Malicious worm turns iPhones into zombies

Jail-broken iPhones are targeted in an attack which could make them part of a botnet.

zombie

The security threat to the iPhone has suddenly become more serious, as a new worm is out which can compromise the device and add it to a botnet.

Regular users don't need to worry too much yet, as just like the Rick Astley' worm Ikee it only affects jail-broken devices.

But if it does get hold of your iPhone, Dutch security researchers XS4ALL said that the worm was capable of stealing data, as well as giving control of it to a Lithuanian botnet command server.

Also like Ikee, the new worm breaks into jail-broken iPhones by using the default root password Alpine'. The researchers reported that it changes this, making it so a criminal could log back in.

The worm also assigns each iPhone a unique ID number, which could get specific devices to work and allows criminals to further investigate the device - very serious if it holds important data.

The worm may also be related to a banking trojan, as it was said to look for mTans, SMS messages used as part of two-factor banking authentication systems.

This is when a bank sends you an SMS when you attempt to login to an online bank account, which has a one-time password you enter to gain access.

Graham Cluley, senior security consultant at Sophos, told IT PRO that this threat could not be considered or called a prank like the Rick Astley worm, although it does appear to be based on the same source code.

"It's clearly designed to hijack computers and steal information from them," he said.

Cluley said it was important to realise that this only affected jail-broken iPhones and people who made a fundamental mistake by not changing the default password when tampering with it.

He said that iPhone was normally a closed and sandboxed device where Apple had control of what applications you could run. But he warned about the potential threat to devices that are more 'open' such as phones running the Android operating system.

"There's always the potential for those kind of attacks from malicious apps written," he said. "But I still [think] we are still a long, long away from malware on smartphones being anything as common as on Windows."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021