Feeds

'First' iPhone Trojan rolls into town

More a prank than a threat

Intelligent flash storage arrays

Hackers have created Trojan horse malware targeted at Apple's much-hyped iPhone device.

The package - more of a prank than a threat - poses as an "important system" upgrade supposedly needed prior to upgrading to version 1.1.3 of Apple's firmware. The "iPhone firmware 1.1.3 prep" seems to lack malicious purpose. Problems kick in when users try to uninstall the package.

The bogus firmware reportedly affects components of other applications during the install process including Erica's Utilities (a collection of command-line utilities for the iPhone) and OpenSSH. If the user chooses to uninstall the rogue package, these others applications will also be removed leaving users of the much-hyped device with the chore of reinstalling these applications.

"This is technically the first Trojan horse seen for the iPhone, however it does appear to be more of a prank than an actual threat," Symantec researcher Orla Cox. "The impact of uninstalling the 'Trojan' would appear to be an unintended side effect".

Web sites hosting the malicious package were taken offline soon after the discovery of the low-risk nuisance over the weekend. Although little damage was done users ought to take the incident as a warning to be careful about what packages they install on their phones.®

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.