iPhone security problems bring new risks
Network World - In just four days, not one but two worms targeting the iPhone have emerged. Both of the worms target the same vulnerability, a default password in the SSH server that is installed on jail-broken iPhones. While one worm is a mostly a nuisance, the second siphons personal information from the iPhone, which makes it a serious identity theft threat.
The vulnerability targeted only exists in an iPhone that has been jail-broken, meaning it has been opened to install software from sources other than Apple's iTunes system. One of the first applications installed on a jail-broken phone is a Secure Shell (SSH) server that enables encrypted terminal connections to a command-line interface. Via SSH, users can run basic Unix shell commands on the iPhone, making it very flexible. I have to admit that I have jail-broken my iPod Touch, which is almost identical to the iPhone, in order to experiment with non-approved applications. SSH itself is very secure, however, when first installed it has a default root password so that users can connect for the first time. The instructions accompanying the various flavors of jail-breaking software have large notices warning users to immediately change the password, but many don't.
The first worm that emerged just over a week ago is really more of a proof-of-concept. Promoting the Internet-meme of "rick-rolling", it brings artist Rick Astley into the user's phone. The worm, named "ikee" by the author, installs a picture of Rick Astley as the default background superimposed with the words "ikee is never going to give you up". Antivirus vendor Sophos provided an analysis and code samples of the worm in a blog post.
While mostly harmless, the worm is difficult to remove and creates a nuisance. Reading the source code of the worm, you can see the author comment "People are stupid, and this is to prove it so RTFM its not that hard guys", presumably referring to the warnings about changing the SSH password, which were not followed.
Less than one week later, Mac security vendor Intego discovered a second worm targeting the same vulnerability. Unlike ikee, the worm "iPhone/Privacy.A" is not just a nuisance or a proof of concept. This worm sits on a PC and scans the IP space for signs of a Wi-Fi-connected iPhone with the default SSH password. Once it finds one it siphons all the user's personal data, including e-mail, contacts, photos and other data. There is no indication that the second worm was written by the same author of the first worm, who has since been identified.
Both of these worms do not target a system vulnerability per se. The process of jail-breaking is not in itself the cause of this vulnerability. What both worms demonstrate is the increased interest that hackers are showing to mobile platforms, especially the very popular iPhone. With approximately 6% to 8% of iPhones reportedly jail-broken, these types of worms have plenty of targets. Unfortunately, this is only the beginning of attacks against mobile devices, a phenomenon predicted by most security professionals more than a decade ago. Regrettably mobile devices still do not have security controls much beyond a basic firewall and a closed set of applications. That is not enough.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!