What is Cell Phone Virus?

Mobile or Cell Phone Virus

Mobile phone virus is an infectious and destructive mobile phone program. It can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, bluetooth, etc., which will cause the user's mobile phone to freeze, shut down, delete personal information, send out spam to leak personal information, automatically call the phone, send malicious deduction of SMS (MMS), etc. will even damage the SIM card, chip and other hardware, resulting in the user's inability to use the mobile phone normally.

 

Cell phone virus Introduction

With the continuous popularity of smart phones, cell phone viruses have become the next target of virus development. Mobile phone virus is a destructive program, and is as contagious and destructive as computer viruses (programs).

Mobile phone viruses can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, Bluetooth, etc. Mobile phone viruses may cause the user's mobile phone to freeze, shut down, delete data, send out spam, make phone calls, etc., and even damage the hardware such as SIM cards and chips.

Nowadays, mobile phone viruses are inspired and influenced by PC viruses, and there are so-called hybrid attacks.

According to a survey report by McAfee, an IT security vendor, the number of mobile phone users who have been attacked by mobile phone viruses worldwide in 2006 has reached about 83%, a five-fold increase from 2003.

 

History of Cell Phone Virus

The earliest mobile phone virus in history appeared in 2000. At that time, the mobile phone company Movistar received a large number of harassing text messages called "Timofonica" sent by the computer. The virus was sent to users in the system through the mobile system of the Spanish telecommunications company "Telefonica".

Spam and other spam messages. In fact, the virus can only be counted as a SMS bomb at most.

The real mobile phone virus did not appear until June 2004, that is, the "Cabir" worm virus, this virus is copied through the Nokia s60 series mobile phones. Then constantly looking for mobile phones with Bluetooth installed. After that, cell phone viruses began to spread.

 

Working principle of Cell Phone Virus

Mobile phone software, embedded operating system (the operating system solidified in the chip, generally written in JAVA, C ++ and other languages), is equivalent to a small intelligent processor, so it will be subject to virus attacks. Moreover, text messages are not just simple text, including information such as ringtones and pictures of mobile phones, which need to be interpreted by the operating system in the mobile phone and then displayed to mobile phone users. Mobile phone viruses invade mobile phones through software system vulnerabilities.

 

Mobile phone virus must be transmitted and run, the necessary condition is that the mobile service provider must provide data transmission function, and the mobile phone needs to support Java and other advanced program writing function. Now many mobile phones with Internet access and download functions may be invaded by mobile phone viruses.

 

Propagation mode of Cell Phone Viruses

Propagation using Bluetooth: "Kapol" virus will modify the system settings of the smart phone, automatically search for the existence of vulnerabilities in neighboring mobile phones through Bluetooth, and attack.

 

Infection of mobile phone executable files on PC: After "Velasco" virus infects the computer, it will search for SIS executable files on the computer's hard disk and infect.

 

Use MMS multimedia information service method to spread: a new mobile phone virus transmission method appeared, spread through MMS multimedia information service method.

 

BUG attack using mobile phones: This kind of virus generally runs on "EPOC" of portable information equipment, such as "EPOC-ALARM", "EPOC-BANDINFO.A", "EPOC-FAKE.A", "EPOC-GHOST. A "," EPOC-ALIGHT.A ", etc.

 

Harm from Cell Phone Viruses

 

1. Cause user information to be stolen

Today, more and more mobile phone users store personal information on their phones, such as personal address book, personal information, schedule, various network accounts, bank accounts and passwords. These important data will inevitably attract some people with ulterior motives. They will write various viruses to invade the mobile phone and steal important information of users.

 

2. Dissemination of illegal information

Now, MMS is popular, and it has facilitated the beginning of the spread of all kinds of pornography, illegal pictures, voices, and movies.

 

3. Destroy mobile phone hardware and software

The most common hazards of mobile phone viruses are the destruction of mobile phone software and hardware, causing the mobile phone to not work properly.

 

4. Cause the communication network to be paralyzed

If the virus infects the mobile phone, the mobile phone is forced to send spam to the communication network where it is located, which will inevitably lead to the communication network information being blocked. These spam messages will eventually paralyze local mobile communication networks.

