Symbian worm Yxes: towards mobile botnets?

被引:0
|
作者
Apvrille, Axelle [1 ]
机构
[1] Fortinet Technol, EMEA AV Team, 120 Rue Albert Caquot, F-06410 Biot, France
关键词
D O I
10.1007/s11416-012-0163-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, a new Symbian malware named SymbOS/Yxes was detected and quickly hit the headlines as one of the first malware for Symbian OS 9 and above all as the foretaste of a mobile botnet. Yet, detailed analysis of the malware were still missing. This paper addresses this issue and details how the malware silently connects to the Internet, installs new mal ware or spreads to other victims. Each of these points are illustrated with commented assembly code taken from the malware or re-generated Symbian API calls. Besides those implementation aspects, the paper also provides a global overview of Yxes's behaviour. It explains how malicious remote servers participate in the configuration and propagation of the malware, including Yxes's similarities with a botnet. It also tries to shed light on some incomplete or misleading statements in prior press articles. Those statements are corrected, based on the reverse engineering evidence previously. Finally, the paper concludes on Yxes's importance and the lack of security on mobile phones. It also indicates several aspects future work should focus on such as communication decryption, tools to analyze embedded malware or cybercriminals motivations.
引用
收藏
页码:117 / 131
页数:15
相关论文
共 50 条
  • [21] Processing of Electrocardiogram File in Mobile Phones on Symbian Operating System
    Pashayeva, Yegana
    2012 IV INTERNATIONAL CONFERENCE PROBLEMS OF CYBERNETICS AND INFORMATICS (PCI), 2012,
  • [22] Teaching embedded programming through mobile games development in Symbian
    Edwards, Reuben
    Coulton, Paul
    INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 2007, 44 (04) : 307 - 318
  • [23] Towards Active Measurement for DNS Query Behavior of Botnets
    Ma, Xiaobo
    Li, Jianfeng
    Tao, Jing
    Guan, Xiaohong
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 845 - 849
  • [24] CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
    Chen, Wei
    Luo, Xiapu
    Yin, Chengyu
    Xiao, Bin
    Au, Man Ho
    Tang, Yajuan
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 270 - 285
  • [25] Towards an Intelligent Software Agent System as Defense Against Botnets
    Dembskey, Evan
    Biermann, Elmarie
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 298 - 306
  • [26] Bluetooth Worm Propagation in Mobile Networks
    Tiwari, Saumitra
    Tiwari, Vijay
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 235 - 239
  • [27] Worm propagation model in mobile network
    Chen, Zhide
    Wang, Meng
    Xu, Li
    Wu, Wei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1134 - 1144
  • [28] Cloud-based Mobile Botnets Using Multiple Push Servers
    Chen, Wei
    Yin, Chengyu
    Zhou, Shiwen
    Yan, Xiaoshuang
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 183 - 189
  • [29] An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets
    CHEN Wei
    GONG Peihua
    YU Le
    YANG Geng
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 427 - 434
  • [30] Detecting Mobile Botnets Through Machine Learning and System Calls Analysis
    da Costa, Victor G. T.
    Barbon Junior, Sylvio
    Miani, Rodrigo S.
    Rodrigues, Joel J. P. C.
    Zarpelao, Bruno B.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,