Malicious programs that can delete address books. Junk messages that flood a cellphone's inbox. Stealthy code that uses Bluetooth wireless technology to sneak onto handsets. Scared yet? Security experts...
STOCKHOLM, Sweden — Malicious programs that can delete address books. Junk messages that flood a cellphone’s inbox. Stealthy code that uses Bluetooth wireless technology to sneak onto handsets.
Scared yet? Security experts say plagues like these will target mobile phones, but others contend cellphone viruses are the tech equivalent of smallpox: To the best of anyone’s knowledge, they exist only in labs.
“We’ve had no reports of people actually seeing these viruses in their daily use,” said Graham Cluley, a senior technology consultant with London’s Sophos. “The only reports we’ve seen documented are antivirus researchers sending them to each other in their labs.”
Japanese phone company NTT DoCoMo already sells phones with built-in antivirus software from McAfee, and McAfee expects similar phones to be available in the United States and Europe in 2005.
Most Read Stories
- Rebound with redemption: Huskies come back to beat Utah behind the unlikeliest of heroes
- Kickoff time, TV info announced for 110th Apple Cup
- Parents, adult son believed dead in Sammamish murder-suicide
- Huskies won't repeat as Pac-12 champs, but their consolation prize? The game of the year
- Anthony Bourdain brought 'Parts Unknown' to Seattle — here's where he ate
But worried chatters should know that security experts this year found only five viruses that target mobile phones, and all of them were created and contained within labs, Cluley said.
Despite names like “Cabir” and “Skulls,” the cellphone viruses created in the labs aren’t as lethal as viruses that have attacked PCs.
For Skulls to work, it had to be downloaded and activated. After that, it rendered a user’s programs inoperable and replaced the icons with skulls.
Access via Bluetooth?
Earlier this year, Russian antivirus company Kaspersky said Cabir could affect Bluetooth-enabled phones that run on the Symbian operating system. According to the company, the virus could easily send itself as a file from its host phone to others, provided their Bluetooth reception was on.
Like Skulls, and unlike most PC viruses, Cabir has to be installed by the phone’s user before it does anything. When it’s installed, it creates several files on the phone and sends itself to other phones via Bluetooth. Antivirus company TrendMicro ranks it as having low damage potential and says it can be removed fairly easily.
Although the virus threat to cellphones is, for now, purely academic, it doesn’t take much to scare mobile phone users.
In Lebanon this year, an e-mail that spread rapidly warned of a virus that could appear on a cellphone through a phone call.
It read: “If you receive a phone call and your phone displays ‘UNAVAILABLE’ on the screen (for most of digital mobile phones with a function to display incoming call telephone number), don’t answer the call. End the call immediately!!! Because if you answer the call, your phone will be infected by this virus.”
Mikko Hypponen, director of Finland’s F-Secure, said viruses can’t spread that way.
Mobile phones could eventually be susceptible to viruses because they use operating systems that turn them into minicomputers, virus watchers say.
“You look at the phones that run Microsoft applications, like Excel. These can be e-mailed from a computer to a phone or a PDA [personal digital assistant] and that opens the risk to a virus on the phone,” said Brian Petersen, managing director of Copenhagen, Denmark-based Virus112.
The organization, which monitors computer viruses worldwide, earlier this year added threats to mobile phones to the list of what it tracks.
Other threats come from Bluetooth, which lets people connect their phones and send messages, sync with programs like Outlook and read e-mail. The technology is handy for those who want to use wireless headsets with their phones or send data from a phone to Bluetooth-enabled printers. Wireless keyboards and computer mice also employ it.
In the past, people have used Bluetooth to send messages to unsuspecting people just yards away, a practice known as bluejacking.
“If you don’t know about bluejacking, these messages can be quite a shock,” Cluley said. “Unexpected messages on your mobile may lead you to believe you are the victim of a new mobile phone virus, or receiving cellphone spam.”
Hypponen says virus writers could try to exploit cellphone users’ unfamiliarity with their device.
“Once it gets hit by something malicious, that virus could use the phone to send messages or make toll calls while you’re sleeping,” he said.
But no virus yet has actually done that.