74
Symbian Malware What It Is And How To Handle it Jarno Niemelä F-Secure Corporation

HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

Symbian MalwareWhat It Is And How To

Handle itJarno Niemelä

F-Secure Corporation

Page 2: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

220.2.2008

Introduction

Jarno Niemelä• Senior Anti-Virus Researcher

• Has been working at F-Secure Corporation from 2000

• Specializes in Mobile and PDA malware

Page 3: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

320.2.2008

Types of mobile threats

What we have seen so far• Viruses• Worms• Trojans• Single target spying applications and spyware

What we have not seen yet• Rootkits• Worm that does not need user interaction for spreading• Mass distributed spyware• Large scale profit oriented malware

Page 4: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

420.2.2008

Spreading vectors

1. Bluetooth2. MMS3. Web downloads4. Memory cards

Not yet:- Email- SMS- WLAN- P2P- IM

Page 5: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

520.2.2008

Viruses and worms

Spread autonomously• Over bluetooth OBEX file transfer protocol• As attachment in MMS message• All currently known cases require user interaction for spreading

Spread by relying user to distribute the infected files• By infecting memory card in the phone and infecting another phone

when a card is inserted • By searching and infecting any installation package in the phone,

and hoping that user will copy that game/software to another user

Spread by being installed by a trojan that has infected the device• Most Symbian trojans also install one or several copies of Cabir or

Commwarrior worms into the infected device

Page 6: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

620.2.2008

Trojans

Trojans don’t spread by themselves• User has to download and install one to get infected• Why on earth would anyone do that?

Trojan writers and hang around members upload trojans to popular file sharing sites

• The trojans are uploaded with fake names pretending to be applications, games, screensavers or pictures

• People download these and install thinking that they get free software

• Instead of the application they are looking for they get trojans, or sometimes the original application and trojan

Page 7: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

720.2.2008

Symbian Basics

•Basics of Symbian OS

•Symbian file System

•Symbian executables

•Symbian user Services

•Application installation and uninstallation

Page 8: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

820.2.2008

Basics Of Symbian OS

Calling Symbian devices as Smartphones is misleading

• These devices are general purpose computing devices that also function as phones

• One should think Symbian device as small computer

Symbian OS provides• File system• Multitasking operating system• Very complete system libraries and relational database• In other words all the same features as desktop OS

Page 9: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

920.2.2008

Symbian File System

Symbian file system is based on drive letters, directories and files

• C: FLASH RAM User data and user installed applications

• D: TEMP RAM Temporary file storage for applications

• E: MMC card Removable disk for pictures and applications

• Z: OS ROM Flash drive that contains most of the OS files

Page 10: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1020.2.2008

Symbian Directory Architecture

All drives have System directory• The directory is created automatically on a new media when

one is inserted• The System directory contains directory tree that contains

OS and application files. Very much the same as C:\windows

Most important directories• System\Apps Applications that are visible to user• System\RecogsRecognizer components• System\Install Data needed for uninstallation of user

installed applications• System\libs System and third party libraries

Page 11: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1120.2.2008

Symbian C: Drive

Page 12: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1220.2.2008

C:\System\install Directory

Page 13: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1320.2.2008

Symbian Executables

Symbian executables use unique identifiers• Each application has unique 32-bit UID

• Thus any executable files with same UID are assumed to be copies of same application

Symbian native executables come in three flavors• Foo.APP GUI applications

• End user applications, accessible from applications menu

• Each application must have own directory under System\apps in some drive

Page 14: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1420.2.2008

Symbian Executables

• Foo.EXE Command line applications and servers• Cannot be accessed by normal user. EXE files are either

services or utilities used by GUI applications

• Foo.MDL Recognizer components• Provide file association services for rest of the OS

• Start automatically at boot or from inserted memory card

• Must be located on System\recogs directory

Page 15: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1520.2.2008

Implementation Of User Services

All phone features are implemented using .APP GUI applications. Anything that is visible in phone menu or started trough buttons, is actually application under z:\System\apps\

• Z:\System\Apps\Menu\Menu.app• Phone main menu and application launching service

• Z:\System\Apps\AppInst\Appinst.app • Application installation

• Z:\System\Apps\AppMngr\AppMngr.app• Application uninstallation

Page 16: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1620.2.2008

Implementation Of User Services

• Z:\System\Apps\MMM\Mmm.app • Messaging application for sending and receiving SMS,MMS,BT

• Z:\System\apps\phonebook\Phonebook.app• Phonebook

• Z:\System\apps\btui\btui.app• Bluetooth control panel

If any of the user service applications is disabled, user cannot use that feature anymore

