BLACK HAT - Analyst: Money will fuel mobile spying programs

Spying programs for mobile phones are likely to grow in sophistication and stealth as the business around selling the tools grows.

Spying programs for mobile phones are likely to grow in sophistication and stealth as the business around selling the tools grows, according to a mobile analyst at the Black Hat conference on Friday.

Many of the spy programs on the market are powerful, but aren't very sophisticated code, said Jarno Niemela, a senior antivirus researchers for Finnish security vendor F-Secure, which makes security products for PCs and mobile phones.

But there is increasing evidence that money from selling the tools will create a stronger incentive for more accomplished programmers to get into the game, which could make the programs harder to detect, Niemela said.

Niemela said his prediction follows what has happened with the malware writers in the PC market. Many hackers are now in the business of selling easy-to-use tools to less technical hackers rather than hacking into PCs themselves.

One of the latest tools on the market is Mobile SpySuite, which Niemela believes is the first spy tool generator for mobiles. It sells for US$12,500 and would let a hacker custom-build a spy tool aimed at several models of Nokia phones, Niemela said.

The number of mobile spyware programs pales in comparison to the number of such programs available for PCs. However, mobile spying programs are harder to track, since security companies such as F-Secure don't see as many samples circulating on the Internet as they do of malicious software for PCs.

Anecdotal evidence has emerged that enterprises may be increasingly encountering mobile spyware on their fleets of phones. The clues have come from companies that are relatively cagey when talking about what they have seen.

"There have been certain cases of corporate customers asking very detailed questions about spy tools and not mentioning why they need the information," Niemela said.

Some of the more well-known spy programs are Neo-cal land FlexiSpy. Neo-call is capable of secretely forwarding SMS (Short Message Service) text messages to another phone, transmitting a list of phone numbers called, and logging keystrokes. FlexiSpy has a neat, Web-based interface that shows details of call times, numbers and SMSes, and it can even use a phone's GPS (Global Positioning System) receiver to pinpoint the victim's location.

Hackers usually need to have access to the phone itself to install the software. And OS manufacturers such as Symbian have enabled security features such as application signing, which is intended to prevent rogue programs from being installed on a phone.

Most rogue spying programs leave traces on the phone, and analysis tools can be used to check a phone's processes and file system to see if something is there that shouldn't be, Niemela said.

But there are ways that less technical users can get a hint they've been hacked. One simple clue is if a colleague of the victim knows something that they shouldn't, Niemela said.

Also, mobile spying programs have to transmit their data. If the spy program sends data over GPRS (General Packet Radio Service), the network operator will demand payment. "As long as it has to use a paid channel, it can not escape the operator's bill," Niemela said.

Another way is to replace the phone's SIM card with one that allows for real-time monitoring. SMSes can then be sent to the phone, which in many countries are free to receive. If the monitoring reveals outgoing data traffic after SMSes are received, the phone could be hacked. It's also possible to check if the GPRS connection icon lights up after a message is received, Niemela said.

Niemela offered some defenses against mobile spyware: Keep the OS up to date, as manufacturers are usually working to counter new devious software. The use of a mobile antivirus program is also prudent, he said. People should also use password protection to block access if someone gets a hold of the device.

Administrators can also regularly "flash" phones to wipe off malware, as well as ensuring that phones only install signed applications.

And when the phone is out of a person's hands, another option is to put the device in a tamper-proof container. But "for most people, this is way too James Bond," Niemela said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?