What is the threat to mobile phones caused by the "skull" virus?

Source: Internet
Author: User

The virus author is using a Trojan horse to launch an attack on a mobile phone based on the Symbian operating system. It can delete the system program and replace the original icon with a skull image.
 
Miko, director of anti-virus research at F-Secure, said the trojan program called by the anti-virus manufacturer as the theme manager in the format of "Symbian installation system" on Nokia mobile phones. He said that only a few users have encountered the Trojan horse on the Internet and downloaded and run it. He said there are not many infected users and it is not a virus, so it will not spread.


The Trojan is a new threat to mobile phones and hosts. Earlier this month, a virus named Delf was able to send spam messages to mobile users in Russia after being infected with a PC. The other two types of malicious code, Mosquito and Cabir, are also targeted at mobile phones using the Symbian operating system. Cabir authors even developed a version of Cabir that tries to infect Windows CE devices. Just like the latest attacks, they have not set off a storm.


When running, the "skull" can cut off the connection of all Symbian system applications and replace the original icon with a skull image. Miko pointed out that third-party applications will not be affected, which allows users who install non-Symbian File Manager to find and delete malicious files and restore the phone to normal.


For users who do not have a third-party File Manager installed, the only solution is hard-start, which puts the mobile phone in the default setting status when leaving the factory, but unfortunately, this will cause loss of all user data. Mico said, in fact, it is very difficult to restore the mobile phone to normal. Users cannot access the Internet, download patches, or send content to their mobile phones.


Although it can bring some trouble to users, "Top bones" are not a serious threat. Vincent, Symantec's Senior Director for security response, said, but it still shows the future direction of the virus author's attacks. Although this time it won't cause huge losses to users, he said, it means the virus authors are spending time exploring the possibility of infecting and damaging their mobile phones.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.