Users rely on digital signatures as assurance that software is safe and has come from a trusted source. The problem...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
I have with Symbian's process is that the majority of the submitted applications aren't inspected by humans. Yet once they've been accepted, they are often digitally signed by Symbian. Signed apps have the ability to access content that unsigned applications cannot, and users are going to assume that that's ok. Also, because Sexy Space is signed, there's only one prompt during installation: "Install Sexy Space? Yes or No." Unsigned apps require the user to select "Yes" three or four times before installation starts.
Taking advantage of its signed status, the malware performs various tasks, attempting to make a silent HTTP connection to a malicious server, sending back subscriber, phone and network information to the hacker's site. It also sends suggestive SMS messages to everyone in the phone's address book, directing them to a website which then automatically pushes the malware installation package onto their Symbian phones. To protect itself, it looks for and closes certain applications such as App.Manager and Task Spy, making it difficult for the user to attempt to manually end the threat.
Another shortcoming in Symbian's security is that although it revoked both the content certificate and the publisher certificate used to sign the malware, the default setting in most Symbian phones has to be changed to enable users to receive such revocation certificates. (I would certainly recommend that you turn on revocation checking using Application Manager's Settings to set the "Online" certificate check to "must be passed.") Also, an error on Symbian's servers meant that Sexy Space was still available for download for a while after it was discovered to be malware.
The Symbian platform is used in just under 50% of all smartphones, and thankfully this time the malware didn't infect that many users. However, this type of threat is certainly going to continue to increase. Operators and handset manufacturers have not really kept their quality assurance and testing procedures in step with the tremendous increase in the computing power and functionality of the average smartphone.
I'm not encouraged that Symbian has said that one of its aims is to automate the publication of apps as much as possible, mostly because human auditing introduces cost and time delays into the process. I certainly disagree that signing apps without thorough analysis is "still much better than the apps not being signed at all." What could future versions of this threat potentially do using these trusted privileges?
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Michael Cobb
Microsoft is banning weak passwords on many of its services with the Smart Password Lockout feature. Expert Michael Cobb explains how it works, and ...continue reading
A malicious app called Black Jack Free was able to bypass Google Play's app store security. Expert Michael Cobb explains the threat and how ...continue reading
SandJacking, a new iOS attack technique, uses an XCode certificate flaw to load malicious apps onto devices. Expert Michael Cobb explains how the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.