Technology

Next For Hackers: Your Smartphone

LAS VEGAS (AP) — Hackers are out to stymie your smartphone.

Next For Hackers: Your Smartphone

Security experts say attacks on smartphones are growing fast — and attackers are becoming smarter about developing new techniques. (AP File Photo)

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google’s popular Android operating system. The application not only logs details about incoming and outgoing phone calls, it also records those calls.

That came a month after researchers discovered a security hole in Apple Inc.’s iPhones, which prompted the German government to warn Apple about the urgency of the threat.

Security experts say attacks on smartphones are growing fast — and attackers are becoming smarter about developing new techniques.

“We’re in the experimental stage of mobile malware where the bad guys are starting to develop their business models,” said Kevin Mahaffey, co-founder of Lookout Inc., a San Francisco-based maker of mobile security software.

Wrong-doers have infected PCs with malicious software, or malware, for decades. Now, they are fast moving to smartphones as the devices become a vital part of everyday life.

Some 38 percent of American adults now own an iPhone, BlackBerry or other mobile phone that runs the Android, Windows or WebOS operating systems, according to data from Nielsen. That’s up from just 6 percent who owned a smartphone in 2007 when the iPhone was released and catalyzed the industry. The smartphone’s usefulness, allowing people to organize their digital lives with one device, is also its allure to criminals.

All at once, smartphones have become wallets, email lockboxes, photo albums and Rolodexes. And because owners are directly billed for services bought with smartphones, they open up new angles for financial attacks. The worst programs cause a phone to rack up unwanted service charges, record calls, intercept text messages and even dump emails, photos and other private content directly onto criminals’ servers.

Evidence of this hacker invasion is starting to emerge.

— Lookout says it now detects thousands of attempted infections each day on mobile phones running its security software. In January, there were just a few hundred detections a day. The number of detections is nearly doubling every few months. As many as 1 million people were hit by mobile malware in the first half of 2011.

— Google Inc. has removed about 100 malicious applications from its Android Market app store. One particularly harmful app was downloaded more than 260,000 times before it was removed. Android is the world’s most popular smartphone operating software with more than 135 million users worldwide.

— Symantec Corp., the world’s biggest security software maker, is also seeing a jump. Last year, the company identified just five examples of malware unique to Android. So far this year, it’s seen 19. Of course, that number pales compared with the hundreds of thousands of new strains targeting PCs every year, but experts say it’s only a matter of time before criminals catch up.

“Bad guys go where the money is,” said Charlie Miller, principal research consultant with the Accuvant Inc. security firm, and a prominent hacker of mobile devices. “As more and more people use phones and keep data on phones, and PCs aren’t as relevant, the bad guys are going to follow that. The bad guys are smart. They know when it makes sense to switch.”

When it comes to security, smartphones share a problem with PCs: Infections are typically the responsibility of the user to fix, if the problem is discovered at all.

The emergence in early July of a previously unknown security hole in Apple Inc.’s iPhones and iPads cast a spotlight on mobile security. Users downloaded a program that allowed them to run unauthorized programs on their devices. But the program could also be used to help criminals co-opt iPhones. Apple has since issued a fix.

It was the second time this year that the iPhone’s security was called into question. In April the company changed its handling of location data after a privacy outcry that landed an executive in front of Congress. Researchers had discovered that iPhones stored the data for a year or more in unencrypted form, making them vulnerable to hacking. Apple CEO Steve Jobs emerged from medical leave to personally address the issue.

The iPhone gets outsize attention because it basically invented the consumer smartphone industry when it was introduced in 2007. But Apple doesn’t license its software to other phone manufacturers. Google gives Android to phone makers for free. So, Android phones are growing faster. As a result, Google’s Android Market is a crucial pathway for hacking attacks. The app store is a lightly curated online bazaar for applications that, unlike Apple’s App Store, doesn’t require that developers submit their programs for pre-approval.

Lookout says it has seen more unique strains of Android malware in the past month than it did in all of last year. One strain seen earlier this year, called DroidDream, was downloaded more than 260,000 times before Google removed it, though additional variants keep appearing.

Lookout says about 100 apps have been removed from the Android Market so far, a figure Google didn’t dispute.

Malicious applications often masquerade as legitimate ones, such as games, calculators or pornographic photos and videos. They can appear in advertising links inside other applications. Their moneymaking schemes include new approaches that are impossible on PCs.

One recent malicious app secretly subscribed victims up to a service that sends quizzes via text message. The pay service was charged to the victims’ phone bills, which is presumably how the criminals got paid. They may have created the service or been hired by the creator to sign people up. Since malware can intercept text messages, it’s likely the victims never saw the messages — just the charges.

A different piece of malware logs a person’s incoming text messages and replies to them with spam and malicious links. Most mobile malware, however, keep their intentions hidden. Some apps set up a connection between the phone and a server under a criminal’s control, which is used to send instructions.