Page 17: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1720.2.2008

Symbian Z: Drive

Page 18: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1820.2.2008

SIS Files And Installing Symbian Applications

SIS files are the only currently known method for normal user to import executable code to a device

• Any malware that wants to run on the device has to get installed as a SIS file. Thus all known malware uses SIS files

A SIS file is an archive file with header parameters used by the system installer

• When a user opens a SIS file the installer is automatically started and starts installing the file

Page 19: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

1920.2.2008

User Installing Symbian Application

Stage 1: A SIS file arrives to the device• Bluetooth, IRDA, MMS, USB cable, MMC

Stage 2: The SIS file gets executed• Either automatically (bluetooth) or user clicks file

Stage 3: Symbian SIS installer parses file and installs• Copies files to locations specified in SIS

• Installs any embedded SIS file

• Starts installed application automatically (optional)

• Writes uninstall data

Page 20: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2020.2.2008

What A SIS File Can Do

When contents of a SIS file are installed the SIS file can affect following properties that interest malware

• Exact name and path where a file is installed

• Automatic execution of a file that is installed

• Displaying text to user during installation

• Embedding additional SIS files that are automatically installed after the main file is installed

Page 21: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2120.2.2008

Uninstalling Installed Applications

When a SIS file is installed, the system creates uninstall data

• The data is stored with identical name to original SIS into System\install of the drive where application is installed

The uninstall data is used by the Application Manager• When application manager is started it enumerates

System\install of each drive and uses the data provided for uninstall

Page 22: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2220.2.2008

Avoiding Uninstallation

Malware can prevent it’s uninstallation by• Breaking the Application Manager software

• Copying it’s files to another location and using from there

• Crashing the Application Manager by dropping corrupted uninstall SIS to system\install

• Deleting it’s own uninstall SIS from system\install

Page 23: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2320.2.2008

Symbian malware

Worms: Cabir,Commwarrior,Beselo,Mabir,Lasco• Spread over bluetooth and MMS

Viruses: Lasco, Commwarrior.C,Beselo• Spread by infecting other SIS installation files or MMC cards

that are inserted into the phone

Trojans: Skulls, Locknut, Fontal, MGDropper, etc.• Are hostile Symbian installation files

• Pretend to be game or other application

• Try to break phone functions

Page 24: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2420.2.2008

Cabir Bluetooth Worm

Cabir is a worm that tries to spread over bluetooth• Cabir spreads by creating a SIS file of itself and sending

that to any phones it finds over bluetooth connections

• When Cabir finds another phone, it tries to send itself as bluetooth file transfer

• User of the target phone has to accept the file transfer before Cabir can arrive to receiving phone

• When the Cabir has arrived the file is shown in inbox, and will not install automatically.

• User has to answer yes several times for the Cabir to install and start

Page 25: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2520.2.2008

Cabir Bluetooth Replication

Cabir spreads by using standard Bluetooth functionalities• No exploits or anything else suspicious is used• Cabir opens the bluetooth connection and searches devices with

same BT properties as the infected phone• When suitable target is found, Cabir opens bluetooth connection

and initiates file transfer

Most Cabir variants lock to single target• User receives unlimited number of file transfer request• If user answers no, he will get asked immediately again, if he

answers yes, he will get a moment of peace• Some later variants (H,I,J,K,L and AA) switch target after

bombarding one target for a while.

Page 26: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2620.2.2008

Cabir Infection

Page 27: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2720.2.2008

Cabir Installation

Cabir installation starts automatically when BT message is read• User doesn’t realize that he is installing something• User must answer yes to several questions, but most people don’t

even realize that they are installing something• And many who do, install Cabir anyway

• Either because they trust the sender, or are plain curious

The installation copies the Cabir files and start the worm• First Cabir copies it’s recognizer component to System\Recogs so

that it would start automatically on boot• The Cabir copies it’s own files away from the location where

system installer copied them. • Thus it can avoid removal by system uninstaller.

