Analysis of common mobile virus and its preventive measures and methods

Source: Internet
Author: User
Tags mail

One: What is mobile virus

Mobile phone virus is a mobile phone as the target of computer viruses. It takes the handset as the infection object, uses the handset network and the computer network as the platform, by sends the virus text message and so on the mobile phone attacks, thus causes the mobile phone status to be unusual.

The world's first mobile virus "VBS." Timofonica "appeared in Spain in June 2000, sending abusive messages to any user in the system via the operator's Telefonica mobile system, so the short message was a prank at best." December 2004, the first domestic mobile phone virus "Caribe" was found in Shanghai, according to expert analysis, "Caribe" is actually last June by the International Virus organization 29A released the first concept of mobile virus "Kabir", because of the virus after the attack on the phone screen appears Caribe words, Therefore also known as the Caribe virus. The virus is able to run on smartphones equipped with symbianosseries 60 operating systems, mainly via Bluetooth devices.

So far, 80 mobile viruses have been found worldwide, according to F-secure, a security firm. The following is the current common mobile phone virus information and symptoms of attack table:

Virus name

Symptoms

"Epoc_alarm"

Make the phone continue to issue a warning sound.

Epoc_bandinfo.a

The attack will change the user information to "Some fool Own This" (Fool's Cell phone)

Epoc_fake.a

It will display the image on the phone's screen when the built-in hard drive is formatted. (Of course, doesn't really format, scare people just)

Epoc_ghost.a

It will show on the screen "Every One hates You" (Everyone hates You).

Epoc_lights.a

It will keep the background light flashing continuously.

Epoc_alone.a

It can disable keyboard operation, which is a malignant virus.

Timofonica

Virus is distributed through e-mail, not only like the ordinary mail virus, the address book to the mailbox to send poison mail, but also with the use of SMS server to send a large number of SMS mobile phone function.

Hack.mobile. Smsdos virus:

"Mobile Hacker"

When you receive information that contains this virus, your hand freezes or shuts down automatically.

Unavailable virus:

When there is a call, the screen is not the phone number, but the word "unavailable" (fault) or some strange symbols. At this point, if the phone will catch the virus, at the same time all the data lost in the machine.

Trojanhorse

"Trojan" virus

This is a malicious virus that uses the address book to make calls or send messages when a virus occurs. Even call the police to make you a mischief-makers.

Second: The Mobile virus attack path

Mobile phone virus is currently mainly through three kinds of ways to attack the damage.

One is to attack the phone itself system, mainly in the form of "virus message" to launch attacks.

Second, through the transmission of information to infect other mobile phones, the host caused damage. Mobile phone virus "Caribe" is also known as "Kabir" that is typical. It was found that the virus in Shanghai, Mr. Zhang described, at that time, he found that seven or eight icons are similar to the jigsaw puzzle file, thought is the game, it will run, after the operation found no content, so the file deleted. But when he turned on the phone again, the Caribe words appeared on the phone screen. Cell phone batteries are quickly depleted because of virus-infected phones that keep sending search signals. Once the virus scans the same Bluetooth-enabled phone, it sends copies of itself to each other. "Kabir" can spread through the mobile phone's Bluetooth device, so that the infected Bluetooth mobile phone through wireless search and infect other Bluetooth phone.

The third is to attack and control the "gateway", send spam messages to the mobile phone, resulting in paralysis of the network operation. The virus that attacks the mobile phone may automatically start the phone recording function, automatically dial the phone, delete the information on the phone, and may even "make" a huge amount of phone bills.

Third: Mobile Virus working principle

In addition to the hardware devices, mobile phones also require the support of the upper software. These high-level software is generally by Java, C + + and other languages developed, is the embedded operating system (that is, the operating system in the chip), which is equivalent to a small computer, therefore, there will certainly be malicious code to attack the possibility. And the current SMS is not just a simple text content, including mobile phone ringtones, pictures and other information, all need the mobile phone operating system "translation" later use, the current malicious text message is to use this feature, the development of a mobile phone operating system loopholes in the text message content, attack mobile phones. If the level of the makers is high enough to be familiar with the underlying operating system, they can even make up the virus that destroys the phone's chips and completely scrap the phone. Here, mobile virus will be an inevitable trend, also will be intensified.

Different handset manufacturers development tools are also different, the mobile phone's top software is not the same, which is like the window system and the relationship between the Linux system, so malicious text messages can not complete the attack across the phone. This is why only a handful of mobile phones are currently being attacked. Because the vast majority of mobile phones do not currently support the operation of foreign software, so the SMS virus has not found that there is a contagious feature, but only a one-to-one implementation of the attack.

Mobile phone virus must have two basic conditions to spread and attack, first mobile service provider to provide data transmission function, and the mobile phone needs to support Java and other advanced program write function. Now all have the Internet and download functions such as mobile phones are satisfied with the above conditions, and ordinary non-internet mobile phone is rarely an opportunity for infection.

Although some people think the smartphone is the main target of the mobile virus attack, the domestic smartphone user is few, the handset virus does not have the big influence, but along with the mobile communication domain various value-added service's introduction, in particular the 3G era is coming, has the rich application and the function handset will become the market mainstream, This is bound to become a hotbed of cell phone viruses.

Four: The transmission mode of mobile phone virus

The current mobile phone has the following 4 kinds of transmission mode:

1, using Bluetooth mode to spread

December 2004, the first domestic Bluetooth virus found in Shanghai, the virus will modify the smartphone system settings, through Bluetooth to automatically search for adjacent mobile phone whether there is a loophole, and to attack.

2, infected with the mobile phone executable file on the PC

January 11, 2005, "Velasco" virus was found, the virus infected the computer, the computer will search the SIS executable file on the hard drive and infection.

3, using MMS Multimedia information Service way to spread

April 4, 2005, a new type of mobile phone virus transmission, through MMS Multimedia Information service mode to spread.

4, the use of mobile phone bug attack

Such viruses are generally run on the "EPOC" of portable information devices, such as "Epoc-alarm", "Epoc-bandinfo". A "," Epoc-fake. A "," Epoc-ghost. A "," epoc-alight. A "and so on.

Therefore, in the daily use, in addition to as little as possible from downloading information on the Internet, but also always beware of infection virus, always pay attention to monitor the abnormal situation of mobile phones in order to find the virus in time.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.