Mobile devices, Planets and the Human Condition

Blackjacking - mobile device as a backdoor to your network.

, posted: 4-Sep-2006 19:02

The threat of an unknown assailant has grown considerably with
releasing the source code for their Blackberry Attack toolkit. (this is available here )

this toolkit enables anyone with sufficient knowledge to build malware into a simple utility, or worse into an attachment to an email message.

now most users these days are warned often and constantly about opening or following a link from an unknown source.

with the advent of mobile devices and units such as the blackberry, there is not that much caution regarding sensible web browsing, in a lot of cases your standard executive or office employee who is given a device such as a blackberry will not associate it as being the same as the computer, and even then,

a large number of the non-technical public (and many of the technical crowd) are still badly affected by spyware and malware on their home PC.

so the biggest risk to your corporate environment from an attempted Blackjacking attack will be via malicious code downloaded to the unit from a website.

the next and still very high risk is from utilities and games.

all it would take would be someone with malicious intent to create a utility or game that contains malware code within it.

then distribute the game, and wait for the individual units to let the author know they are ripe for the picking.

now, there are anti-virus solutions available out there, however I would be interested to know how they handle the following sorts of scenario:

  1.  neat little utility is created, or addictive little game with good replayability.
  2. utility or game is completely free of malware, with only a little piece of code that asks the users permission to check for an update, or perhaps compare their highscore to others, or their friends.
  3. utility then checks for "update" update process provides author with address of the blackberry, and the fact that one has been updated along with downloading the new "patch" which contains more functionality.
    1. the first piece of functionality would be that which the user would like
    2. the second is the nasty piece of code opening your network to the attacker.
  4. once this has been done, the attacker could pick and choose who and where they would attack, including small, next to undetectable probes to find the easiest or perhaps best targets.

More information

Other related posts:
iPhone Rates and Plans with Vodafone
Apple, Apple, Apple. whats going on Steve? don't like my signature?
The best web based iPhone app yet! Scenario Poker for the iPhone.

Add a comment

Please note: comments that are inappropriate or promotional in nature will be deleted. E-mail addresses are not displayed, but you must enter a valid e-mail address to confirm your comments.

Are you a registered Geekzone user? Login to have the fields below automatically filled in for you and to enable links in comments. If you have (or qualify to have) a Geekzone Blog then your comment will be automatically confirmed and placed in the moderation queue for the blog owner's approval.

Your name:

Your e-mail:

Your webpage:

inane's profile

New Zealand

I'm a professional Geek, and also in my own time, I am likely to write about all manner of things on this blog.
Of late I haven't updated this place much, but I need to do some revamping and dust off the cobwebs a bit. so thats what I'll do. going to aim for a minimum of three times a week updated here to begin, then perhaps head towards every day!

Who knows! 

but for now I hope you enjoy what you read, and that I aid the constant novelty and stimulus to your brain that the internet provides us all, in a way nothing else can!

I am likely to comment on everything here, but my current topics of choice are

*Mobile Devices
*general and specific ramblings
*Dvorak Keyboard

Mobile devices and more

Page copy protected against web site content infringement by Copyscape

^^ lol don't know what that is!

Recommended Reading

- Thought Powered Game Controller - Braingate - Technology to read your mind! - Bugatti Veyron top speed (Video) - Top Secret Classified Study - Colossal Squid Caught - How to Dump an HTC Apache ROM - how to dump an HTC Harrier Rom - Unlocking Apache Extended Rom part 1 - Unlocking Apache Extended Rom Part 2

My most active entries

How to Dump an HTC Apache ROM ...
(20-Aug-2006 17:38, 33064 views)
iGoogle? new look to googles ...
(2-May-2007 11:04, 30510 views)
How to easily obtain a list of...
(21-Feb-2007 11:35, 27212 views)
Gamo PT-80 Pistol....
(12-Jun-2007 22:10, 24438 views)
Velociraptor was a Turkey!?...
(24-Sep-2007 12:46, 24348 views)
Google Chrome; download and ch...
(3-Sep-2008 08:25, 22452 views)
Unlocking your Extended Rom PA...
(4-Jul-2006 09:29, 21997 views)
Guide to unlocking the Apache ...
(29-Jun-2006 12:24, 21410 views)
High powered rifles, no licenc...
(13-Oct-2008 20:24, 20622 views)
Pyramids at Giza vs. Pyramids ...
(28-Dec-2006 12:30, 18188 views)

You Tube !

Site Meter