Mobile Phone and Infrastructure Vulnerabilities

The first mobile threat that appeared in the year 2004, that is Cabir.A has shown that mobile phone threat is a proof-of -concept application. However, most Symbian malwares are still quite primitive and not in the form of executable code. It is able to replicate itself via Bluetooth devices supporting Symbian Series 60 user interface platform. Cabir.A has been widespread over many countries such as Malaysia, United States, United Kingdom, Italy, Russia, Indonesia, Japan, Singapore, Australia and New Zealand. The current target for mobile phone attacks has a certain focus on the Symbian Series 60 user interface platform mainly because of its increasing market share. The vulnerabilities of the years 2005 and 2006 have included more than 120 types of variants and new virus attacks has been using Cabir variants as a basis to create more dangerous and damageable malware. At the beginning of 2005 the main types of mobile malware had matured and were used by virus writers over the next eighteen months, including the following: 1. Worms that spread via Smartphone protocols and services 2. Vandal Trojans that install themselves in the system by exploiting Symbian design faults 3. Trojans designed for financial gain There are only a few main types of behavior but in practice mobile malware comes in a multitude of forms.

Contents

1. Skulls.D vulnerability – Jan 2005
2. Cabir.M vulnerability – Jan 2005
3. Cabir.N vulnerability – Jan 2005
4. Cabir.O vulnerability – Jan 2005
5. Cabir.P vulnerability – Jan 2005
6. Cabir.Q vulnerability – Jan 2005
7. Cabir.R vulnerability – Jan 2005
8. Cabir.S vulnerability – Jan 2005
9. Cabir.T vulnerability – Jan 2005
10. Lasco.A vulnerability – Jan 2005
11. Cdropper.D vulnerability – Feb 2005
12. Cdropper.E vulnerability – Feb 2005
13. Locknut.A vulnerability – Feb 2005.
14. Commwarrior.A vulnerability – Mar 2005
15. Commwarrior.B vulnerability – Mar 2005
16. Dampig.A vulnerability – Mar 2005
17. Drever.A vulnerability – Mar 2005
18. Drever.B vulnerability – Mar 2005
19. Drever.C vulnerability – Mar 2005
20. Skulls.E vulnerability – Mar 2005.
21. Skulls.F vulnerability – Mar 2005
22. Skulls.G vulnerability – Mar 2005
23. Skulls.H vulnerability – Mar 2005
24. Mabir.A vulnerability – Apr 2005
25. Fontal.A vulnerability – Apr 2005
26. Hobbes.A vulnerability – Apr 2005
27. Locknut.C vulnerability – May 2005
28. Cabir.Y vulnerability – May 2005
29. Appdisabler.A vulnerability – May 2005
30. Skulls.I vulnerability – May 2005
31. Skulls.K vulnerability – May 2005
32. Appdisabler.B vulnerability – May 2005
33. Cisco Access Points TCP vulnerability – May 2005
34. Skulls.L vulnerability – Jun 2005
35. Cabir.V vulnerability – Jun 2005
36. Skulls.J vulnerability – Jun 2005
37. Skulls.M vulnerability – Jun 2005
38. Troj/Fontal-B vulnerability – Jun 2005
39. Doomboot.A vulnerability – Jul 2005
40. Doomboot.B vulnerability – Jul 2005
41. Doomboot.C vulnerability – Jul 2005
42. Cabir.U vulnerability – Jul 2005
43. Blankfont.A vulnerability – Aug 2005
44. Doomboot.D vulnerability – Sep 2005
45. Doomboot.E vulnerability – Sep 2005
46. Doomboot.F vulnerability – Sep 2005
47. Doomboot.G vulnerability – Sep 2005
48. Cardtrp.A vulnerability – Sep 2005
49. Cardtrp.B vulnerability – Sep 2005
50. Cardblock.A vulnerability – Oct 2005
51. Fontal.C vulnerability – Oct 2005
52. Skulls.N vulnerability – Oct 2005
53. Cardtrp.C vulnerability – Oct 2005
54. Commwarrior.C vulnerability – Oct 2005
55. Doomboot.M vulnerability – Nov 2005
56. Doomboot.N vulnerability – Nov 2005
57. Cardtrp.F vulnerability – Nov 2005.
58. Cardtrp.G vulnerability – Nov 2005.
59. Pbstealer.A vulnerability – Nov 2005.
60. Cardtrp.H vulnerability – Nov 2005.
61. Doomboot.P vulnerability – Nov 2005.
62. Drever.D vulnerability – Nov 2005.
63. Ruhag.C vulnerability – Nov 2005.
64. Fontal.E vulnerability – Nov 2005.
65. Fontal.D vulnerability – Dec 2005.
66. Hidmenu.A vulnerability – Dec 2005.
67. Doomboot.Q vulnerability – Dec 2005.
68. Cardtrp.I vulnerability – Dec 2005.
69. Cardtrp.J vulnerability – Dec 2005.
70. Cardtrp.K vulnerability – Dec 2005.
71. Cardtrp.L vulnerability – Dec 2005.
72. Pbstealer.B vulnerability – Dec 2005.
73. Skulls.O vulnerability – Dec 2005.
74. Skulls.P vulnerability – Dec 2005.
75. Cardtrp.M vulnerability – Dec 2005.
76. Cardtrp.N vulnerability – Dec 2005.
77. Skulls.Q vulnerability – Dec 2005
