Researcher to present Windows Phone 8 malware at MalCon
The malware can access private user data on the device, the researcher says
IDG News Service - A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi, India, on Nov. 24.
According to a brief description of the presentation on the MalCon website, it will show approaches and techniques for infecting Windows Phone 8 devices and will demonstrate how the prototype malware can steal contacts, upload pictures, access text messages and more.
The malware's author is Shantanu Gawde, a high school student and security researcher, who last year at MalCon presented a proof-of-concept malware program capable of interacting with Xbox Kinect devices.
Gawde is a member of the National Security Database (NSD), an accreditation program for information security experts run by a nonprofit organization called the Information Sharing and Analysis Center (ISAC) with support from the government of India.
The Windows Phone 8 malware prototype was built for educational purposes and to raise awareness about how malware authors can target the platform, Gawde said Tuesday via email. "The app will be shared with antivirus vendors and Microsoft after the conference so as to enable mitigation of such threats."
"The malware uses legitimate WP8 functionality without resorting to other methods such as 'homebrew apps' and interop capabilities," Gawde said. "The idea behind the app was to code it in such a way that it would be accepted into the marketplace [Windows Phone Store], whilst having hidden functionality."
Gawde declined to reveal other technical details about the malware ahead of his presentation at MalCon.
ISAC researchers are analyzing possible methods that attackers could use to distribute Windows Phone 8 malware apps in enterprise environments.
"We are currently researching the impact on security of deploying and updating apps in the enterprise through various MDM [mobile device management] products," Rajshekhar Murthy, director of the National Security Database program and founder of the MalCon conference, said Tuesday via email. "There are possible chances that hackers can still compromise private enterprise app stores and cause significant damage."
"We would like to further add that based on our malware research internally, we find that Windows Phone 8 is way superior and better than Android in all aspects of security," Murthy said.
"Microsoft is aware of the upcoming presentation but further details have not been shared with us," Dave Forstrom, director in the Trustworthy Computing Group at Microsoft, said Tuesday via email. "As always, we will investigate any issues disclosed in the talk, and will take appropriate action to help protect our customers."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts