Feeds

iPhone worm hacker gets death threats, job offers

Mixed bug bag for chastened VXer

Intelligent flash storage arrays

The creator of the rickrolling iPhone worm has spoken of possible job offers and death threats since the release of the Jesus Phone malware last weekend.

Ashley Towns, 21, from Wollongong, New South Wales, Australia, told local media he received both threats and offers of possible work a day after he was identified as the creator of what's been described as the first strain of iPhone malware. The malicious code created by Towns changed the wallpaper of jailbroken iPhone devices it infected to a picture of cheesy '80s pop star Rick Astley.

Jailbroken phones have been modified so that they are capable of running non-Apple approved applications. Only users on the Optus network in Australia with jailbroken iPhones and SSH installed were hit by the so-called ikee worm created by Towns. Even so, scores or perhaps hundreds were affected.

Towns describes this as an "experiment" that got out of hand: "I didn't really think about legal consequences at the time. I honestly never expected it to go this far."

For the recently graduated network administration student explaining his actions to his friends and parents has been the least of his problems over the last week. "A lot of random people have been making threats and someone even figured out my mobile number and published it online," Towns told a local NSW newspaper, adding the on the plus side an iPhone application developer has offered him a job interview.

Graham Cluley, the senior security consultant at Sophos, was the first to point towards Towns as the likely creator of the worm, based on comment lines in the viral code and an internet search, and he described the mobile worm written by Towns as riddled with bugs. Even leaving aside the ethical problems of creating and distributing malware, Towns was a poor mobile application developer.

"The worm was a buggy piece of code that leaked data by copying across the wallpaper from other peoples' phones during its infection routine," Cluley explained. "It also tried to scan a far wider range of addresses for other devices to infect than intended, judging by comments in the code."

"Judging by other comments, Towns even shafted his own iPhone during the development process," Cluley added.

Although Cluley condemned Towns actions, he said that Towns didn't deserve jail for his efforts. "Towns is not in the same league as financially motivated hackers who are responsible for the majority of the malware we see today," he said. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.