Page 28: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2820.2.2008

Files Copied By Cabir

Page 29: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

2920.2.2008

Commwarrior MMS And Bluetooth Worm

Installs and spreads over Bluetooth like Cabir• Attempts file transfer to several targets at the same time

Spreads as attachment in MMS multimedia messages• Commwarrior.A and B, use local address book for numbers

• Commwarrior.C also listens for incoming and outgoing traffic

MMS replication works much in the same manner as E-Mail• Receives sees social engineering text and attached file

• Text is either from users own messages, or from predefined list• 3DGame from me, Nokia RingtoneManager for all models

• Because message comes from known sender, people are trusting

Page 30: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3020.2.2008

Commwarrior Bluetooth Replication

Page 31: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3120.2.2008

Commwarrior MMS Message

Page 32: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3220.2.2008

SIS File Trojans

SIS file trojans are based on installing a file that breaks something in the System

• Either location where the file is installed causes problems

• Or the file itself is corrupted so that it causes problems

The key point is that SIS file trojans don’t need to have any executable code to cause problems

• Some trojans do have executables, but usually they cause some of the side effects of the malware, not the main damage

Page 33: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3320.2.2008

Skulls Trojans

Skulls trojans are based on installing file into location that causes problems

• In Symbian file in C: overrides with same path on E: or Z:

• For example a nonfunctional C:\System\Apps\Menu\Menu.App overrides Z: menu.app in Z: and the phone UI doesn’t work anymore at next boot

• Skulls variants and other similar trojans, contain a large number of applications that override system applications, trying to render the phone non-functional

• Most Skulls variants also drop Cabir or other worms on the device

Page 34: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3420.2.2008

Demo Skulls.A

Page 35: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3520.2.2008

How trojans harm the phone they infect

Most trojans try to render the phone useless• Break the application installs so they cannot be uninstalled

• SymbOS/Skulls family

• Break all application based phone services• SMS,MMS,Phonebook,Camera,WWW browser,etc

• SymbOS/Skulls family

• Break the phone so that it crashes and will not boot again• Phone is useless unless taken to service or reformatted

• All data is lost, and so is user confidence

• SymbOS/Doomboot family

Page 36: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3620.2.2008

More damage caused by the trojans

Cause monetary loss by sending expensive SMS messages• SymbOS/Mquito.A, Java/Redbrowser.A

Steal user private information and send it to first device foundover bluetooth

• SymbOS/Pbstealer family

Set random password to phone memory card, making it useless

• SymbOS/Cardblock.A

Delete user E-Mail, SMS messages and other critical information

• SymbOS/Cardblock.A

Page 37: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3720.2.2008

Mobile Spying tools

Mobile spying tools are applications that are installed into a smart phone and send information out from the phone

• Typical example would be an application that sends all received SMS message to a third party without permission from the user

Mobile spying tools are not illegal by itself• Their vendors claim that they must be used only for legal

purposes• While in reality most of the things that people use these tools

are illegal. At least in countries that have strong privacy protection laws

Page 38: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3820.2.2008

Who Would Use Spying Tools

Same people who use PC based spying tools• Oppressive spouses and other domestic abuse cases

• Managers spying on employees

• Industrial spies

Some vendors sell both PC and mobile spy tools• And give discounts if you buy both

• Spy both your wife’s PC and mobile phone

Page 39: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

3920.2.2008

Targeted and untargeted spying tools

Targeted spying tools are limited by the vendor• A spy must know the victim before obtaining spying tool

• Usually limiting is done by requiring the target devices IMEI code in order to be able to obtain the spying software

• So the spy needs to have access to the device twice

• This is done by spyware authors more as copy protection than concern on how their software is going to be used

Untargeted spyware can be installed into any device• The victim of the spying tool can be picked at random

• The spy needs to access the device only once

Page 40: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4020.2.2008

Information that can be stolen by spyware

SMS and MMS traffic information and content• Sender and receiver phone numbers and phone book names

• The content of the SMS or MMS message

E-Mail traffic information and content• Sender and receiver addresses

• Email text and attachments

SIM card information• Sends the SIM IMSI and phone number as soon as new SIM

is inserted

Page 41: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4120.2.2008

Information that can be stolen by spyware

Call information• Incoming or outgoing call and to what number• Time and duration of the call

Voice recording• Application can record all phone calls to memory card• Either the attacker needs to access the card to get

recordings, or they are sent over Bluetooth, MMS or HTTP

Call interception• Allows to tap in voice conversations by setting covert

conference call

Page 42: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4220.2.2008

Information that can be stolen by spyware

Remote listening• When specific number calls the phone will answer silently• The phone will not give any indication that call is open • Some spyware will even allow automatic conference calls

Physical location• Some tools are capable of using build in GPS in modern

phones, and send GPS coordinates• Those that don’t use GPS send GSM cell ID and signal info

User key presses• All user key presses can be logged and sent over SMS

Page 43: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4320.2.2008

Typical Spy Tool Operation

Installation• Spy applications are installed using the normal application

install like any other application• Although most of them fail to mention what the application is

Hiding• When the spy application has activated it will hide itself • The application will not be visible in application task list• It will not be visible in user interface or application manager• All log information of sent SMS messages or data

connections will be erased as soon as the spy messages have been sent

Page 44: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4420.2.2008

Typical Spy Tool Operation

Information gathering• Spy tool hooks all messaging APIs that it is interested of

• Or simply reads the content from application data files

Leaking user personal data back to attacker• Spy tool sends the information either in SMS messages or

connects to remote server and sends data over TCP/IP

• Some tools send data instantly after user event others use timed delay or certain number of messages in order to minimize number of transmissions

Page 45: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4520.2.2008

Known mobile spying tool vendors

Symbian software• Neo-Call

• Flexi spy

• GSM Spy phone

• Trusters stealth phone

• Spy-phone.org

Pre installed or hardware modified devices• SpySafetyPhone

• AccesswebIT

• EndoAcoustica

Page 46: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4620.2.2008

Neo-Call

Neo-Call spyware for Symbian phone that sends information directly to other phone

• When the spy orders software from Neo-Call he specifies the phone number to forward the information to

• The software is IMEI locked so spy must know his target

Neo-call offers wide range of features• SMS spying• Call list spying• Location spying• Remote listening• Key logging

Page 47: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases
Page 48: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4820.2.2008

Flexispy

Flexispy.A was invasive enough to be classified as trojanLater variants are classified as spywareFlexispy monitors•Voice call destinations•Voice call times dates and duration•SMS messaging and contentsSoftware itself is not illegal•Unauthorized installation of it is

Page 49: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

4920.2.2008

Flexispy web interface

Page 50: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5020.2.2008

Page 51: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5120.2.2008

Page 52: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5220.2.2008

Investigating Infected Phones

•Building a toolkit for investigating phones

•What to do when you get infected phone

•Quick check on infected phone

•Disinfecting infected phone

Page 53: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5320.2.2008

Tools For Investigating S60 phones

F-Secure Mobile Anti-Virus• http://mobile.f-secure.com

F-Secure disinfection tools• F-Commwarrior

• F-Cabir

• F-Skulls

• F-Locknut

Clean Symbian phone, preferably identical to the investigated one

Page 54: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5420.2.2008

Tools For Investigating S60 phones

MMC card reader for PCSymbian built in process list tool

• Press menu button for 5 seconds• Shows all GUI processes, Cabir is shown, Commwarrior not

Task spy• Shows all processes http://www.pushl.com/taskspy/

File manager programs• Fexplorer http://users.skynet.be/domi/

• Light and easy to use, but cannot make proper copy of full drive

• EFileManager http://www.psiloc.com/• Heavier, but makes a good copy of full drive

Page 55: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5520.2.2008

Create Investigation MMC card

Install following software to MMC using clean phone• Task Spy

• FExplorer

• E-File manager

• Anti-Virus Installation files

• F-Commwarrior

• F-Cabir

Make separate cards for F-Skulls and F-Locknut

Write protect the cards

Page 56: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5620.2.2008

Symbian Tools

Page 57: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5720.2.2008

What To Do If You Get Infected Phone?Calm down! The phone has probably been infected already for a while

• 10 Minutes more to figure what’s going on doesn’t make it worse• If possible, spend that 10 minutes away from crowds

Find out where the infection came from• Bluetooth? MMS? Or download from web?• Recover the original SIS file

Check Symbian own process listing• Kill all unknown processes. free$8, Caribe, Tee222

Does the phone send bluetooth requests?• Is the Bluetooth icon active?• Do people around the phone get file transfer requests

Page 58: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5820.2.2008

Quick Check On Infected Phone

Remove original MMC card from the phone

Check does the phone menu work• If menu works, check application installer and manager

Insert investigation MMC card• Use E-File Manager to make full copy of the C: drive to card

Check phone with F-Commwarrior• Commwarrior.C prevents install of Anti-Virus

Check phone with F-Cabir• F-Cabir kills any running Cabir processes

Install and Scan phone with Anti-Virus

Page 59: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

5920.2.2008

Disinfecting PhoneEasy Cases

Scan phone with Anti-Virus• Delete all detected files

Uninstall the malware SIS• Symbian uninstaller is quite good for finishing cleanup

Reboot the phone

Malware specific instructions are available from F-Secure web

• http://www.f-secure.com/v-descs/

Page 60: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6020.2.2008

Removing Trojans That Break Menu Or Application Manager

Use the MMC card that has F-Skulls• F-Skulls tool starts automatically on boot and frees critical

components

Insert the F-Skulls card into infected phone

If F-Skulls doesn’t work use F-Locknut

When the menu and application manager works again

• Finish cleanup as in easy cases

Page 61: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6120.2.2008

What To Do If Disinfection instructions Didn’t help

Take samples from the files copied to MMC and send to us for investigation.

• If you have original SIS file send that

• If not, contents of following directories• C:\system\install

• C:\system\apps

• C:\system\recogs

• C:\system\mail (if theres no confidential data)

Remove the phone battery and wait for instructions

Page 62: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6220.2.2008

Brute Force Disinfection

Delete everything but user data from the original MMC card

Use F-Explorer or E-File Manager• Investigate c:\system\recogs move all MDL files to backup directory

• Don’t delete the MMC files, just delete them

• Remove C:\System\apps\Appmngr to free application manager

• Reboot the phone

If F-Explorer or E-File manager don’t work• Trojan is disabling them, try renaming or other file managers

If nothing helps reformat the phone• Of course you loose all data

Page 63: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6320.2.2008

Phone Reformat (S60)

Soft format• Reinitializes file system, and removes everything that allow

phone to boor

• Enter code*#7370# and give security code (default 12345)

Hard Format (Three Finger Salute)• Shut off the phone

• Pres buttons “Answer call” + “*” + “3” and switch on the phone

• Some phones show text “formatting” others just ask for country settings after successful reformat

Page 64: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6420.2.2008

Detailed Investigation Of Malware Cases

•Analyzing original SIS file

•Analyzing phone memory card

•Analyzing backup copied from the phone

Page 65: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6520.2.2008

Tools For Investigating SIS files

UnmakeSIS• Unpacks a SIS file and has nice GUI browser for analyzing contents

• Cannot unpack all SIS files, but very good on what it can handle!

• http://www.atz-soft.com/unmakesis.html

• Site license available from [email protected], say hello from me ☺

UnSIS• Simple, but unpacks all SIS files, needs Symbian SDK

• http://www.symbian.com/developer/downloads/tools.html

Desktop Anti-Virus• F-Secure PC Anti-Virus has detection for all known cases

Page 66: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6620.2.2008

Analyzing Original SIS File

Scan the SIS file with PC Anti-Virus• Most Anti-Virus applications detect known cases

• If PC Anti-Virus doesn’t recognize it, please submit it as sample

Investigate SIS file contents with UnmakeSIS• UnmakeSIS shows you the SIS file contents, and what is

installed where

• Be careful if you unpack the SIS file, some Symbian malwares also drop Win32 malware

Page 67: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6720.2.2008

Investigating Infected MMC And Phone Backup

Do MMC card investigation of a safe computer• Some trojans contain Windows malware, you don’t want to

run that by accident!

Use Anti-Virus to check for any known casesCheck autostart directory system\recogs

• The MDL files there usually contain string reference to application that they are starting

• Cabir.AA\SYSTEM\SCREAMSECUREDATA\SPOOKYSECURITYMANAGER\SPOOKY.APP

• All applications that are started automatically are suspect, until you have verified them clean

Page 68: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6820.2.2008

Investigating Infected MMC And Phone Backup

Compare contents against clean phone and card• Get clean sample from identical phone, and compare files

• Any files that are extra in the infected phone are potentially malware

Check what SIS files have been installed from System\install

• The System\install contains record of what files are installed on the phone

• If you already know what files are infected, check from which SIS they came from

Page 69: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

6920.2.2008

Demo Investigating Files From Infected Phone

Page 70: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

7020.2.2008

What To Do With The Files You Found

Depends much on reasons why you started to investigate the phone

But if there is any reason to suspect that this is a new malware, send samples to Anti-Virus company

Page 71: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

7120.2.2008

Controlling Local Bluetooth Outbreak

Unfortunately there is no way of preventing bluetoothtransmissions in the air

So the best ways to control outbreak is to• Find out the infected phones, and disinfect them

• Advise people to have bluetooth in non-discoverable mode

• Advise people to install Anti-Virus

• Have disinfection tools easily available

• Have trained people to help users with disinfection

Page 72: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

7220.2.2008

Conclusions

Symbian malware is still nearly as bad threat as Windows malware is

• But for the past year, the situation has been getting worse

The greatest difficulty in handling Symbian malware is the Symbian devices themselves

• It’s totally different world compared to windows

• Users don’t have experience, and neither do have admins

The best way to combat these problems is to have trained people and tools ready when problem hits

Page 73: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

http://www.f-secure.com/weblog

Page 74: HUT symbian malware and spyware · Viruses and worms Spread autonomously • Over bluetooth OBEX file transfer protocol • As attachment in MMS message • All currently known cases

http://www.f-secure.com/weblog