Digital Edition

SYS-CON.TV
New Mobile Phone Virus Identified
First Of Its Kind To Spread Via MMS

Antivirus companies have confirmed the first mobile phone virus that spreads using the popular Multimedia Messaging Service (MMS). The virus, dubbed CommWarrior, spreads via infected attachments that, once opened, places copies of itself on vulnerable mobile phones and uses the phone's address book to send copies of itself to the owner's contacts using MMS.

MMS is a popular text messaging technology that is closely related to SMS (Short Messaging System), but allows mobile phone users to send multimedia content, such as sound files or photos, between MMS-compliant mobile phones. The technology is popular, especially outside the United States, where phone users have widely adopted newer-generation cell phones that support multimedia features and MMS messaging, according to Mikko Hypponen of F-Secure Corporation. CommWarrior has apparently been spreading slowly among cell phone users since January. The virus itself is not considered particularly serious; however, the virus could herald a new age of malicious and fast-spreading cell phone threats.

CommWarrior uses MMS to spread copies of itself to phone numbers stored in the address book of phones it infects. Victims receive MMS messages with file attachments that contain the CommWarrior virus. The messages contain enticing messages such as "3DGame from me. it is FREE!" and "Nokia RingtoneManager for all models," F-Secure says. When victims open the attached virus file, CommWarrior is installed on the phone and begins randomly sending MMS messages with copies of itself to numbers in the phone book. Complicating matters, CommWarrior can also spread between phones using Bluetooth wireless connections, says Victor Kouznetsov, senior vice president of mobile solutions for McAfee.

Those who do get infected with CommWarrior can easily shut the virus down by pressing and holding the menu button on their cell phone, then selecting the CommWarrior from the list of applications that appears and pressing the "C," or "Clear," button, Kouznetsov says. Once the virus is disabled, mobile phone owners can use file management tools on the phone to locate and remove the virus files. F-Secure and McAfee both posted bulletins listing the folders where the CommWarrior virus is installed on infected phones. Mobile phone viruses are a recent development, but could be a major threat in years to come, as mobile devices become more powerful, according to Hypponen and others.

Cabir, the first known mobile virus, spreads on phones running the Symbian operating system and that are equipped with Bluetooth wireless connections, including Series 60 phones from a number of manufacturers, such as Siemens AG, Nokia, and others. The virus first appeared last June as a "proof of concept" released by virus-writing group 29a.

About Wireless News Desk
WBT News Desk brings you all the latest and greatest news from the world of wireless business and technology, including breaking news, technical articles and feature stories written by the world's leading experts of mBusiness.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

The question before companies today is not whether to become intelligent, it’s a question of how and...
While some developers care passionately about how data centers and clouds are architected, for most,...
ChatOps is an emerging topic that has led to the wide availability of integrations between group cha...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting ch...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being soft...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know ...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every ...
The cloud era has reached the stage where it is no longer a question of whether a company should mig...
The need for greater agility and scalability necessitated the digital transformation in the form of ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an over...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and ...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they respon...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily ...
"As we've gone out into the public cloud we've seen that over time we may have lost a few things - w...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Ser...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is...
We are given a desktop platform with Java 8 or Java 9 installed and seek to find a way to deploy hig...
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis too...
"Cloud4U builds software services that help people build DevOps platforms for cloud-based software a...