BlackBerry and iPhone are easy spy targets

IPhone lovers and other smartphone users should take heed: A security researcher showed ways to spy on a BlackBerry user during a presentation, including listening to phone conversations, stealing contact lists, reading text messages, taking and viewing photos and figuring out the handset’s location via GPS.

And ironically, Sheran Gunasekera, head of research and development at ZenConsult, said the BlackBerry is one of the most secure smartphones available, in some ways better than the iPhone.

“There is no technical way of hacking a BlackBerry, it’s impossible,” said Gunasekera, during a presentation at the Hack In The Box security conference in Kuala Lumpur. “It’s just too secure for that. So we have to rely on social engineering.”

For hackers, social engineering is the art of tricking someone into loading spyware onto a device or finding some other way to install it, such as borrowing the device and downloading malware from the Internet or a MicroSD card, for example.

One way to entice a BlackBerry user to download spyware onto their smartphone is by offering a free application that appears to be a game or some other harmless software, but in fact carries a dangerous payload. Enticing slideshows are even easier to get users to accept, Gunasekera said.

“I will have the slideshow running on top and the spyware doing its nastiness on the bottom,” he said.

What kind of nastiness?

A small piece of software able to conceal itself by not appearing on the BlackBerry’s application menu, nor taking up much memory space nor using much processing power, can allow a hacker to do all kinds of things.

“People tend to put a lot of personal data on a BlackBerry,” he said, but it’s not just the data on the phone that’s at risk.

Spyware on a BlackBerry could intercept a phone call and let the hacker listen in, or even let the hacker listen to a meeting the victim is sitting in on. By silently answering the victim’s phone, then turning on the speakerphone, the spyware could allow the hacker to overhear the meeting. It could also forward incoming and outgoing text messages to the hacker, and even enable the hacker to write messages from the victim’s BlackBerry, or run up the victim’s phone bill by making international calls.

The hacker could also program the spyware to have the handset’s camera take pictures every 10 seconds, for example, to see find out the victim’s location.

One recent example shows a massive installation of spyware on BlackBerry phones in the United Arab Emirates.

Regional mobile phone service provider Etisalat last June told its 145,000 BlackBerry subscribers to download a software upgrade that turned out to be spyware. Once users downloaded the “upgrade,” it forwarded the phone’s e-mails to a central server, Gunasekera said. The ploy was discovered because the software drained BlackBerry batteries at an excessive rate, in as fast as 30 minutes after a full recharge.

Etisalat maintains the software was an upgrade.

BlackBerry manufacturer Research In Motion (RIM), however, took matters into its own hands and provided a fix to affected users.

“Independent sources have concluded that Etisalat’s “Registration” software application is not actually designed to improve performance of a BlackBerry Handheld, but rather to send received messages back to a central server,” RIM said on its Web site.

Gunasekera offered a range of advice to help people keep their BlackBerries secure, advice useful to most smartphone users.

“Don’t install random pieces of software,” he said, “and be sure of what you’re installing, and limit the amount of software on your BlackBerry.”

It’s also not a good idea to let anyone else use your smartphone, he said, but if you do hand over your phone, keep an eye on it. He also implored people to learn and set Default Application Permissions on their BlackBerries, a feature that increases safety. And always enable a device password. “This is the least you can do in case your device is lost or stolen,” he said.

He also suggested that RIM start regulating Apps made for BlackBerries.

“People complain about Apple and their application process for the App Store, but it’s good for security because you have people actually looking at the code,” he said. RIM needs to put third-party apps aimed at BlackBerries under the same scrutiny, he said.

A RIM security researcher sent to the Hack In The Box conference to view the presentation declined to comment, but said the company planned to issue a statement later in the day.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Related Tech News

Featured Tech Jobs

 

CDN in your inbox

CDN delivers a critical analysis of the competitive landscape detailing both the challenges and opportunities facing solution providers. CDN's email newsletter details the most important news and commentary from the channel.