Feeds

Dampig Trojan menaces Symbian mobiles

Low risk, big mess

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Virus writers have created a new Trojan capable of infecting Symbian Series 60 smartphones. Dampig-A, discovered March 4, attempts to trick users into downloading it by posing as the cracked version of the FSCaller application, developed by SymbianWare of Germany.

The Trojan (a malicious SIS file dropper) disables some built-in applications and third party file managers and attempts to install variants of the Cabir worm onto infected handsets. "None of the Cabir variants installed on the phone will start automatically, but some of the applications that are replaced with Cabir executables, such as Messaging application, will be most likely called and thus executed by the user," notes Finnish anti-virus firm F-Secure.

The Dampig Trojan is the latest in a series of malware threats to affect users of Symbian Series 60 smartphones in recent months. F-Secure says the Trojan is trickier to remove than earlier forms of mobile malware. Dampig corrupts the system uninstallation information so it cannot be removed without disinfecting the phone with anti-virus.

Like all mobile malware threats to date, Dampig is rare and largely a risk confined to people frequenting 'warez' sites. To get infected with the Cabir package it carries, which spreads using the Bluetooth short-range radio technology, users would have to give explicit consent. That means that mobile viruses, though still a threat, are far harder to catch than viruses such as the Bofra worm which exploit Windows security holes to spread. ®

Related stories

Symbian worm source code slips out
Double trouble from Symbian virus
Mobile virus epidemics: don't panic

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.