Google points out that Android security features are designed to limit the interaction between applications and a user’s data, and developers can be blocked. Users also are guilty of blithely click through warnings about what personal information an application will access.

Malicious programs for the iPhone have been rare. In large part, that’s because Apple requires that it examine each application before it goes online. Still, the recent security incidents underline the threat even to the most seemingly secure devices.

A pair of computer worms targeting the iPhone appeared in 2009. Both affected only iPhones that were modified, or “jailbroken,” to run unauthorized programs.

And Apple has dealt with legitimate applications that overreached and collected more personal data than they should have, which led to the Cupertino, Calif.-based company demanding changes.

“Apple takes security very seriously,” spokeswoman Natalie Kerris said in July. “We have a very thorough approval process and review every app. We also check the identities of every developer and if we ever find anything malicious, the developer will be removed from the iPhone Developer Program and their apps can be removed from the App Store.”

A criminal doesn’t even need to tailor his attacks to a mobile phone. Standard email-based “phishing” attacks — tricking people into visiting sites that look legitimate — work well on mobile users. In fact, mobile users can be more susceptible to phishing attacks than PC users.

The small screens make it hard to see the full Internet address of a site you’re visiting, and websites and mobile applications working in tandem train users to perform the risky behavior of entering passwords after following links, new research from the University of California at Berkeley has found.

The study found that the links within applications could be convincingly imitated, according to the authors, Adrienne Porter Felt, a Ph.D. student, and David Wagner, a computer science professor.

They found that “attackers can spoof legitimate applications with high accuracy, suggesting that the risk of phishing attacks on mobile platforms is greater than has previously been appreciated.”

A separate study released earlier this year by Trusteer, a Boston-based software and services firm focused on banking security, found that mobile users who visit phishing sites are three times more likely to submit their usernames and passwords than desktop PC users.

Mobile users are “always on” and respond to emails faster, in the first few hours before phishing sites are taken down, and email formats make it hard to tell who’s sending a message, Trusteer found.

Still, mobile users have an inherent advantage over PC users: Mobile software is being written with the benefit of decades of perspective on the flaws that have made PCs insecure. But smartphone demand is exploding, with market research firm IDC predicting that some 472 million smartphones will be shipped this year, compared with 362 million PCs. As a result, the design deterrents aren’t likely to be enough to keep crooks away from the trough.

“It’s going to be a problem,” Miller said. “Everywhere people have gone, bad guys have followed.”

Comments (27)

  • 308Hammer
    Posted on August 8, 2011 at 3:00am

    Let’s see, iOS is secure because apple reviews all apps. To try to paint android and iPhone in the same canvas is just friggin’ ignorant. I especially like the part where a Jail broken iPhone is more vulnerable – well wip wip yahoo. Of course it is captain obvious. The point should be though that out of the box Android is about as secure as windows…not very.

    The real threat are corps like Google and MS that allow all this crap to happen to begin with to their own customers no less and then turn around to sell virus defs or have a vested interest in that vein. Apple on the other hand controls the gates. Are they perfect? No, but they got a way better track record.

    Report Post »  
  • Captain Crunch
    Posted on August 7, 2011 at 10:34pm

    The average person doesn’t need all the latest and greatest technology. It’s the manufacturers and carriers who tell you this crap will make you happy as they charge you outrageous rates. It will rob you of happiness and simplicity in your life. Learn to live with minimal technology. It will turn you into mindless techno robots.

    Report Post »  
  • Captain Crunch
    Posted on August 7, 2011 at 10:17pm

    The likeness is unreal. Obamax the imposter.

    Report Post »  
  • SamIamTwo
    Posted on August 7, 2011 at 8:54pm

    Low tech rocks…besides I can’t afford the fancy gadgets. Just time wasters and a bigger window into trouble. JIMHO

    Report Post » SamIamTwo  
  • godhatesacoward
    Posted on August 7, 2011 at 7:23pm

    Thieves are thieves! They are always going to be one step ahead of the law. And yes, these thieves include the govt. . My advice to ALL smartphone owners/users, get a stupid phone. I’ve seen people have actual “meltdowns” because thier smartphone malfunctioned or could not get service. Get real people. Oh, how could we have possibly survived thousands years w/out this technology?

    Report Post » godhatesacoward  
  • Fight for America
    Posted on August 7, 2011 at 6:21pm

    Hackers don’t care about other people. They like to get their jollies doing this. If someone has a heart atteck, loses their assets, whatever, it doesn’t matter to hackers. I‘d vote for a death penalty for hackers and I’m not really pro death penalty. I am sick and tired of brats and vultures hurting innocent people.

