Feeds

Text me and I'll reply with a virus

More mobile malware madness

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Virus writers have created a third mobile phone virus capable of replicating via MMS messages. The Mabir worm, which targets Symbian Series 60 phones, is not spreading, but its ability to propagate via Multimedia Messaging Service messages (MMS) gives cause for concern.

Mabir is essentially a variant of the Cabir worm, which spreads only over Bluetooth, with added MMS functionality. An analysis of the worm by anti-virus firm F-Secure suggests that Mabir-A is based on the same source code as Cabir and is likely the product of the same coder.

Mabir-A spreads using Bluetooth using the same routine as early variants of Cabir. When Mabir-A activates it will search for the first Bluetooth phone it finds, and start sending copies of itself to that phone.

The MMS spreading function of Mabir-A uses a new social engineering technique. Instead of just reading all phone numbers from the local address book (as with an earlier mobile virus called A virus called Commwarrior-A), Mabir-A replies an infected MMS message in reply to any SMS or MMS messages sent to an infected phone.

MMS messages are text messages that include an image, audio or video. They are sent from one phone to another or via email. ®

Related stories

MMS virus discovered
Dampig Trojan menaces Symbian mobiles
How shall I own your mobile phone today?

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.