These days, it is almost impossible to meet someone who doesn't own a cell phone.
More specifically, smart phones, whether it be the trendy iPhone, corporate-favoured Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy, and with good reason. A smart phone offers more advanced computing ability and connectivity than a contemporary phone.
Just like a handheld computer, most of the population relies on their operating system to multitask the demands of work, personal life and finances. However, many Smartphone users forget about the risks of malware on these crucial devices. In fact, a study from Rutgers University disclosed that malicious software for cell phones could pose a greater risk for consumer's personal and financial wellbeing than computer viruses.
Clearly, there is a need for greater protection of cell phone software and greater awareness of cell phone vulnerabilities from owners, especially when it comes to what kind of operating system you are using. There are unique differences and threats specific to each Smartphone. Here are some important key points that consumers should consider to protect their mobile operating systems.
There is a lot to be found regarding this popular device, half of our research findings surrounded the iPhone. Malware for this device took a different approach with the release of iOS 4. The multitasking that users take part in on their systems easily goes unnoticed, allowing the presence of malware to be easier to miss and less intrusive. Malware is more commonly found on iPhones that have been jailbroken.
"Jail breaking" means freeing a phone from the limitations imposed by the wireless provider and in this case, Apple. Users install a software application on their computer, and then transfer it to their iPhone, where it "breaks open" the iPhone's file system, allowing you to modify it.
However, this also opens it up to malware. By jailbreaking a phone, users are possibly allowing malicious applications into their device which has access to their personal information including their bank account. These applications are not subjected to the same limitations as Apple and therefore are easier to get from a rogue reference and infect cell phone.
Additionally, by not changing the password on a jailbroken iPhone, its easy for malicious attackers to create worms used to infect the users operating device. An example of how important this threat is to note was highlighted by Ike, a worm created to raise security awareness when it comes to using these jailbroken devices. It illustrates how once the core app has run its route, the vulnerability can gain complete control of the system.
Apple is slow to pinpoint vulnerabilities, including the SMS exploit released in the summer of 2010 by Charlie Miller. This also revealed that Apple is so slow to release that third party organisations were able to produce a security patch before Apple.
When it comes to threats, Windows Mobile takes the cake when it comes to attracting malware via SMS. Specifically the amount of SMS malware found on Windows Mobile devices is much higher in comparison to others. An interesting facet of the Windows Mobile OS is that many of the system calls are shared with it's full-featured desktop counterparts.
This detail has contributed to many pieces of malware that have originated on the Windows OS being ported to the Windows Mobile OS. A noteworthy example of this is the Zeus botnet that in recent years has begun to appear on mobile versions of Windows.
A popular alternative to the previous two mobile operating systems, the BlackBerry is also quite different from the typical smartphone. The BlackBerry uses what is arguably the most closed source of the operating systems discussed herein.
Research In Motion, the developers of BlackBerry have done an excellent job of keeping the sensitive inner workings of this smartphone a secret from the public. This is a contributing factor for the relatively small number of reliable exploits for the BlackBerry smartphone.
BlackBerry also suffers from the multitasking concerns that make it easier for malware to run unnoticed. An interesting proof of concept developed for the BlackBerry is the BBProxy application that was presented at DEFCON.
There is not a lot of information regarding malware for this operating device, although it is the oldest of the smartphones and one of the most popular outside of America.
Along with the Windows Mobile family of Phones, Zeus has been ported the Symbian as well. The mobile version of Zeus is being used to intercept text messages sent as the second factor of authentication in many services.
The Android operating system is the only open source operating system discussed herein. Android is unique in that it is community driven. The Android operating system is not owned by an individual organisation, so it is developed in the best interest of the users. However, the applications are not monitored for vulnerabilities in the marketplace, so anyone can submit applications containing malicious functions which are less likely to be caught. Essentially, it is up to the users to determine if it is a safe and reputable source from which they are getting the app.
Amazon now has a third party marketplace, which imposes additional policies and restrictions on applications that are distributed.
Android is based on the Linux operating system, and there is not much evidence of malware on the open source platform. This is not because there is not any known Linux malware out there, but because it doesn't receive much attention.
All operating systems have distinct strengths and weaknesses. However, many are the same and essentially are up to the user and the configuration of the password. Users need to remember not to install apps from unnecessary sources, especially if they are unknown. While users can't know them all, users need to ensure that they are from a reputable source.
Also, jailbroken phones are at a huge risk if the user maintains the default password and an even higher risk if not used in the Apple marketplace. Instances of malware exist on all of the phones and are even more relevant on ones using untrusted app sources. Consumers can keep this research in mind when using their smart phone to best protect their valuable information.