Feeds

'Sexy View' SMS malware targets Symbian devices

Signed, Sealed, Delivered (You're pwned)

Choosing a cloud hosting partner with confidence

Bad sorts have created a malware targeted at Symbian mobile phones that comes signed with an apparently valid Symbian Certificate.

Because it is signed the application can potentially gain privileged access, net security firm F-secure warns. The malware is also unusual because it is targeted at S60 3rd Edition phones, instead of the more common target of 2nd edition phones.

The Yxe-A Trojan originates in China and is packaged up with names such as "Sexy View" and "Play Boy", providing an indication that social engineering trickery plays a part in pushing the code. F-Secure describes the malware as a Trojan but other vendors describe it as a worm, in recognition of the discovery of what might be described as auto-spreading capabilities.

Security researchers at Fortinet report that the malware (which it calls the Yxes-A worm) harvests phone numbers from an infected device's file system, and repeatedly attempts to send SMS messages to these mobile numbers. These SMS messages direct surfers to a maliciously constructed website. When users of vulnerable devices "click" on the address in received messages, an attempt to download a copy of the malware will occur.

Fortinet adds that the malware gains information on the infected victim (such as serial number of the infected phone, subscription number etc) and posts this data to a remote server likely controlled by cyber criminals. It's unclear how many users have fallen victim to the attack or its ultimate motives.

Analysis of the malicious code remains ongoing. ®

Intelligent flash storage arrays

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.