    Report Post »  
  • tommyg524
    Posted on August 7, 2011 at 5:39pm

    Anyone missing the days of a 15.00 a month phone bill? Who really needs all this junk anyway. it is just something to sell. Sure the younguns think its the norm, but it is nothing like normal to be tied to an electronic device, let alone 3 or 4 of them. Give me back the NBC,CBS,ABC, landline maBell, typewriter and things sure made a lot more sense days…….I’ll gladly take em back….oh and throw in Truman too will you, a real man. Save your negative replies, I wont even open them.

    Report Post »  
  • JohnnyGalt
    Posted on August 7, 2011 at 4:27pm

    http://footofatlas.blogspot.com/

    Report Post »  
  • The-Monk
    Posted on August 7, 2011 at 3:52pm

    And now for the really scary part; I’ve been seeing this since mid July 2009. Network techs who work for companies that monitor or repair their clients servers are using Smart phones to remote into the servers instead of using their PC’s at work (which are usually behind a good firewall and can’t be hacked). So you have a company, the people who take care of your server are using Smartphones with lots of these apps mentioned in this article, installed on them, to remote into YOUR server or workstations. Now the hackers have access to your company database from a hacked Smart phone!
    It’s already happening but, do you think the computer/network company will call you up and admit that your server was hacked by one of their employees cell phones? Not a chance!

    Report Post » The-Monk  
  • isobamamadd
    Posted on August 7, 2011 at 3:40pm

    They can’t get in your pocket ,if they don’t have access. don’t use phones to do your banking and pay bills

    Report Post »  
    • streetrodder
      Posted on August 7, 2011 at 4:17pm

      Exactly, go on auto pay or write a check.

      Report Post »  
    • jb.kibs
      Posted on August 7, 2011 at 4:59pm

      always use a low limit credit card to do your weekly transactions and pay it off immediately.
      This way you can dispute any fraud with no loss to your actual dollars and build credit… (if that matters anymore)

      Report Post »  
  • Snowleopard {gallery of cat folks}
    Posted on August 7, 2011 at 2:57pm

    So now the bigger question I will put forth is this in the matter of who is actually responsible:

    Hackers who do this for kicks?
    Money and ID criminal rings?
    Foreign Intel Services?
    Terrorist bands for funds/intel?
    Our own Big Sister and Administration?

    Or All of the Above?

    Personally I would say all the above, especially with Big Sister Napoletano involved.

    Report Post » Snowleopard {gallery of cat folks}  
    • HD Veteran
      Posted on August 7, 2011 at 5:41pm

      It’s all of the above with emphasis on Our own Big Sister and Administration & Money and ID criminal rings.

      I seem to recall a recent IPhone scandal where the police were reading someones complete history and location from an “unknown” file not meant to “surrender” personal information.

      Huh. Probably accidental.

      Liberals: Sound out the big words, keep working at it, I’m proud of you.

      Report Post » HD Veteran  
    • Lonescrapper
      Posted on August 7, 2011 at 5:58pm

      The question is who CAN do the most harm to you. It’s not ABorC

      Report Post » Lonescrapper  
  • HD Veteran
    Posted on August 7, 2011 at 2:49pm

    Keep an eye out for Avast to soon have an app avaialble for phones.

    http://www.makeuseof.com/tag/avast-working-android-app-offer-extra-features-rooted-phones-news/

    Report Post » HD Veteran  
  • jb.kibs
    Posted on August 7, 2011 at 2:27pm

    duh.

    Report Post »  
  • right-wing-waco
    Posted on August 7, 2011 at 2:27pm

    So far my iPhone is safe. You must be careful what you do. If I had my way, hackers that destroy other peoples property would be executed. (My wife says I am extreme)

    Report Post »  
    • Gorp
      Posted on August 7, 2011 at 3:53pm

      You’re not extreme. I don‘t have a smart phone but believe that anyone who wants to ruin someone’s life should be made to pay for it to the extent they ruined others lives. If they only hit one person then the penalty is such. If they hit 100 the penalty is 100 times more severe. It’s only right.

      Report Post » Gorp  
    • jb.kibs
      Posted on August 7, 2011 at 4:54pm

      na, we should sit them down and tell them to not do it again. that ALWAYS works for children… ;P ROFL…

      Report Post »  
    • randy
      Posted on August 7, 2011 at 5:53pm

      you’re not extreme! I agree with you…..
      Get caught for identity theft? Lose your life sounds good to me.

      Report Post » randy  
    • Mil Mom
      Posted on August 7, 2011 at 9:57pm

      @randy
      Posted on August 7, 2011 at 5:53pm
      you’re not extreme! I agree with you…..
      Get caught for identity theft? Lose your life sounds good to me
      ****
      But not if you’re a child rapist or abortion Dr, right, we mustn’t aggravate the libs!
      Where were you guys when they were selecting Casey Anthony’s jury?

      Report Post » Mil Mom  
  • Marengo Ohio Patriot
    Posted on August 7, 2011 at 2:24pm

    Duh!

    Report Post »  

Sign In To Post Comments! Sign In