Fri, Oct 17, 2008 - Page 7 News List

Hackers might shift focus to cellphones

AP , SAN FRANCISCO

Some of the most vicious Internet predators are hackers who infect thousands of personal computers (PCs) with special viruses and lash the machines together into “botnets” to pump out spam or attack other computers.

Now security researchers say cellphones are the next likely conscripts into the automated armies.

The mobile phone as zombie computer is one possibility envisioned by security researchers from Georgia Tech in a report released on Wednesday.

The report identifies the growing power of cellphones to open a new avenue of attack for hackers. Of particular concern is that as cellphones get more computing power and better Internet connections, hackers can capitalize on vulnerabilities in mobile-phone operating systems or Web applications.

Botnets, or networks of infected or robot PCs, are the weapons of choice when it comes to spam and so-called “denial of service attacks,” in which computer servers are overwhelmed with Internet traffic to shut them down.

For example, botnets were used against Estonia’s government and financial Web sites in a devastating wave of attacks last year.

Botnets are so troubling because they have massive computing power and a seemingly endless supply of newly infected PCs to replace old ones that are wiped clean or taken offline. Millions of PCs have fallen victim. The owners typically never know.

The Georgia Tech researchers say that if cellphones become absorbed in botnets, new types of moneymaking scams could be born. For example, infected phones could be programmed to call pay-per-minute telephone numbers or to buy ringtones from companies set up by the criminals.

“The question is, can they do it effectively — make a lot of money without much risk?” said botnet expert Joe Stewart, director of malware research with SecureWorks. “And if they can, then they will do it.”

The Georgia Tech researchers say a big appeal of cellphones for hackers is that the devices are generally always on, they’re sending and receiving more data and they typically have poor security.

Antivirus software would suck up massive amounts of battery life.

“This is the perfect platform [for hackers],” said Patrick Traynor, an assistant professor of computer science at Georgia Tech and a contributor to its Emerging Cyber Threats Report.

However, he said researchers have very little hard evidence that hackers are already targeting cellphones.

Successfully attacks on cellphones requires that people do a lot of Internet browsing and downloading programs onto their phones, and that is just starting to happen.

Comments will be moderated. Keep comments relevant to the article. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned. Final decision will be at the discretion of the Taipei Times.

TOP top