US CERT warns of malware attack against BlackBerry

Powered by SC Magazine
 

PhoneSnoop app compromises privacy.

The United States Computer Emergency Readiness Team (USA-CERT) has issued an alert over a free application for the BlackBerry which allows users to listen in on other people’s calls.

The software needs to be installed on a target device by someone with access to it, or by tricking the user into downloading the application. Once installed, a third party can listen in on any calls.

“You install and run PhoneSnoop on a victims’ BlackBerry,” wrote the application’s author in his blog.

“PhoneSnoop sets up a PhoneListener and waits for an incoming call from a specific number. Once it detects a call from that specific number, it automatically answers the victims’ phone and puts the phone into SpeakerPhone mode. This way, the attacker that called can now hear what’s going on at the victims end.”

Gunasekera said that the software was written as a proof of concept to show how easy it would be to turn the BlackBerry into a bugging device. While it is not on general release the code is in circulation, which may have prompted the US-CERT alert.

He says that the application is easily detectable as it shows up on the applications page, unlike other phone bugging software like Flexispy and Mobile Spy. He has also released a tool to allow BlackBerry users to see what applications are hidden on their handsets.

Copyright ©v3.co.uk


US CERT warns of malware attack against BlackBerry
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 335

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 139

Vote