 

Examples of Cell Phone viruses

Fishing King, Mobile Skeleton, SMS Pirate, Straight Flush Thief, Thousand-Billionaire, QQ Stealing Number, Zombie Phone Virus (Mobile Phone Zombie Virus), CCa.tx.A, MDa.mj.A (3D Dazzling Rubik's Cube, iCalendar, etc.).

 

Kinds of Cell Phone Viruses

Mobile phone viruses can be divided into four categories according to the virus form:

 

1. Viruses transmitted via "wireless transmission" of Bluetooth devices such as Cabir and Lasco.A

 

  Tips:

Cabir

Cabir is a network worm that can infect mobile phones running the "Symbian" operating system. After the virus is found in the mobile phone, the Bluetooth wireless function will be used to scan other neighboring mobile phones with vulnerabilities.

When the vulnerable mobile phone is found, the virus will copy itself and send it to the mobile phone.

 

Lasco

A virus, like the worm virus, is transmitted to other mobile phones via Bluetooth wirelessly. When the user clicks the virus file, the virus is activated immediately.

 

2. Mobile phone viruses targeting mobile communication providers such as Mosquito Trojan

 

  Tips:

The virus is hidden in the cracked version of the mobile game "Mit Mosquito".

Although the virus will not steal or destroy user information, it will automatically dial and send a large amount of text messages to the number in the UK, resulting in a sharp increase in the user's information fee.

 

3. Viruses targeting mobile phone bugs such as mobile hackers

 

  Tips:

 

Hacker (hack.mobile.smsdos) virus spreads through SMS with virus program, as long as the user views the virus-containing SMS, the phone will automatically shut down immediately.

 

4. The "Mobile.SMSDOS" virus

The virus that uses SMS or MMS to attack is a typical example of the "Mobile.SMSDOS" virus that appears against Siemens mobile phones.

 

  Tips:

"Mobile.SMSDOS" virus can be transmitted by SMS or MMS, causing the internal program of the mobile phone to be wrong, which causes the mobile phone to not work properly.

In terms of the impact of current mobile phone viruses, it can be roughly divided into five categories: Joke, distress, physical destruction, money loss and confidentiality injuries.

The following will further discuss the various types of mobile phone viruses caused by the five categories. Different damage conditions and dangers.

 

Influences

Funny influence

This type of joke-type mobile phone virus does not generally cause physical or operational damage or impact on the mobile phone.

 

Mobile phone screen keeps flashing: for example, Lights virus.

 

The screen displays sensational words or scary icons: For example, the Ghost virus will display the "Everyone hates you" message.

 

Continuous beeps: For example, FalseAlarm virus.

 

Small flying planes appear on the screen: for example, Sprite virus.

 

A formatted disk message appears: For example, Fake virus does not actually cause any harm.

 

Pretend to download malicious programs: such as Alone virus.

 

Automatically start phone recording.

 

Disturbing destruction

 

The so-called troublesome mobile phone virus, although it will not destroy or suspend the physical or operational of the mobile phone, but it causes troubles in the use of the mobile phone, and even further prevents the update of the mobile phone software.

 

Sending and receiving spam text messages

Many mobile phone viruses use a lot of spam text messages to attack mobile phones.

Although spam text messages are not necessarily dangerous, they consume the precious time of recipients and add many troubles, not to mention that spam text messages are likely to hide viruses.

Once poisoned, users may also become zombies or accomplices who send spam messages without knowing it. For example, the samurai worm will send a message containing the virus according to the recorded message in the victim's mobile phone.

 

Cell Phones virus

Block any updates and downloads of mobile phones

For example, the Fontal Trojan, by destroying the program manager in the mobile phone system, prevents users from downloading new applications or other updates, and also prevents the mobile phone from deleting viruses.

 

Application does not work: For example, the skull Trojan will cause the file system or application of the mobile phone to not work, the user must restart.

 

Consumption of mobile phone power: for example, the piranha (Cabir) worm, through continuous search for other Bluetooth devices, and then exhausted mobile phone power.

