphone users.
The variants on the Viver Trojan (short for Trojan-SMS.SymbOS.Viver) send text messages to premium-rate numbers in Russia, a tactic used by some previous malware. But Viver is more sophisticated, according to Kaspersky Lab, which discovered all three Trojan variants last week.
Viver was uploaded to a popular file-sharing site and was downloaded by hundreds of users before it was removed, according to Kaspersky senior virus analyst Aleks Gostev.
The first pieces of malware to try the premium-number tactic were RedBrowser and Wesber, but those were written in Java and required user interaction for each message sent.
Because the earlier programs made use of Russian premium-rate numbers and didn't include a country code, they were only able to function properly from within Russia.
The Viver variants remove those limitations. To begin with, they are written for the Symbian platform - specifically Nokia's S60 version of the operating system, second edition and earlier versions, according to antivirus firm F-Secure.
"Viver is coded to run on phones with Symbian, making it the first Trojan of this type for smartphones," said Kaspersky's Gostev in a research note.
The new Trojans still text to a Russian number but use correct international dialling codes, and thus can work from any country, Gostev said. They don't require any user interaction, but simply begin sending texts as soon as they're installed.
Each text costs the user 177 roubles, or about $7.
Gostev said Kaspersky discovered the Trojans on a popular file-sharing site for mobile users, presenting itself as a photo editor, set of video codecs or other utility.
He said one of the Viver variants was downloaded by around 200 people in less than 24 hours, before the site administrator removed it.
Security experts said the Trojan represents a worrying trend.
"Prior to 2003 there was little for-profit malware on the PC platform, and now almost all malware is written for one or other profit motivation," said F-Secure researcher Jarno Niemela on the company's blog. "It is very likely that more for-profit malware will also appear on mobile platforms."
Kaspersky's Gostev said for-profit mobile malware already seems to be proliferating quickly. "This month alone we've logged three similar incidents," he wrote. "We can only guess how many more of these Trojans are out there, but one thing is for sure - if there's money to be made, virus writers won't be slow to take up the opportunity."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts