Latest Post

Mobile or Cell Phone Virus

Mobile phone virus is an infectious and destructive mobile phone program. It can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, bluetooth, etc., which will cause the user's mobile phone to freeze, shut down, delete personal information, send out spam to leak personal information, automatically call the phone, send malicious deduction of SMS (MMS), etc. will even damage the SIM card, chip and other hardware, resulting in the user's inability to use the mobile phone normally.

 

Cell phone virus Introduction

With the continuous popularity of smart phones, cell phone viruses have become the next target of virus development. Mobile phone virus is a destructive program, and is as contagious and destructive as computer viruses (programs).

Mobile phone viruses can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, Bluetooth, etc. Mobile phone viruses may cause the user's mobile phone to freeze, shut down, delete data, send out spam, make phone calls, etc., and even damage the hardware such as SIM cards and chips.

Nowadays, mobile phone viruses are inspired and influenced by PC viruses, and there are so-called hybrid attacks.

According to a survey report by McAfee, an IT security vendor, the number of mobile phone users who have been attacked by mobile phone viruses worldwide in 2006 has reached about 83%, a five-fold increase from 2003.

 

History of Cell Phone Virus

The earliest mobile phone virus in history appeared in 2000. At that time, the mobile phone company Movistar received a large number of harassing text messages called "Timofonica" sent by the computer. The virus was sent to users in the system through the mobile system of the Spanish telecommunications company "Telefonica".

Spam and other spam messages. In fact, the virus can only be counted as a SMS bomb at most.

The real mobile phone virus did not appear until June 2004, that is, the "Cabir" worm virus, this virus is copied through the Nokia s60 series mobile phones. Then constantly looking for mobile phones with Bluetooth installed. After that, cell phone viruses began to spread.

 

Working principle of Cell Phone Virus

Mobile phone software, embedded operating system (the operating system solidified in the chip, generally written in JAVA, C ++ and other languages), is equivalent to a small intelligent processor, so it will be subject to virus attacks. Moreover, text messages are not just simple text, including information such as ringtones and pictures of mobile phones, which need to be interpreted by the operating system in the mobile phone and then displayed to mobile phone users. Mobile phone viruses invade mobile phones through software system vulnerabilities.

 

Mobile phone virus must be transmitted and run, the necessary condition is that the mobile service provider must provide data transmission function, and the mobile phone needs to support Java and other advanced program writing function. Now many mobile phones with Internet access and download functions may be invaded by mobile phone viruses.

 

Propagation mode of Cell Phone Viruses

Propagation using Bluetooth: "Kapol" virus will modify the system settings of the smart phone, automatically search for the existence of vulnerabilities in neighboring mobile phones through Bluetooth, and attack.

 

Infection of mobile phone executable files on PC: After "Velasco" virus infects the computer, it will search for SIS executable files on the computer's hard disk and infect.

 

Use MMS multimedia information service method to spread: a new mobile phone virus transmission method appeared, spread through MMS multimedia information service method.

 

BUG attack using mobile phones: This kind of virus generally runs on "EPOC" of portable information equipment, such as "EPOC-ALARM", "EPOC-BANDINFO.A", "EPOC-FAKE.A", "EPOC-GHOST. A "," EPOC-ALIGHT.A ", etc.

 

Harm from Cell Phone Viruses

 

1. Cause user information to be stolen

Today, more and more mobile phone users store personal information on their phones, such as personal address book, personal information, schedule, various network accounts, bank accounts and passwords. These important data will inevitably attract some people with ulterior motives. They will write various viruses to invade the mobile phone and steal important information of users.

 

2. Dissemination of illegal information

Now, MMS is popular, and it has facilitated the beginning of the spread of all kinds of pornography, illegal pictures, voices, and movies.

 

3. Destroy mobile phone hardware and software

The most common hazards of mobile phone viruses are the destruction of mobile phone software and hardware, causing the mobile phone to not work properly.

 

4. Cause the communication network to be paralyzed

If the virus infects the mobile phone, the mobile phone is forced to send spam to the communication network where it is located, which will inevitably lead to the communication network information being blocked. These spam messages will eventually paralyze local mobile communication networks.

 

Examples of Cell Phone viruses

Fishing King, Mobile Skeleton, SMS Pirate, Straight Flush Thief, Thousand-Billionaire, QQ Stealing Number, Zombie Phone Virus (Mobile Phone Zombie Virus), CCa.tx.A, MDa.mj.A (3D Dazzling Rubik's Cube, iCalendar, etc.).

 

Kinds of Cell Phone Viruses

Mobile phone viruses can be divided into four categories according to the virus form:

 

1. Viruses transmitted via "wireless transmission" of Bluetooth devices such as Cabir and Lasco.A

 

  Tips:

Cabir

Cabir is a network worm that can infect mobile phones running the "Symbian" operating system. After the virus is found in the mobile phone, the Bluetooth wireless function will be used to scan other neighboring mobile phones with vulnerabilities.

When the vulnerable mobile phone is found, the virus will copy itself and send it to the mobile phone.

 

Lasco

A virus, like the worm virus, is transmitted to other mobile phones via Bluetooth wirelessly. When the user clicks the virus file, the virus is activated immediately.

 

2. Mobile phone viruses targeting mobile communication providers such as Mosquito Trojan

 

  Tips:

The virus is hidden in the cracked version of the mobile game "Mit Mosquito".

Although the virus will not steal or destroy user information, it will automatically dial and send a large amount of text messages to the number in the UK, resulting in a sharp increase in the user's information fee.

 

3. Viruses targeting mobile phone bugs such as mobile hackers

 

  Tips:

 

Hacker (hack.mobile.smsdos) virus spreads through SMS with virus program, as long as the user views the virus-containing SMS, the phone will automatically shut down immediately.

 

4. The "Mobile.SMSDOS" virus

The virus that uses SMS or MMS to attack is a typical example of the "Mobile.SMSDOS" virus that appears against Siemens mobile phones.

 

  Tips:

"Mobile.SMSDOS" virus can be transmitted by SMS or MMS, causing the internal program of the mobile phone to be wrong, which causes the mobile phone to not work properly.

In terms of the impact of current mobile phone viruses, it can be roughly divided into five categories: Joke, distress, physical destruction, money loss and confidentiality injuries.

The following will further discuss the various types of mobile phone viruses caused by the five categories. Different damage conditions and dangers.

 

Influences

Funny influence

This type of joke-type mobile phone virus does not generally cause physical or operational damage or impact on the mobile phone.

 

Mobile phone screen keeps flashing: for example, Lights virus.

 

The screen displays sensational words or scary icons: For example, the Ghost virus will display the "Everyone hates you" message.

 

Continuous beeps: For example, FalseAlarm virus.

 

Small flying planes appear on the screen: for example, Sprite virus.

 

A formatted disk message appears: For example, Fake virus does not actually cause any harm.

 

Pretend to download malicious programs: such as Alone virus.

 

Automatically start phone recording.

 

Disturbing destruction

 

The so-called troublesome mobile phone virus, although it will not destroy or suspend the physical or operational of the mobile phone, but it causes troubles in the use of the mobile phone, and even further prevents the update of the mobile phone software.

 

Sending and receiving spam text messages

Many mobile phone viruses use a lot of spam text messages to attack mobile phones.

Although spam text messages are not necessarily dangerous, they consume the precious time of recipients and add many troubles, not to mention that spam text messages are likely to hide viruses.

Once poisoned, users may also become zombies or accomplices who send spam messages without knowing it. For example, the samurai worm will send a message containing the virus according to the recorded message in the victim's mobile phone.

 

Cell Phones virus

Block any updates and downloads of mobile phones

For example, the Fontal Trojan, by destroying the program manager in the mobile phone system, prevents users from downloading new applications or other updates, and also prevents the mobile phone from deleting viruses.

 

Application does not work: For example, the skull Trojan will cause the file system or application of the mobile phone to not work, the user must restart.

 

Consumption of mobile phone power: for example, the piranha (Cabir) worm, through continuous search for other Bluetooth devices, and then exhausted mobile phone power.

 

Block Bluetooth communication: block the communication and connection between the mobile phone and any Bluetooth device, such as headphones, printers, or other Bluetooth mobile phones.

 

Interrupt the operation of the SMS service

The hacker launched a DDoS attack on the MMS server, which caused the SMS service to fail to operate normally. Symantec said that the very popular Blackberry mobile phone (Blackberry) has been attacked by the server, which has caused users to receive letters for up to 3 hours.

 

Physical or operational destruction

The physical or operational damage is a very serious result. Not only can users not continue to use the phone normally, but the most important thing is the destruction of important data.

 

Mobile phone crashes: For example, a hacker can launch an attack through a vulnerability in the mobile phone operating system, which can cause the operating system to shut down.

 

Automatic cell phone shutdown: Frequent switching on and off may cause damage to cell phone parts or life.

 

Loss of file information: including the loss of files such as phonebook, address book, MP3, games, photos, and picture bells. For example, Skull Head Trojan.

 

Paralyzed mobile phone anti-virus software: disguised as an update code of an anti-virus manufacturer, tricked users into downloading, and then paralyzed mobile phone anti-virus software.

 

The key function of mobile phone is lost

For example, SYMBOS_LOCKNUT Trojan.

 

Format internal memory

If the mobile phone has a built-in hard disk in the future, it may also face the risk of being formatted.

 

The hacker obtains the permission of the mobile phone system

The hacker can obtain partial or even full permissions of the system without the user's consent through the vulnerability of the mobile phone operating system. For example, the Brador backdoor program specializing in WinCE mobile phones, poisoned mobile phones will be remotely downloaded files by hackers, or even execute specific commands.

 

Burn out internal chip

It is rumored that once a Trojan is executed, it will cause the mobile phone to automatically shut down, or even burn out the internal chip. However, the information in this regard has not been confirmed and is still rumored.

 

Destroy the SIM card

The hacker launched the direct destruction of the SIM card through the vulnerability of the information access length of the early SIM card.

 

Money Loss

After various malicious attacks on PCs began to be linked to monetary benefits, this trend has inevitably developed on mobile phones. Such attacks range from increasing telephone charges to causing serious losses in online transactions.

 

Increase SMS spending: Because it becomes a "text spammer" controlled by hackers, the cost of text messaging naturally rises. For example, flood hacking tools.

 

Automatic dialing

For example, in Japanese i-mode, after the user received a malicious MMS, he continuously dialed the Japanese emergency number 110, which not only caused a waste of social resources, but also increased the user's telephone cost.

 

Was transferred to an international call: through Pharming, the hacker directly tampered with the user's mobile phone address book, so that the user was inexplicably transferred to another country when making the call, which caused the user's phone bill to rise.

 

Tampering with order information

Symantec said that nowadays, users who buy stocks through mobile phones are increasingly buying users. So in the future there may be hackers based on certain interests, such as speculation on specific stocks, and then tampering with the user's Order information, which in turn causes users to buy the wrong order or cause investment losses.

 

Confidentiality injury

The ultimate goal of any security protection is to ensure the security of confidential information, so the leakage of confidential information caused by mobile phone viruses can be said to be the most destructive behavior.

 

Stealing calendar or address book

Disguise software or games with backdoor programs as legal software or free software, and trick users into downloading, thereby stealing important data such as calendar or address book.

For example, in the hotel industry, the phone book of the Paris Hilton was stolen under some unknown conditions.

Later, according to expert research, it may be caused by the intrusion of hackers through the Bluetooth transmission channel.

 

Stealing personal privacy photos

In the future, it will not be ruled out that hackers will steal the privacy photos of celebrities through Bluetooth, WiFi or other methods, so as to intimidate or defraud.

 

Online transaction data leakage

Today, online banking or online transactions can also be carried out through mobile phones, so related information may also be exposed to the risk of mobile phone viruses or hacker attacks.

 



> SHARE this article >>

How many of the several major symptoms of viruses in mobile phones you know?

Smartphones have brought a lot of convenience to our lives, and we can accomplish many things through various apps and gadgets in our phones. However, we all know that everything has two sides, and there are advantages and disadvantages. With the increase of applications, applications that threaten the security of mobile phones will also increase, and personal privacy such as our cash accounts will be stolen if you are not careful. Therefore, today I have compiled a few characteristics of viruses that can appear in mobile phones, you can find out.

 

Inexplicable deduction

I don’t know if you have paid attention to the deduction of your mobile phone. When the phone is inexplicably deducted, the cost within a few days is several times the normal cost. It may be that the virus is playing ghosts.

There are two possibilities, one is malicious deduction virus, you accidentally click on a link to automatically deduct the fee, and another possibility is that the virus runs in the background, consuming a lot of traffic, resulting in increased costs.

 

The mobile phone consumes power quickly and heats up

In the process of using our smart phones, there are situations such as fast power consumption and fever, which depends on the situation. If the phone consumes power and heat quickly when installing APP, synchronizing data or playing games, this is normal, and this is our autonomous behavior.

 

Mobile phone Wangtian Virus

But if our mobile phone is in our pocket, or if we are not going to use it, it will inexplicably consume power and heat, and we must pay special attention. 

It is very likely that our mobile phone has been infected with a Trojan horse virus. The virus is stealing our personal privacy and uploading it independently, which will cause the mobile phone to consume electricity and heat quickly.

 

Frequent advertising pop-ups

When we use mobile phones, advertising pop-ups may appear only when entering the corresponding shopping page. Generally, when using other types of software, the mobile phone pages are very clean.

However, no matter what operation is performed on the software infected with the mobile phone virus, the mobile phone will continuously pop up advertisements.

Even if the background push of the mobile phone software is turned off, a large number of advertisements cannot be avoided.

 

Increased battery consumption

With the development of mobile phones, the battery storage capacity of mobile phones is longer than before. 

But if you notice that the speed of battery power consumption of the mobile phone suddenly increases abnormally, then you should start to pay attention, because at this time your mobile phone may already be a virus program running in the background.

Of course, most viruses are very covert and don’t easily reveal their existence.

They usually only run in the background, which may be the reason for your phone’s sudden and rapid power consumption. Of course, it does not rule out the existence of hardware and battery aging factors, but it is better to be cautious if you have problems.

 

Automatic phone call / text

May be you have encountered such a situation, the phone automatically calls or texts. Some people may think that this happens when the phone is accidentally touched when it is in your pocket.

In fact, this is only one aspect. If there are many such phenomena, then it is possible that the virus is doing it.

 

The above is the phenomenon that several types of mobile phone poisoning will occur, do you remember?

Network security is an issue that every one of us must pay attention to.

The network brings us convenience and the dangers that will accompany it. Regarding network security, if you still want to say something, you are welcome to add a message in the comment area below, thank you.




> SHARE this article >>

United Nations Department of Disarmament Affairs (DDA)

aka UN Department for Disarmament Affairs-DDA


What is the Date of establishment of United Nations Department of Disarmament Affairs (DDA)?

The earliest was the Disarmament Center of the United Nations Secretariat.

In 1983, it was renamed the United Nations Department of Disarmament Affairs. In 1993, it was renamed the United Nations Disarmament Affairs Division.

 

What are the main function of United Nations Department of Disarmament Affairs What are the DDA)?

The UN’s functional agency in charge of disarmament:

  • Provides services to the UN General Assembly and its First Committee, Disarmament Commission and the Conference on Disarmament
  • Prepares publications on disarmament issues
  • Tracks and evaluates the development of the international disarmament situation
  • Manages the Disarmament Research Fund, Providing training and consulting services
  • Providing guidance and coordination for global disarmament advocacy activities
  • and managing regional disarmament centers

 

USN-DDA United Nations Department of Disarmament Affairs (DDA)

Principal of United Nations Department of Disarmament Affairs (DDA)

Nobuyasu Abe (Japanese), who succeeded Dhanapla (Sri Lankan) as the deputy secretary-general of the United Nations for disarmament affairs in July 2003.

 

Where is the Headquarters of United Nations Department of Disarmament Affairs (DDA)

In New York, USA. Website: http: // disarmament. un. org / dda. htm

 

What are the Publications of United Nations Department of Disarmament Affairs (DDA)?

"United Nations Disarmament Yearbook", "Disarmament, United Nations Periodic Review", "Disarmament Newsletter" and monographs.

 

May refer to Related topics

· International organizations, intergovernmental multilateral mechanisms and international conferences




> SHARE this article >>

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget