How to survive mobile phone attacks

While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile phones. Hypponen, director of antivirus research for Helsinki-based F-Secure Corp., has spent the last two years warning IT professionals to prepare for eventual attacks where phone infections could be passed to company networks. In this Q&A, Hypponen discusses the current threat landscape and what IT professionals can do to protect their infrastructure.

Have threats against mobile phones escalated, or is the general picture about what it was two years ago?
Threats have escalated since then. The number of known mobile viruses and Trojans keeps growing. However, the likelihood of being hit by mobile malware is still much, much lower than the likelihood of getting hit by PC malware. Most of the real-world problems with mobile phones are happening in Europe and Southeast Asia. Have the malware writers done any real damage yet, or is most of this still in the proof-of-concept stage?
None of the malware that we've seen so far uses vulnerabilities or exploits. Instead, they are relying on the users to install and run the malware on the devices. Today's mobile malware seems to be written by hobbyists who have limited skills and resources. From what you've been able to tell, what is the most common type of malware showing up in mobile devices?
Much of the malware that we know of are Trojans. Despite the number of different Trojans, however, mobile worms like Cabir and Commwarrior are the most widely spread and are causing limited infections in many parts of the world. This is because these worms have the means to spread themselves over the Bluetooth and MMS. Which phones appear most susceptible at this point?
I could see mobile phone botnets being used to send email spam or text messaging spam to other phones.
Mikko Hypponen,
director of antivirus researchF-Secure Corp.
Before the first mobile phone viruses were found, we were expecting the problems to start appearing from the Windows mobile side. That didn't happen. Most of the malware today targets Symbian OS-based devices, especially phones running Symbian Series 60 Second edition. Such phones are manufactured by several different vendors. We've heard a lot this year about the growing botnet threat to PCs. How far are we from seeing bot infestations on mobile phones?
There are currently no signs of botnets using mobile phones. This might be a growing threat in the future, because mobile phone processing power and mobile network connection speeds are growing. I could see mobile phone botnets being used to send email spam or text messaging spam to other phones. Talk about how an infection can be transferred from a phone to PCs and larger company networks.
Mobile device security:
Study: Some firms balk at mobile security

Security School: Essential practices for securing mobile devices

Webcast: Top 5 Ways to Lock Down Your Mobile Devices

Tip: Policies for reducing mobile risk
As an example, there is malware called SymbOS.Cardtrap that installs Windows malware on the infected phone's memory card. It tries to fool users into investigating the phone problems with a PC and a memory card reader, making it possible for Windows malware to spread. It's hard to measure the larger implications of this kind of system interaction at this point. Mobile devices provide a wider variety of communication methods than traditional PCs, and this could mean new ways to spread malware. What are some best practices IT professionals should be following to protect their networks against phone infections?
Use common sense and install security software both to your PC as well as to your smart phones. Don't accept or install any software from untrusted sources. Don't swap memory cards between phones. Keep your Bluetooth in hidden mode to prevent unwanted interruptions. I'd like to emphasize that the solution is not to avoid smart phones. We have tons of Windows malware, too, and people still seem to be happily buying PCs. It also seems that IT shops still have some time to deal with this threat.
The situation on the mobile side is pretty good at the moment. If we play our cards right and prepare with the right kind of safeguards and continue the good co-operation between security companies, operators, manufacturers and operating system vendors, hopefully we'll stay ahead of things.

Dig deeper on Handheld and Mobile Device Security Best Practices

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close