78. Cabir.W vulnerability – Dec 2005.
79. Cardtrp.O vulnerability – Dec 2005.
80. Dampig.B vulnerability – Dec 2005.
81. Doomboot.R vulnerability – Dec 2005.
82. Dampig.C vulnerability – Dec 2005.
83. Cardtrp.P vulnerability – Dec 2005
84. Pbstealer.C vulnerability – Jan 2006.
85. Pbstealer.D vulnerability – Jan 2006.
86. Bootton.E vulnerability – Jan 2006.
87. Sendtool.A vulnerability – Jan 2006.
88. Cardtrp.Q vulnerability – Jan 2006
89. Cardtrp.R vulnerability – Jan 2006
90. Cardtrp.S vulnerability – Jan 2006.
91. Cardtrp.T vulnerability – Feb 2006.
92. Cardtrp.U vulnerability – Feb 2006.
93. Cardtrp.V vulnerability – Feb 2006.
94. Cardtrp.W vulnerability – Feb 2006.
95. Cardtrp.X vulnerability – Feb 2006.
96. Cardtrp.Y vulnerability – Feb 2006.
97. Cardtrp.Z vulnerability – Feb 2006.
98. J2ME/RedBrowser.a vulnerability – Feb 2006.
99. Cardtrp.AA vulnerability – Mar 2006.
100. Cardtrp.AB vulnerability – Mar 2006.
101. Commwarrior.D vulnerability – Mar 2006.
102. Mabtal.A vulnerability – Mar 2006.
103. WORM_CXOVER.A vulnerability – Mar 2006.
104. Doomboot.S vulnerability – Mar 2006.
105. Commwarrior.E vulnerability – Mar 2006.
106. Cdropper.L vulnerability – Mar 2006.
107. Cardtrp.AC vulnerability – Apr 2006
108. Cdropper.N vulnerability – Apr 2006
109. Bootton.F vulnerability – May 2006.
110. Mabtal.B vulnerability – May 2006
111. Commwarrior.F vulnerability – May 2006.
112. Commdropper.A vulnerability – May 2006.
113. Commdropper.C vulnerability – May 2006.
114. Commdropper.B vulnerability – May 2006.
115. Commwarrior.G vulnerability – May 2006.
116. Commwarrior.H vulnerability – May 2006.
117. RommWar.A vulnerability – May 2006.
118. Cardtrp.AF vulnerability – May 2006.
119. Stealwar.A vulnerability – May 2006.
120. Cardtrp.AE vulnerability – May 2006.
121. Cardtrp.AD vulnerability – May 2006.
122. RommWar.B vulnerability – May 2006.
123. RommWar.C vulnerability – May 2006.
124. RommWar.D vulnerability – May 2006.
125. Doomboot.T vulnerability – May 2006.
126. Commwarrior.I vulnerability – May 2006
127. Romride.A vulnerability – Jun 2006.
128. Romride.B vulnerability – Jun 2006.
129. Romride.C vulnerability – Jun 2006
130. Romride.D vulnerability – Jun 2006
131. Romride.E vulnerability Jun 2006.
132. Commwarrior.K vulnerability – Jun 2006.
133. Commwarrior.L vulnerability – Jun 2006.
134. Commdropper.D vulnerability – Jun 2006
135. Commdropper.E vulnerability – Jun 2006
136. Commwarrior.J vulnerability – Jun 2006
137. Romride.F vulnerability – Jun 2006
138. Romride.G vulnerability – Jun 2006
139. Romride.H vulnerability – Jun 2006
140. Commwarrior.M vulnerability – Jun 2006
141. Commwarrior.N vulnerability – Jun 2006
142. Cardtrp.AG vulnerability – Jun 2006
143. Dropper.A vulnerability – Jun 2006
144. Commdropper.G vulnerability – Jun 2006
145. Commdropper.F vulnerability – Jun 2006
146. Cdropper.F vulnerability – Jun 2006
147. Cdropper.G vulnerability – Jun 2006
148. Cdropper.I vulnerability – Jun 2006
149. Cdropper.K vulnerability – Jun 2006
150. Cdropper.J vulnerability – Jun 2006
151. Cdropper.O vulnerability – Jun 2006
152. Cdropper.P vulnerability – Jun 2006
153. Cdropper.R vulnerability – Jun 2006
154. Cdropper.S vulnerability – Jun 2006
155. Dampig.D vulnerability – Jun 2006
156. Doomboot.U vulnerability – Jun 2006
157. Cdropper.Q vulnerability Jul 2006
158. Doomboot.V vulnerability – Jul 2006
159. Doomboot.W vulnerability – Jul 2006
160. Ruhag.D vulnerability – Jul 2006
161. Cabir.X vulnerability – Jul 2006
162. Ruhag.E vulnerability – Jul 2006
163. Skulls.R vulnerability – Jul 2006
164. Commdropper.H vulnerability – Jul 2006
165. Doomboot.X vulnerability – Jul 2006
166. Mabir.B vulnerability – Jul 2006
167. Appdisabler.J vulnerability – Oct 2006
168. Appdisabler.K vulnerability – Oct 2006
169. Appdisabler.L vulnerability – Oct 2006
170. Keaf vulnerability – Oct 2006
171. Appdisabler.N vulnerability – Nov 2006
172. Appdisabler.O vulnerability – Nov 2006
173. Appdisabler.P vulnerability – Nov 2006
174. Appdisabler.Q vulnerability – Nov 2006
175. Cardtrp.AH vulnerability – Nov 2006
176. Flerprox.A vulnerability – Nov 2006
177. Romride.I vulnerability – Nov 2006
178. Romride.J vulnerability – Nov 2006
APPENDIX
1. Primary sources of information for this report
2. Operating systems commonly used in mobile phones
3. Mobile phones using Symbian OS

Author: Kannan, Prasanna,Krasniqi, Nesret

Source: University of Boras

Download URL 2: Visit Now

Leave a Comment