Feeds

Warez site riddled with mobile malware

Crack, crack your smartphone's dead

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

A search of sites hosting cracked versions of apps for Symbian phones has unearthed 52 "previously unidentified Trojans", according to New Zealand-based mobile anti-virus specialist Simworks. Other anti-virus experts reckon that the infected files found by Simworks are more properly described as repackaged versions of previously identified malware.

The malicious files found by Simworks pose as popular applications and games such Bitstorm, BugMe! Cosmic Fighter, 3D Motoracer, and Splash ID. In addition to the installation files for the app itself, the files include various versions of previously known malware such as Cabir and Locknut. There are no reports of any of the “new Trojans” in the wild.

Simworks chief exec Aaron Davidson said, "It would be easy for a malware author to create one Trojan and give it 52 different names. However this is not the case here where we have 52 separately cracked and infected applications. Somebody has gone to an awful lot of time and effort to turn these out."

Mikko Hyppönen, director of anti-virus research at F-Secure, said it was likely that a virus author used an automated script to install malicious code in a collection of cracked applications. "We've looked hard on P2P networks and warez sites but have been unable to find the malicious code samples Simworks describes. These files are not easy to come by so the risk posed is quite low," he said.

Hyppönen said Simworks' warning covers 52 new repackaged apps which when run will install Trojans rather than previously unseen Trojans.

Simworks said the malicious files it found target smart phones running Symbian OS Version 6.1 or above such as the Nokia 3650, 6600 and 6630. None affect UIQ-based smartphones such as the SonyEriccson P900 or the Motorola A925. Simworks advises users not to download applications from unknown sources or warez sites. ®

Related stories

Mobile botnet threat downplayed
Mobile Trojan kills smart phones
How shall I own your mobile phone today?

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.