Researcher to present Windows Phone 8 malware at MalCon
The malware can access private user data on the device, the researcher says
IDG News Service - A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi, India, on Nov. 24.
According to a brief description of the presentation on the MalCon website, it will show approaches and techniques for infecting Windows Phone 8 devices and will demonstrate how the prototype malware can steal contacts, upload pictures, access text messages and more.
The malware's author is Shantanu Gawde, a high school student and security researcher, who last year at MalCon presented a proof-of-concept malware program capable of interacting with Xbox Kinect devices.
Gawde is a member of the National Security Database (NSD), an accreditation program for information security experts run by a nonprofit organization called the Information Sharing and Analysis Center (ISAC) with support from the government of India.
The Windows Phone 8 malware prototype was built for educational purposes and to raise awareness about how malware authors can target the platform, Gawde said Tuesday via email. "The app will be shared with antivirus vendors and Microsoft after the conference so as to enable mitigation of such threats."
"The malware uses legitimate WP8 functionality without resorting to other methods such as 'homebrew apps' and interop capabilities," Gawde said. "The idea behind the app was to code it in such a way that it would be accepted into the marketplace [Windows Phone Store], whilst having hidden functionality."
Gawde declined to reveal other technical details about the malware ahead of his presentation at MalCon.
ISAC researchers are analyzing possible methods that attackers could use to distribute Windows Phone 8 malware apps in enterprise environments.
"We are currently researching the impact on security of deploying and updating apps in the enterprise through various MDM [mobile device management] products," Rajshekhar Murthy, director of the National Security Database program and founder of the MalCon conference, said Tuesday via email. "There are possible chances that hackers can still compromise private enterprise app stores and cause significant damage."
"We would like to further add that based on our malware research internally, we find that Windows Phone 8 is way superior and better than Android in all aspects of security," Murthy said.
"Microsoft is aware of the upcoming presentation but further details have not been shared with us," Dave Forstrom, director in the Trustworthy Computing Group at Microsoft, said Tuesday via email. "As always, we will investigate any issues disclosed in the talk, and will take appropriate action to help protect our customers."
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts