Symbian worm Yxes: towards mobile botnets?

被引:0
|
作者
Apvrille, Axelle [1 ]
机构
[1] Fortinet Technol, EMEA AV Team, 120 Rue Albert Caquot, F-06410 Biot, France
关键词
D O I
10.1007/s11416-012-0163-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, a new Symbian malware named SymbOS/Yxes was detected and quickly hit the headlines as one of the first malware for Symbian OS 9 and above all as the foretaste of a mobile botnet. Yet, detailed analysis of the malware were still missing. This paper addresses this issue and details how the malware silently connects to the Internet, installs new mal ware or spreads to other victims. Each of these points are illustrated with commented assembly code taken from the malware or re-generated Symbian API calls. Besides those implementation aspects, the paper also provides a global overview of Yxes's behaviour. It explains how malicious remote servers participate in the configuration and propagation of the malware, including Yxes's similarities with a botnet. It also tries to shed light on some incomplete or misleading statements in prior press articles. Those statements are corrected, based on the reverse engineering evidence previously. Finally, the paper concludes on Yxes's importance and the lack of security on mobile phones. It also indicates several aspects future work should focus on such as communication decryption, tools to analyze embedded malware or cybercriminals motivations.
引用
收藏
页码:117 / 131
页数:15
相关论文
共 50 条
  • [1] Symbian worm Yxes: towards mobile botnets?
    Axelle Apvrille
    Journal in Computer Virology, 2012, 8 (4): : 117 - 131
  • [2] Mobile Botnets Taxonomy and Challenges
    Malatras, Apostolos
    Freyssinet, Eric
    Beslay, Laurent
    2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 149 - 152
  • [3] From Botnets to MobiBots: A Novel Malicious Communication Paradigm for Mobile Botnets
    Mtibaa, Abderrahmen
    Harras, Khaled A.
    Alnuweiri, Hussein
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 61 - 67
  • [4] Security of symbian based mobile devices
    Department of Business Administration, Media, and Technology, Arcada Polytechnic, Helsinki, Finland
    不详
    Advances in Enterprise Inf. Technology Security, 1600, (31-74):
  • [5] MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services
    Chen, Wei
    Luo, Xiapu
    Yin, Chengyu
    Xiao, Bin
    Au, Man Ho
    Tang, Yajuan
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 20 - 39
  • [6] Creation of the importance scanning worm using information collected by Botnets
    Choi, Yoon-Ho
    Liu, Peng
    Seo, Seung-Woo
    COMPUTER COMMUNICATIONS, 2010, 33 (06) : 676 - 688
  • [7] Portfolio optimization of computer and mobile botnets
    Qi Liao
    Zhen Li
    International Journal of Information Security, 2014, 13 : 1 - 14
  • [8] Portfolio optimization of computer and mobile botnets
    Liao, Qi
    Li, Zhen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 1 - 14
  • [9] How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1501 - 1509
  • [10] Towards Next-Generation Botnets
    Hund, Ralf
    Hamann, Matthias
    Holz, Thorsten
    EC2ND 2008: FOURTH ANNUAL EUROPEAN CONFERENCE ON COMPUTER NETWORK DEFENSE, PROCEEDINGS, 2008, : 33 - 40