Feeds

Dampig Trojan menaces Symbian mobiles

Low risk, big mess

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Virus writers have created a new Trojan capable of infecting Symbian Series 60 smartphones. Dampig-A, discovered March 4, attempts to trick users into downloading it by posing as the cracked version of the FSCaller application, developed by SymbianWare of Germany.

The Trojan (a malicious SIS file dropper) disables some built-in applications and third party file managers and attempts to install variants of the Cabir worm onto infected handsets. "None of the Cabir variants installed on the phone will start automatically, but some of the applications that are replaced with Cabir executables, such as Messaging application, will be most likely called and thus executed by the user," notes Finnish anti-virus firm F-Secure.

The Dampig Trojan is the latest in a series of malware threats to affect users of Symbian Series 60 smartphones in recent months. F-Secure says the Trojan is trickier to remove than earlier forms of mobile malware. Dampig corrupts the system uninstallation information so it cannot be removed without disinfecting the phone with anti-virus.

Like all mobile malware threats to date, Dampig is rare and largely a risk confined to people frequenting 'warez' sites. To get infected with the Cabir package it carries, which spreads using the Bluetooth short-range radio technology, users would have to give explicit consent. That means that mobile viruses, though still a threat, are far harder to catch than viruses such as the Bofra worm which exploit Windows security holes to spread. ®

Related stories

Symbian worm source code slips out
Double trouble from Symbian virus
Mobile virus epidemics: don't panic

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.