 

Block Bluetooth communication: block the communication and connection between the mobile phone and any Bluetooth device, such as headphones, printers, or other Bluetooth mobile phones.

 

Interrupt the operation of the SMS service

The hacker launched a DDoS attack on the MMS server, which caused the SMS service to fail to operate normally. Symantec said that the very popular Blackberry mobile phone (Blackberry) has been attacked by the server, which has caused users to receive letters for up to 3 hours.

 

Physical or operational destruction

The physical or operational damage is a very serious result. Not only can users not continue to use the phone normally, but the most important thing is the destruction of important data.

 

Mobile phone crashes: For example, a hacker can launch an attack through a vulnerability in the mobile phone operating system, which can cause the operating system to shut down.

 

Automatic cell phone shutdown: Frequent switching on and off may cause damage to cell phone parts or life.

 

Loss of file information: including the loss of files such as phonebook, address book, MP3, games, photos, and picture bells. For example, Skull Head Trojan.

 

Paralyzed mobile phone anti-virus software: disguised as an update code of an anti-virus manufacturer, tricked users into downloading, and then paralyzed mobile phone anti-virus software.

 

The key function of mobile phone is lost

For example, SYMBOS_LOCKNUT Trojan.

 

Format internal memory

If the mobile phone has a built-in hard disk in the future, it may also face the risk of being formatted.

 

The hacker obtains the permission of the mobile phone system

The hacker can obtain partial or even full permissions of the system without the user's consent through the vulnerability of the mobile phone operating system. For example, the Brador backdoor program specializing in WinCE mobile phones, poisoned mobile phones will be remotely downloaded files by hackers, or even execute specific commands.

 

Burn out internal chip

It is rumored that once a Trojan is executed, it will cause the mobile phone to automatically shut down, or even burn out the internal chip. However, the information in this regard has not been confirmed and is still rumored.

 

Destroy the SIM card

The hacker launched the direct destruction of the SIM card through the vulnerability of the information access length of the early SIM card.

 

Money Loss

After various malicious attacks on PCs began to be linked to monetary benefits, this trend has inevitably developed on mobile phones. Such attacks range from increasing telephone charges to causing serious losses in online transactions.

 

Increase SMS spending: Because it becomes a "text spammer" controlled by hackers, the cost of text messaging naturally rises. For example, flood hacking tools.

 

Automatic dialing

For example, in Japanese i-mode, after the user received a malicious MMS, he continuously dialed the Japanese emergency number 110, which not only caused a waste of social resources, but also increased the user's telephone cost.

 

Was transferred to an international call: through Pharming, the hacker directly tampered with the user's mobile phone address book, so that the user was inexplicably transferred to another country when making the call, which caused the user's phone bill to rise.

 

Tampering with order information

Symantec said that nowadays, users who buy stocks through mobile phones are increasingly buying users. So in the future there may be hackers based on certain interests, such as speculation on specific stocks, and then tampering with the user's Order information, which in turn causes users to buy the wrong order or cause investment losses.

 

Confidentiality injury

The ultimate goal of any security protection is to ensure the security of confidential information, so the leakage of confidential information caused by mobile phone viruses can be said to be the most destructive behavior.

 

Stealing calendar or address book

Disguise software or games with backdoor programs as legal software or free software, and trick users into downloading, thereby stealing important data such as calendar or address book.

For example, in the hotel industry, the phone book of the Paris Hilton was stolen under some unknown conditions.

Later, according to expert research, it may be caused by the intrusion of hackers through the Bluetooth transmission channel.

 

Stealing personal privacy photos

In the future, it will not be ruled out that hackers will steal the privacy photos of celebrities through Bluetooth, WiFi or other methods, so as to intimidate or defraud.

 

Online transaction data leakage

Today, online banking or online transactions can also be carried out through mobile phones, so related information may also be exposed to the risk of mobile phone viruses or hacker attacks.

 

Post a Comment

I am thankful to you for this article because you are providing such good information as I see, thanks for this. keep sharing this.Spy earpiece

[blogger]

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget