Mobile virus. Presentation on the topic "mobile viruses"

    Slide 1

    Mobile viruses: myth or threat? Municipal budgetary educational institution "Secondary school No. 10 Cadet corps of young rescuers" Work performed by: Nikitchuk Kirill student 9 "B" MBOU "Secondary school No. 10 Cadet corps of young rescuers" Scientific supervisor: Lysova T.Yu. computer science teacher, Rubtsovsk, 2015 1

    Slide 2

    Find out whether there is a problem with viruses for mobile phones and how cell phone owners relate to this problem. Goal: 2

    Slide 3

    Tasks:

    Conduct a literature analysis to study the problem of mobile viruses. Find out what mobile viruses are?

    Is there a real danger of getting mobile viruses on your mobile phone? Which mobile device is more susceptible to the threat of mobile viruses: a mobile phone, a smartphone or just a PDA? What to do if your phone is “sick” (contracted by a mobile virus)? 3

    Slide 4

    Practical use:

    is to help students learn to distinguish mobile viruses and protect themselves from infecting their phone. 4

    Slide 5

    It can be assumed that mobile viruses exist and they can affect the performance of mobile phones. Hypothesis: 5

    Slide 6

    The results of a survey conducted by the antivirus company McAfee among 2,000 residents of the UK, the United States and Japan.

    Slide 7

    Slide 8

    Slide 9

    Slide 10

    Slide 11

    The survey showed: 11

    Slide 12

    mobile viruses are just under ten years old - quite a serious age by the standards of the cellular market. 2000 – the appearance of the Timofonica program.

    In June 2004, a group of virus writers 29A developed the first real mobile virus - Cabir.

    In February 2006, RedBrowser appeared, the first mobile virus for Java-enabled phones. Story 12

    Cabir Worm Virus CommWarrior Virus Flexispy Spy Virus Cross-platform Cxover Virus Trojan VirusRedBrowser Trojan VirusWebster Wormy Variety 14

    Slide 15

    Cabir worm virus

    The first cell phone virus was discovered in 2004, and over time it affected 23 countries. This is a so-called computer worm, called Cabir. It infects Symbian smartphones. The virus is delivered to the handset as an SIS file, masquerading as a security management utility. The “infected” smartphone begins searching for other vulnerable devices and sends a file containing the worm to them. The virus does not destroy user data, but blocks authorized Bluetooth connections and consumes battery resources. 15

    Slide 16

    CommWarrior virus

    In 2005, a more dangerous virus than Cabir appeared. They called him CommWarrior. This program terrorized smartphones of subscribers in 22 countries for quite a long time. CommWarrior attacked Symbian devices on S60 and spread via Bluetooth or MMS 16

    Slide 17

    Flexispy Spy Virus

    In April 2010, Flexispy was discovered to be an insidious program being sold online for $50. This is a fully functional spy that establishes total control over the smartphone and begins to regularly send its owner all the information about calls made and SMS sent. 17

    Slide 18

    Cross-platform virus Cxover

    This is the first mobile virus that can spread across different operating systems. When launched, it detects the OS, penetrates the computer and searches for available mobile devices through ActiveSync. The virus then copies itself to the found device. 18

    Slide 19

    RedBrowser Trojan Virus

    Kaspersky Lab announced that a virus that supports the JAVA platform has been detected. This is a so-called Trojan, called RedBrowser. The virus can be downloaded to the phone either from the Internet from a WAP site or via a Bluetooth connection. 19

    Slide 20

    Trojan virusWebster

    Following the RedBrowser program, another Trojan penetrated Russian mobile communications. It's called Webster. The virus is distributed in the form of a file called pomoshnik.jar. 20

    Slide 21

    Reasons for the spread of mobile viruses:

    software vulnerabilities; low level of “mobile” literacy; the attitude of mobile phone owners towards mobile viruses as a problem of the future; curiosity (what will happen if I run this file/game/program?); failure to comply with basic safety rules. 21

    Slide 22

    Ways a virus can enter a phone:

    from another phone via Bluetooth connection; via MMS message; from a PC (connection via Bluetooth, USB, WiFi, infrared); via web or wap sites. 22

    Slide 23

    Symptoms of infection

    The appearance - after copying and installing any files (usually “games”) - of all kinds of “glitches” and “bugs”. For example: the phone freezes for no reason, any applications do not launch, it is impossible to open the Received files folder. The appearance of unknown suspicious files and icons. The mobile phone spontaneously sends SMS and MMS, quickly emptying the owner’s account. Any phone functions are blocked 23

    Slide 24

    One of the unwritten rules states that the virus, having received control, can do everything in the system that a user can do!: unnoticed by the user, mass mailing of SMS and MMS;

    unauthorized calls to premium numbers;

    rapid depletion of a subscriber's account (as a result of calls to paid numbers and mass mailing of SMS and MMS);

    destruction of user data (phone book, files, etc.);

    theft of confidential information (passwords, account numbers, etc.);

    blocking phone functions (SMS, games, camera, etc.) or the device as a whole;

    If you have an “advanced” mobile phone, use antivirus software. Be careful when installing all kinds of applications (mobile viruses are especially common in games!). If possible, before copying/installing anything to your mobile phone, check what you are going to copy/install on your desktop PC with an anti-virus monitor with the latest databases. Do not install unfamiliar “content” of unknown origin on your mobile phone. Do not allow unfamiliar programs to run. Don't keep Bluetooth on all the time, turn it on only when necessary (and if you have to keep Bluetooth on all the time, use Hidden mode). If some suspicious file is sent to you via Bluetooth, you can always refuse to receive it! Do not download files from the Internet directly to your mobile phone. First download them to your PC, check them with an antivirus, and then install them on your mobile phone. 26

    Slide 27

    Mobile antiviruses

    At the same time, solutions for protection against threats remain and continue to be actively developed - antiviruses today play a fairly prominent role among other mobile applications. The mobile antivirus industry can offer a range of software tools to protect your cell phones. You can recall both domestic developments (KasperskyAnti-virusMobile, Dr. Web) and foreign programs, in particular from the companies F-Secure (F-SecureMobileAnti-Virus), Symantec (NortonSmartphoneSecurity). 27

    Slide 28

    Conclusions:

    Mobile viruses exist! This is no longer a myth, but a real threat. Until recently, it was believed that mobile viruses, if they were a threat, were only for advanced mobile phones; owners of ordinary mobile phones had nothing to fear. Alas, this is no longer true!.. And since... The share of regular phones is at least an order of magnitude greater than the share of smartphones, there is reason to think! Since cross-platform mobile viruses have already been created, adherence to any one OS does not guarantee protection against viruses. The originally existing line between mobile and computer viruses has been erased. Now these devices can mutually infect each other. It took computer viruses more than twenty years to become widespread. Mobile viruses have traveled this path in just two years (obviously, mobile virus writers are actively using their experience in creating and distributing computer viruses). There are about 3 billion cellular subscribers in the world. Many people literally never part with their cell phones. Mobile phones store confidential information. It is not difficult to imagine the scale of the consequences in the event of an epidemic of mobile viruses. How to deal with the problem of mobile viruses? There is no need to exaggerate it or panic. But you shouldn’t brush it aside, believing that the problem is being artificially inflated by antivirus companies and sensation-hungry media. 28

    Slide 29

    Literature

    https://ru.wikipedia.org/wiki - Wikipedia http://www.softmixer.com/2011/08/blog-post_8103.html - online magazine http://www.hackzona.ru - hacking territory http:/ /www.mobi.ru – expert site for digital technology http://www.vipmks.ru – mobile corporate systems We create a virus and an antivirus. Author: I.A. Gulyev, 304с. – M.: Education, 1999. All about mobile phones: Opportunities, choices, etiquette.

    Slide 30

    Thank you for your attention! thirty

View all slides

THE CONCEPT OF MOBILE VIRUSES AND METHODS OF PROTECTION AGAINST THEM

Zubrovsky Gennady Borisovich

4th year student, Department of Information Security

and software engineering RGSU, Russian Federation, Moscow

Sirotsky Alexey Alexandrovich

scientific supervisor, Ph.D. tech. Sciences, Associate Professor, Head of the Department of Information Security and Software Engineering, Russian State Social University, Russian Federation, Moscow

Currently, the problem of information security is very relevant. Information as a product can be sold or bought, in connection with which we can say that it has its own value. The value can vary widely, and when we talk about information that can bring high profits, this is where the problem arises related to its protection. Speaking about protection, we can highlight two main points: the loss of the value of information or its disappearance from data storage devices. The first point is related to the negligence of the owners who have any information. The second point most often occurs due to hardware failures of the devices on which data is stored, or due to viruses that have penetrated into certain devices. In my article I want to look at threats to mobile devices and ways to protect against them.

In our age of mobile technology, a person cannot imagine his life without his favorite gadget, the functionality of which depends only on desire and the size of the wallet. With the growing penetration of smartphones, millions of subscribers of telecom operators around the world are exposed to malicious software attacks, as a result of which they lose huge amounts of money. However, not all owners of these devices realize the real scale of the threats. It must be remembered that a smartphone is a full-fledged computer that is controlled by an operating system. The most popular platforms for these devices: Apple iOS, Google Android, Windows Phone, BlackBerry.

One of the leading mobile device platforms is Android, which is of particular interest to cybercriminals. About 97% of all existing malware samples for mobile devices are written for this platform.

Mobile virus concept

A mobile virus is a small program that is designed to interfere with the operation of a mobile device (smartphone, tablet) by recording, damaging or deleting personal data. Mobile viruses spread through communication channels (SMS/MMS, Bluetooth, Internet).

The main goal of mobile viruses, like computer viruses, is to obtain personal information that can be sold or used for personal needs. However, compared to regular computers, the cost of damage from viruses for mobile devices can be higher. This is due to the fact that the user stores a huge amount of personal information on the phone (phone numbers, data from various accounts and mail, photos), in addition, viruses have the ability to send SMS and call paid numbers.

The first real mobile virus, Cabir, was developed on June 14, 2004, by a group of virus writers. Cabir is an application (worm), the harm from it was to send a copy of itself via Bluetooth, which quickly drains the device's battery. Intended for mobile devices running the Symbian OS operating system. It was developed to demonstrate the fundamental possibility of the existence of mobile viruses.

The Cabir virus constantly scans the airwaves in search of new victims. When a potential “client” is detected, the infected device sends it a 15 KB caribe.sis file. For the subscriber it looks like this: a proposal to accept a certain letter appears on the screen, and if the user agrees, a file with a virus is sent to his phone, after which the system asks permission to install a program called Caribe. If the answer to this question is yes, the worm is installed into the system, copying itself into several directories at once to be sure.

Directions for the development of mobile viruses

There are several directions of virus development that virus writers follow.

1. Theft of personal information

In this case, viruses collect personal data available on the phone (contacts, passwords, account settings, for example Google Play or AppStore). All information received by the virus is sent to the attackers’ server, where it is used at their discretion. One of the most serious viruses of this kind is Android.Geinimi. Once in the system, it determines the location of the smartphone, downloads files from the Internet, reads and writes browser bookmarks, accesses contacts, makes calls, sends, reads and edits SMS messages.

2. Sending paid SMS messages and calls to the “partner number” without the owner’s knowledge

In this case, for sending a message or making a call, a significant amount of money is debited from the personal account of the phone owner. Of course, the money ends up in the hands of criminals. The most famous such threats include Android.SmsSend, as well as the long-known RedBrowser and Webster for the Java platform. They disguise themselves as various useful programs, thereby instilling trust in the user.

3. Fraud through the use of Internet banking systems

In this case, the virus provides access to a mobile application for working with a bank or the corresponding website, or intercepts SMS messages sent to the user from online banking systems. In my opinion, the consequences are obvious: subscriber subscription to expensive content services or debiting amounts from bank accounts, blocking incoming SMS requests from the bank and secretly sending confirmation SMS about the transfer of funds.

Let us highlight the main reasons for the spread of mobile viruses:

· software vulnerability;

· low level of “mobile” literacy;

· the attitude of mobile phone owners towards mobile viruses as a problem of the future;

· curiosity (what will happen if I run this file/game/program);

· failure to comply with basic safety rules.

Brief overview of mobile viruses

Here is a short overview of mobile viruses.

Comwar is a very expensive mobile virus. It sends out its copies via MMS messages. Such a mobile virus is dangerous for your wallet only if you have activated the GPRS service, because without connection, the virus cannot send anything. It will, of course, try to do this, but each time it will be stopped by a message saying that the network connection failed, check your connection settings. However, when you always have GPRS connected, the costs will be colossal.

Commwarrior- MMS worm. Distributed via MMS and Bluetooth. Sends MMS messages without the owner's knowledge. The battery drains quickly.

Flexispy- the first fully functional spy, the price of which on the creators’ website was $50: it establishes total control over the smartphone and sends information to the attacker about calls made and SMS sent.

Fontal - this mobile virus, getting into the smartphone’s memory, changes the fonts.

Locknut - this virus replaces a certain number of smartphone files with inoperative files. As a result, after the phone is turned off (for example, when the battery is low), the firmware crashes. And all you have to do is visit the service center specialists.

Metal Gear Solid- disguises itself as a game installation file, after activation it searches for and disables anti-virus programs, after which it becomes problematic to cure the phone.

Mosquit - this virus disguises itself as a phone game, and when it starts, it starts sending out SMS messages.

Ozicom- after installation, the icons change, all the inscriptions under them are in Hebrew.

Pbstealer is a malicious application that steals your personal data (address book data) and tries to send it via Bluetooth.

Sculler - damages the phone's address book, so all numbers will have to be dialed manually. It quickly blocks almost all mobile functions, leaving only the ability to use voice operations. It is possible to replace all phone menu icons with your own icons (usually in the form of skulls).

Trojan-SMS.J2ME.RedBrowser- a Trojan that can infect almost all existing models of mobile phones (including regular mobile phones).

Mobile antiviruses

Now let's talk about virus protection methods. Today, most developers of antiviruses for personal computers have begun to release mobile versions of antiviruses. The problems of modern cyber threats are solved by mobile versions of antiviruses from Kaspersky Lab, Dr.Web and other well-known antivirus software manufacturers.

There are also network solutions from telecom operators that allow you to do without installing an antivirus on your smartphone. For example, the network version of MTS antivirus, when accessing the Internet from a mobile device, blocks infected web pages directly on the operator’s equipment. Thus, protection is provided at a higher hardware and software level, developed according to information security standards for large enterprises, financial and banking institutions.

Let's conduct a comparative analysis of the five largest antivirus companies:

1. AVG Mobilation Anti-Virus Pro;

2. BitDefender Mobile Security;

3. Dr.Web Mobile Security;

4. Kaspersky Mobile Security;

5. Norton Mobile Security.

1. Call and SMS filter.

2. Antivirus.

3. Technical support.

4. Anti-theft.

Table 1.

Call filtering andSMS

Criteria

BitDefender Mobile Security

Dr.Web Mobile Security

Kaspersky Mobile Security

Norton Mobile Security

“White” / “Black” list of numbers

“White”/ “Black” list of SMS/MMS

Blocking letter numbers

Function “Always allow calls and SMS for numbers from contacts”

Table 2.

Antivirus

Criteria

AVG Mobilation Anti-Virus Pro

BitDefender Mobile Security

Dr.Web Mobile Security

Kaspersky Mobile Security

Norton Mobile Security

Antivirus monitor (real-time protection)

Scan on demand

Scheduled scanning

Scanning individual files and directories

Scan SD card when connected

Web protection (blocking access to infected sites)

Quarantine

Use of cloud technologies

Automatic update of anti-virus databases

Table 3.

Technical support

Criteria

AVG Mobilation Anti-Virus Pro

BitDefender Mobile Security

Dr.Web Mobile Security

Kaspersky Mobile Security

Norton Mobile Security

User guide

Technical support (via personal account/email)

Educational information about the product on the manufacturer's website

Phone support

Table 4.

Anti-theft

Criteria

AVG Mobilation Anti-Virus Pro

BitDefender Mobile Security

Dr.Web Mobile Security

Kaspersky Mobile Security

Norton Mobile Security

Blocking / Unblocking your phone (via website/SMS)

+ (website)

+ (website)

+ (website and SMS)

GPS search (via website/SMS)

+ (website)

+ (website)

+ (website and SMS)

Auto - blocking when changing SIM

Automatic receipt of a new phone number (by phone/email)

(To trusted numbers)

(by phone, by e-mail)

Remote deletion of all data

+ (website)

Remote deletion of selected data

+ (personal data, directories)

Deleting data after a certain number of incorrectly entered passwords

(after 10 pops)

(after 10 pops)

Remote camera shot

+ (website)

List of trusted phones

(up to 5 numbers, password reset, commands without password)

(up to 3 numbers, can reset password and perform any actions)

Remotely turn on the ringtone to find your phone

+ (website)

+ (website)

Customize text on the lock screen

+ (if blocked via the website)

From the above analysis we can conclude that the best antiviruses today are Dr.Web Mobile Security and Kaspersky Mobile Security.

The presented study showed that most antiviruses include a fixed set of security components:

· anti-virus engine (scanner and monitor);

anti-theft;

· call and SMS filtering.

Conclusion

In conclusion, I would like to give a little reassurance to cellular subscribers. Experts believe that today the number of mobile viruses has not yet reached a critical point and the danger of infecting a phone is quite small compared to ordinary computer “infections.” So far, viruses for mobile phones have not yet become a real disaster. However, you should not let your guard down. After all, mobile communication technologies are developing rapidly, and along with them, naturally, viruses for cell phones are developing. Therefore, it remains to once again urge you to be careful when handling your mobile phone - and then the problem of mobile viruses will probably not pose anything terrible for you.

In conclusion, I would also like to highlight a list of rules for handling mobile devices in order to avoid the possibility of infection with viruses.

1. Use antivirus programs.

2. You need to be careful when installing all kinds of applications on your smartphone.

3. Don't keep Bluetooth on all the time, or use hidden mode.

4. Don't run unfamiliar programs.

Bibliography:

1. Protection against mobile viruses [Electronic resource] - Access mode. - URL: http://www.utro.ru/articles/ 2013/10/29/1153228.shtml (accessed November 20, 2013).

2. History of mobile viruses [Electronic resource] - Access mode. - URL: http://andromania.org/2011/02/13/mobil-nye-virusy.html (accessed November 21, 2013).

3.Mobile viruses [Electronic resource] - Access mode. - URL: http://www.ferra.ru/ru/mobile/s26687/ (accessed November 18, 2013).

4.List of mobile viruses [Electronic resource] - Access mode. - URL: http://netler.ru/pc/mobi-vir.htm (accessed November 18, 2013).

5. Comparison of anti-virus programs [Electronic resource] - Access mode. - URL: http://www.anti-malware.ru/compare (accessed November 20, 2013).

The first known virus on a mobile phone appeared in 2004. Cabir.A only infects a small number of Bluetooth phones and does not perform any malicious actions - a group of malware developers created Cabir to prove this can be done. Their next goal was to send the program to antivirus software researchers, who began the process of developing a solution to a problem that promises to get much worse in the near future.

Cell phone viruses are now at the threshold of their effectiveness. Currently, they can't spread very far and they can't do much harm, but in the future we may see cell phone malware that will be as harmful as computer viruses. In this article, we'll talk about how cell phones spread viruses, what you can do, and how you can protect your phone from current and future threats.

A cell phone virus is basically the same thing as a computer virus—an unwanted executable file that “infects” a device and then copies itself to other devices. But while a computer virus or worm spreads through email and Internet download attachments, a virus or mobile phone worm, distributed via Internet downloads, MMS (Multimedia Messaging Service) attachments and copied via Bluetooth. Most common now way to infect a phone, occurs when an infected file is downloaded from a computer or the Internet to a cell phone. The method of infecting a virus from phone to phone is actively developing.

Modern phone-to-phone viruses almost exclusively infect phones running the Symbian operating system. The large number of original operating systems in the phone world is one of the obstacles to mass infection. Virus writers targeting cell phones do not have access to a Windows-level audience, so any virus will only affect a small percentage of phones.

Infected files are usually disguised as apps, games, security patches, feature additions and, of course, pornography and free software. Infected emails sometimes use the subject line from a message you received from a friend, which of course increases the likelihood of being opened - but the message is not opened not enough to become infected. You must open the message attachment and agree to install the program, which is another obstacle to mass infection. To date, not a single automatically installed virus from phone to phone has been registered.

How viruses spread on a mobile phone

Phones that can only make and receive calls are not at risk. Only smartphones with Bluetooth connectivity and wireless data transfer protocols can be infected with a mobile virus. These viruses spread mainly in three ways:

  • Internet downloads– the virus spreads in the same way as a traditional computer virus. The user downloads the infected file to the phone via a computer or their own Internet phone. This may include download file sharing, applications available on sites where users can post content (such as tunes or games) and false security patches posted on Symbian websites.
  • Bluetooth connection– the virus spreads between phones via their Bluetooth connection. The user receives the virus via Bluetooth when the phone is in discoverable mode, meaning it can be accessed by other Bluetooth phones. In this case, the virus spreads as an airborne infection.
  • Multimedia Messaging Service– the virus is embedded in the text of the MMS message. Like computer viruses that arrive as an email attachment, the user must open the attachment and install it in order to the virus infected the phone. As a rule, a virus spreading via MMS gets into the phone's contact list and sends itself to every phone number in the address book.

In all of these transfer methods, the user must agree at least once (and usually twice) to run infected file. But mobile virus writers force you to open and install their product in the same way that computer virus writers do: The virus is usually disguised as a game, security update, or other application.

CommWarrior virus began operations in January 2005 and is the first cell phone virus to effectively spread via Bluetooth. It is duplicated both via Bluetooth and MMS. Once received and installed, the virus immediately begins to search for other Bluetooth phones in the immediate vicinity of the infection. At the same time, the virus sends MMS messages to every phone number in your contact list. CommWarrior is probably one of the most effective viruses available today as it uses two methods to replicate itself.

So what does the virus do once it infects your phone?

The damage they can causeviruses on mobile phone

The first known mobile phone virus, Cabir, is completely harmless. All he does is sit on his phone and make attempts to spread himself. Other mobile viruses are not so harmless.

The virus can access and/or delete all information, contacts and calendar entries on your phone. It can send an infected MMS message to every number in your phone book - and sending an MMS message usually costs money, so what you're really paying for is sending the virus to the phones of all your friends, family members and business associates. Finally, the worst-case scenario is that the virus could remove or block certain phone applications or completely destroy the phone, rendering it useless. Some of them are known viruses and their statistics are given below.

As you can see from the description above, cell phone viruses produce much more malicious activity than the Cabir worm that fell into the hands of researchers in 2004. What steps can you take to protect your phone?

Protecting your phone from viruses

The best way to protect yourself from mobile phone viruses is the same as when protecting yourself from computer viruses: Never open anything unless you know what it is, did not order it, or have some suspicion that it is not the right one. what he claims to be. However, even the most careful person can still end up owning an infected phone. Here are some steps you can take to reduce your chances of installing a virus:

  • Turn off Bluetooth visibility mode. Set your phone to “hidden” mode to prevent other phones from detecting it and sending a virus. You can do this from the Bluetooth options page.
  • Check for security updates. Viruses can be quite complex - the CommWarrior program generates random names for the infected files it sends so that users cannot be alerted to specific names - but many viruses can be easily identified by the name they bear. Antivirus sites with detailed information about viruses:

Some of these sites will send you email updates with new information about the virus.

  • Install software for security on your phone. Many companies develop security software for mobile phones, some available for free download, some for purchase by users, and some intended for cellular operators. The software may simply detect and remove the virus after infection, or it may protect the phone from receiving certain viruses in the first place. Symbian has developed an anti-virus version of its operating system, which allows you to receive only protected files via Bluetooth on your phone.

Although some telephone industry experts think the potential virus problem is overstated, most experts agree that cell phone viruses are on the verge of being destructive. Installing a “security patch” that ends up turning your phone into a useless piece of plastic is certainly cause for concern, but it can still make things worse. Ultimately, more connectivity means greater vulnerability to viruses and faster spread of infection. As smartphones become more and more complex, so will they improve.

As experts and developers of anti-virus programs say, mobile viruses are great accelerators: while computer viruses took 20 years to fully flourish, mobile “worms” crawled this way in 2-3 years.

For example, back in 2003, Evgeny Kaspersky, whose name is undoubtedly familiar to every computer owner, said that the appearance and threat from mobile viruses was very unlikely, and just two years later, the first mobile virus thundered around the world with all its might, causing a significant damage - Cabir, a worm for Symbian OS.

Now viruses have grown, improved and learned many things. In general, there is an unwritten rule among the authors of malicious software that a “correct” virus must do everything that a user can do.

Therefore, today viruses can:

  • send SMS and MMS without the user noticing, especially with personal data and photos
  • hack and send “cloud archives”
  • make calls without the user noticing to paid numbers (in minimized window mode, silently)
  • data destruction
  • stealing passwords, account numbers
  • fast battery drain
  • sending yourself via (e-mail, WiFi, Bluetooth)
  • allows the virus author to remotely control your phone

So if you downloaded a suspicious but cool game, or clicked on the banner “speed up your mobile phone”, “does it run out quickly? pump up the battery” and so on, then be prepared for the first symptoms such as an unreasonable “freeze”, the appearance of new icons, or failure of phone functions.

What viruses, from the old ones to the newest ones, can you catch on your favorite phone?

1. Cabir- the very first and most harmless. It simply clutters everything within reach via Bluetooth with its copies, causing phones to “slow down.”

2. Cardtrap- installs Trojans on the memory card to hack Win32 systems

3.Flexispy- reads your calls and SMS and sends them to the attacker. Previously, it was even sold to all sorts of jealous people and private detectives for $50.

4. Cxover, Mobler.a- viruses that sneak into your PC through synchronization with a mobile device, and then carefully clean up their traces, removing themselves from the phone. By staying on the PC, they steal personal information.

5.Wesber- steals money from the account via SMS. The virus is distributed in the form of a file called pomoshnik.jar.

6. Metal Gear Solid- you seem to be downloading a well-known game, but in reality you are installing a virus that does not allow you to turn off your phone and disables all antiviruses

7.Commwarrior- a worm “specializing” in sending paid MMS and record-breaking battery drain

8. Skulls- replaces all application icons with skull and crossbones, preventing them from opening from the desktop

9. RedBrowser- is loaded as a setting for visiting WAP sites, and then starts sending paid SMS, downloading paid porn pictures, ringtones and other rubbish to you

10. Podec- the latest virus, distributed through VKontakte. Infects Android users and signs them up for paid social network services. Bypasses the CARTSNA security system, which checks whether a person or program is real, using the Antigate.com text recognition service. After installation, it begins to hide the real price of the service from the user, and also gives itself administrative rights so that it cannot be removed.

To protect your mobile phone from viruses, first of all, you need to be vigilant. Today, on a phone, just like on a PC, you can’t click on different recruiting banners and download everything that seems interesting. Anti-virus software would also be useful: for the particularly vigilant, paid Kaspersky, or free, but quite good and popular Avast or Doctor Web (versions for mobile phones).

Ministry of Education of the Tver Region

State budgetary professional

educational institution

"Bezhetsk College named after. A.M.Pereslegin"

(SBE OU “Bezhetsk College named after A.M. Pereslegin”)

PROJECT

in computer science

Subject:Mobile viruses - myth or threat?

Completed by a 1st year student

specialties 44.02.02

"Teaching in primary school"

10 groups

Kozlov M.A.

Supervisor:

Arsenyeva T.S._________

Grade:________________

Bezhetsk, 2017

EXPLANATORY NOTE

The problem of mobile phone viruses has existed for several years. In just the last two years, they have infected several million pipes around the world. This topic is the most relevant today.

The goal of the project: to find out whether there is a problem with viruses for mobile phones and how cell phone owners relate to this problem.

This project consists of an introduction, two theoretical chapters, chapter-by-chapter conclusions, a conclusion, a list of sources and literature, and two appendices. The first chapter “History of mobile viruses”, the second chapter “The current state of mobile viruses” includes the following sections: “Computer viruses”, “Causes of the spread of mobile viruses”, “Symptoms of infection”, “How to remove infected files”.

The product of the project is an application, namely two reminders:“How to protect yourself from mobile viruses” and “Mobile viruses” that a teacher can use in class.

CONTENT

Page

INTRODUCTION………………………………………………………………………………….3

CHAPTER 1. HISTORY OF MOBILE VIRUSES……………………………......5

CONCLUSION TO CHAPTER 1……………………………………………………………...7

CHAPTER 2.CURRENT STATE OF MOBILE VIRUSES….…..8

2.1.Computer viruses…………………………………………………….....9

2.2. Reasons for the spread of mobile viruses………………….……….12

2.3. Symptoms of infection……………………………………………..……12

2.4.How to remove infected files…………………………….…………..…..13

CONCLUSION TO CHAPTER 2……………………………………………………….…15

CONCLUSION…………………………………………………………….....16

LIST OF SOURCES AND REFERENCES…………………………….…18

ANNEX 1

APPENDIX 2

INTRODUCTION

Imagine this situation: you urgently need to make a call, you take out your mobile phone, are about to dial the desired number and suddenly - oh, horror! – you find out that you have no money in your account. But just a few hours ago the balance was as much as one hundred rubles! What happened? The answer is simple: a mobile virus has entered your phone...

Viruses are an extremely insidious nuisance. Any computer scientist will confirm this. It’s even worse when it comes to the phone, because mobility is only at first glance simple and safe. There are contacts, an account... and a bunch of other little things. If something happens to them, it will paralyze all work; the mobile phone will turn from a means of communication into a deaf-mute device. All this determinedrelevance this topic and allowed us to formulateproblem research: why viruses are created and how to fight them.

Field of study: Informatics.

Target: find out whether there is a problem with viruses for mobile phones and how cell phone owners relate to this problem.

Hypothesis: Mobile viruses exist and they can affect the performance of mobile phones.

Tasks:

    Conduct a literature analysis to study the problem of mobile viruses.

    Find out what mobile viruses are?

    Is there a real danger of getting mobile viruses on your mobile phone?

    What to do if your phone gets a mobile virus?

    Create reminders “How to protect yourself from mobile viruses” and “Mobile viruses”.

Methods:

    Analysis.

    Comparison.

    Generalization.

    Modeling.

CHAPTER 1. HISTORY OF MOBILE VIRUSES

The history of mobile viruses goes back a little less than twenty years - quite a serious age by the standards of the cellular market. True, it all started not entirely with mobile phones, or rather not only with them. Let's follow a brief chronology:

2000 – the appearance of the Timofonica program. However, it cannot be considered a full-fledged mobile virus, since the utility was installed on a computer and was engaged in sending SMS messages.

2000 - at the same time, an incident occurred with several hundred subscribers of the Japanese cellular operator NTT DoCoMo, whose mobile phones, by strange chance, began to call the police, which led to network overload. But these two cases only preceded the emergence of serious mobile threats.

At the beginning of the century, viruses for cell phones did not seem like something real; in 2003, in an interview, Evgeny Kaspersky even allowed himself to declare the improbability of the emergence of full-fledged mobile viruses designed to infect cell phones and smartphones.

However, six months passed, and in June 2004, a group of virus writers 29A developed the first real mobile virus - Cabir. The worm application, all of whose harm consisted of sending a copy of itself via Bluetooth (however, this entails a quick drain on the battery), was intended for mobile devices running the Symbian OS operating system, and was developed to demonstrate the fundamental possibility of the existence of mobile viruses – so it was sent to antivirus companies.

Unfortunately, the source code of this virus was published on the Internet, which other virus developers did not fail to take advantage of. Within a short time, hundreds of different viruses were written for the Symbian OS software platform, including both worms and Trojans. Some of them posed a real danger to the normal functioning of mobile devices. The means of spreading viruses were modified and improved - in addition to Bluetooth, infection occurred through MMS messages (the first such virus was ComWar, which appeared in March 2005).

It is clear that virus developers did not limit themselves to Symbian OS. Already a month after the appearance of the Cabir virus, a malicious application for the Windows Mobile platform, Duts, appeared, posing a threat to the file system of a communicator or PDA. This was followed by other Windows Mobile viruses, in particular Brador, which became the first mobile virus to allow access to the infected device from the outside. Finally, the appearance in February 2006 of RedBrowser, the first mobile virus for phones with Java support, was extremely unpleasant, which sharply increased the potential audience of infected devices. Following it, other viruses appeared, such as, for example, Webster.a, which posed a threat not only to the functionality of the infected phone, but also to the balance of the owner himself - we are talking about the loss of money due to sending SMS messages.

Cross-platform viruses also appeared that spread during synchronization with a PC. If earlier viruses were written by enthusiasts, then gradually real commercial developments began to appear. We are talking, in particular, about the theft of confidential information such as the contents of a telephone directory or calls made (the Flexispy Trojan, which was distributed for $50, as well as the similar Acallno).

CONCLUSION TO CHAPTER 1

Mobile viruses appeared relatively recently. But every year they improve and cause more and more harm. If viruses “threatened” mainly with a reduction in battery life, then later the danger of losing all personal data (the CommWarrior virus), infecting the PC with “real” computer viruses and losing funds from the balance of the phone number became quite real.

CHAPTER 2. CURRENT STATE OF MOBILE VIRUSES

A cell phone virus is an application that disguises itself as a game or an attractive Internet file. After the subscriber downloads it to his phone, the “subversion” begins. A mobile virus can either block a memory card or send SMS or MMS messages to paid numbers unnoticed by the user; it can also steal data from the address book and send it to the owner of the malicious program.

The situation for mobile viruses has become especially favorable with the widespread use of smartphones and communicators. Unlike a regular mobile phone, these devices have operating systems whose capabilities are quite sufficient to become a good environment for the spread of viruses. In addition, all modern smart phones are equipped with a Bluetooth wireless module, through which viruses can spread especially quickly. It turns out that the more advanced your means of communication, the more attractive it is to viruses.

Insidious virus programs spread especially actively in crowded places: in the subway, in cinemas, at airports. A striking example is the World Cup. In huge packed stadiums, mobile viruses spread with amazing speed. Many fans have become victims of these insidious programs.

It is no coincidence that we gave the example of a football match. This is perhaps the best environment for mass infection of mobile phones and smartphones. Firstly, in such conditions the virus is very easy to spread, as you already understand. The computer that contains the pest program simply starts sending it out via MMS or Bluetooth to all mobile phones within a radius of several meters to one kilometer. Secondly, very convenient conditions are created for deceiving subscribers. After all, to infect phones it is not enough to simply send a virus via Bluetooth. It requires the user to run the malicious program on their phone. The reaction of a person engrossed in a football match who receives a message that he has allegedly won a ticket to the next game is quite predictable. The fan, captivated by the spectacle, will probably not even sense the trick; he will press OK, and the malicious program will end up on his phone.

Exactly the same situation can arise during a concert, rally or other similar event, where there are many people who are passionate about something. Their attention is entirely focused on the spectacle, and most of them certainly will not think about whether or not to accept a new message.

So far, most mobile viruses are created for the Symbian operating system. However, antivirus technology experts believe that in addition to this platform, Bluetooth and MMS connections, there is another “favorable” environment for the spread of malware. This operating room systemWindows Mobile (for SmartphoneAndPhone Edition).It is very vulnerable to various viruses, since there are no restrictions on the applications it runs. A running program can easily gain access to any system functions: receiving/transferring files, functions of telephone and multimedia services, etc. To date, only four types of viruses are known for this platform, but in the future it should be considered as the main field of activity for mobile viruses.

There are different types of “infections” for mobile phones. During the two years that this “infection” existed, the pipes were attacked by several truly insidious computer programs. Let's look at some of them.

2.1 Computer viruses

Cabir worm virus

The first cell phone virus was discovered in 2004, and over time it affected 23 countries. This is a so-called computer worm, called Cabir. It infects Symbian smartphones. The virus is delivered to the handset as an SIS file, masquerading as a security management utility. The “infected” smartphone begins searching for other vulnerable devices and sends a file containing the worm to them.

The virus does not destroy user data, but blocks authorized Bluetooth connections and consumes battery resources. It can spread very quickly. A massive case of infection with this virus occurred in 2005 at the World Athletics Championships in Helsinki. At the large stadium where the championship was held, Cabir literally set records for the speed of distribution. Fortunately, employees of the Finnish antivirus company F-Secure managed to resolve this situation. There was a special place at the stadium where phones were “cleansed” of the virus.

CommWarrior virus

In 2005, a more dangerous virus than Cabir appeared. They called him CommWarrior. This program terrorized smartphones of subscribers in 22 countries for quite a long time. CommWarrior attacked Symbian devices on S60 and spread via Bluetooth or MMS. The virus penetrated the handset and immediately began sending infected MMS to all contacts in the address book. CommWarrior turned out to be more harmful than Cabir, since it not only disabled the device, but also undermined the financial situation of users by sending unauthorized MMS messages.

Flexispy Spy Virus

In April of this year, Flexispy was discovered to be an insidious program being sold online for $50. This is a fully functional spy that establishes total control over the smartphone and begins to regularly send its owner all the information about calls made and SMS sent.

Cross-platform virus Cxover

This is the first mobile virus that can spread across different operating systems. When launched, it detects the OS, penetrates the computer and searches for available mobile devices through ActiveSync. The virus then copies itself to the found device. Once in the smartphone, the program tries to do the reverse procedure - copy itself to a personal computer. The virus can delete user files on a mobile device.

RedBrowser Trojan Virus

Kaspersky Lab announced that a virus that supports the JAVA platform has been detected. This is a so-called Trojan, called RedBrowser. The virus can be downloaded to the phone either from the Internet from a WAP site or via a Bluetooth connection. The Trojan disguises itself as a program that allows you to visit WAP sites without setting up a WAP connection. The authors of this program report that this opportunity is achieved by sending free SMS messages. In fact, the virus begins to send SMS to paid mobile services (for example, to the numbers of companies that sell games, ringtones or pictures for mobile phones). The cost of one such message can reach 70 rubles, and they are sent continuously. Thus, an insidious Trojan virus can simply ruin a subscriber in a few minutes. After a virus attack, the user’s account is reset to zero, and in the case of a credit payment system, it even goes into deep minus. Kaspersky Lab notes that the virus is targeted at subscribers of the largest Russian mobile operators: MTS, Beeline and MegaFon.

Webster Trojan Virus

The virus is distributed in the form of a file called pomoshnik.jar. This file is supposedly designed to expand the functionality of the phone. Users fall for this offer, launch the “assistant”, and the virus penetrates the phone. Like RedBrowser, Webster supports the JAVA platform. It is also very similar in functionality to RedBrowser.

2.2 Reasons for the spread of mobile viruses

Causes:

    software vulnerabilities;

    low level of “mobile” literacy;

    the attitude of mobile phone owners towards mobile viruses as a problem of the future;

    curiosity (what will happen if I run this file/game/program?);

    failure to comply with basic safety rules.

Ways a virus can enter a phone:

    from another phone via Bluetooth connection;

    via MMS message;

    from PC (connection via Bluetooth, USB, WiFi);

    via web or wap sites.

2.3 Symptoms of infection

Symptoms:

    The appearance - after copying and installing any files (usually “games”) - of all kinds of “glitches” and “bugs”. For example: the phone freezes for no reason, any applications do not launch, it is impossible to open the Received files folder.

    The appearance of unknown suspicious files and icons.

    The mobile phone spontaneously sends SMS and MMS, quickly emptying the owner’s account.

    Any phone functions are blocked.

Destructive actions of mobile viruses (one of the unwritten rules states that a virus, having gained control, can do everything in the system that a user can do!):

    mass mailing of SMS and MMS invisible to the user;

    unauthorized calls to premium numbers;

    rapid depletion of a subscriber's account (as a result of calls to paid numbers and mass mailing of SMS and MMS);

    destruction of user data (phone book, files, etc.);

    theft of confidential information (passwords, account numbers, etc.);

    blocking phone functions (SMS, games, camera, etc.) or the device as a whole;

    rapid battery discharge;

    when synchronizing the phone with a computer, a destructive code is sent to the PC;

    possibility of remote control of the device.

2.4 How to delete infected files

As a rule, it is not possible to delete infected files directly from a mobile phone (regular, not smart). To delete infected files, you need to connect your mobile phone to your PC and use some kind of file manager, for example, for Nokia phones - File Manager, which is part of Nokia PC Suite. After deleting the infected files, restart your mobile phone (turn it off and on again).

If deleting infected files does not help, you will have to reflash the phone by contacting a service center.

At the same time, solutions for protection against threats remain and continue to be actively developed - antiviruses, which today play a fairly prominent role among other mobile applications. The mobile antivirus industry can offer a range of software tools to protect your cell phones. You can recall both domestic developments (Kaspersky Anti-virus Mobile, Dr. Web) and foreign programs, in particular, from the companies F-Secure (F-Secure Mobile Anti-Virus), Symantec (Norton Smartphone Security).

CONCLUSION TO CHAPTER 2

Based on all of the above, we can conclude that insidious virus programs spread especially actively in crowded places: in the subway, in cinemas, at airports.

There are different types of “infections” for mobile phones. During the two years of existence of this “infection,” the handsets were attacked by several truly insidious computer programs, such as: the Cabir worm virus, the CommWarrior virus, the Flexispy spy virus, the cross-platform Cxover virus, the RedBrowser Trojan virus, and the Webster Trojan virus. .

There are various reasons for the spread of mobile viruses and symptoms of infection. If you find a virus on your phone, you should immediately use an antivirus program that was created specifically to eliminate viruses.

CONCLUSION

We conducted a survey to identify awareness of viruses for mobile devices.

Have you heard about mobile viruses?

Yes – 46, no – 4.

Do you know how a mobile virus penetrates a phone?

Yes – 35, no – 15.

Has your phone been infected with a virus?

Yes – 21, no – 29.

Are you familiar with antivirus programs for mobile phones?

Yes –36, no –14.

A sociological study showed that 8% of respondents had never heard of mobile viruses, 30% responded that they did not know how a mobile virus penetrates a phone. 58% responded that their phones were infected with phone viruses and 28% did not know what antivirus programs are.

Mobile viruses exist! This is no longer a myth, but a real threat! Until recently, it was believed that mobile viruses, if they were a threat, were only for advanced mobile phones; owners of ordinary mobile phones had nothing to fear. Alas, this is no longer true!.. And since... The share of regular phones is at least an order of magnitude greater than the share of smartphones, there is reason to think!

Since cross-platform mobile viruses have already been created, adherence to any one operating system does not guarantee protection against viruses. The originally existing line between mobile and computer viruses has been erased. Now these devices can mutually infect each other.

It took computer viruses more than twenty years to become widespread. Mobile viruses have traveled this path in just two years (obviously, mobile virus writers are actively using their experience in creating and distributing computer viruses). There are about 3 billion cellular subscribers in the world. Many people literally never part with their cell phones. Mobile phones store confidential information. It is not difficult to imagine the scale of the consequences in the event of an epidemic of mobile viruses.

How to deal with the problem of mobile viruses? There is no need to exaggerate it or panic. But you shouldn’t brush it aside, thinking that the problem is being artificially inflated by antivirus companies and sensation-hungry media.

LIST OF SOURCES AND REFERENCES

    All about mobile phones: Opportunities, choices, etiquette.

    We create a virus and an antivirus.

    https://ru.wikipedia.org/wiki - Wikipedia

    http://www.hackzona.ru – hacking territory

    http://www.mobi.ru – expert website for digital technology

    http://www.vipmks.ru – mobile corporate systems

    http://www.softmixer.com/2011/08/blog-post_8103.html - online magazine

    http:// www. mobiset. ru- mobile viruses and antiviruses

    http:// www. osp. ru- Mobile viruses|PC World

    http:// www. catamobile. org. ua- How viruses work on a cell phone

    http:// www. netvirus. net- Mobile antiviruses

    http:// www. antivirusall. ru- Mobile antivirus