Researcher to present Windows Phone 8 malware at MalCon
- 13 November, 2012 20:26
A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi, India, on Nov. 24.
According to a brief description of the presentation on the MalCon website, it will show approaches and techniques for infecting Windows Phone 8 devices and will demonstrate how the prototype malware can steal contacts, upload pictures, access text messages and more.
The malware's author is Shantanu Gawde, a high school student and security researcher, who last year at MalCon presented a proof-of-concept malware program capable of interacting with Xbox Kinect devices.
Gawde is a member of the National Security Database (NSD), an accreditation program for information security experts run by a nonprofit organization called the Information Sharing and Analysis Center (ISAC) with support from the government of India.
The Windows Phone 8 malware prototype was built for educational purposes and to raise awareness about how malware authors can target the platform, Gawde said Tuesday via email. "The app will be shared with antivirus vendors and Microsoft after the conference so as to enable mitigation of such threats."
"The malware uses legitimate WP8 functionality without resorting to other methods such as 'homebrew apps' and interop capabilities," Gawde said. "The idea behind the app was to code it in such a way that it would be accepted into the marketplace [Windows Phone Store], whilst having hidden functionality."
Gawde declined to reveal other technical details about the malware ahead of his presentation at MalCon.
ISAC researchers are analyzing possible methods that attackers could use to distribute Windows Phone 8 malware apps in enterprise environments.
"We are currently researching the impact on security of deploying and updating apps in the enterprise through various MDM [mobile device management] products," Rajshekhar Murthy, director of the National Security Database program and founder of the MalCon conference, said Tuesday via email. "There are possible chances that hackers can still compromise private enterprise app stores and cause significant damage."
"We would like to further add that based on our malware research internally, we find that Windows Phone 8 is way superior and better than Android in all aspects of security," Murthy said.
"Microsoft is aware of the upcoming presentation but further details have not been shared with us," Dave Forstrom, director in the Trustworthy Computing Group at Microsoft, said Tuesday via email. "As always, we will investigate any issues disclosed in the talk, and will take appropriate action to help protect our customers."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.