washingtonpost.com  > Technology > Personal Tech > Wireless

Cell Phones Increasingly Attractive To Hackers

By Yuki Noguchi
Washington Post Staff Writer
Friday, November 26, 2004; Page A01

Early this month, several Web sites began offering software promising ringtones and screensavers for certain cell phones. But those who downloaded the software found that it turned every icon on their cell phones' screens into a skull-and-crossbones and disabled their phones, so they could no longer send or receive text messages or access contact lists or calendars.

Security experts named the malicious software "Skulls" and consider it an early warning of the damage hackers could do as they turn their malevolent talents to cell phones from computers.

The cell phone attack known as "Skulls" affected text messages and contact lists. It is one of five malicious software programs in circulation this year. (F-secure Corp)

_____Special Report_____
2004 Guide to Wireless Phone Phone Plans Compare rates and coverage for Washington, D.C., area.
When Cell Phones Go Bad
How to Make the Right Call on Service
_____Service Details_____
Cingular Wireless
Sprint PCS
Verizon Wireless
_____Direct Comparisons_____
'Real World' Costs
Fine Print
Messaging and Web Options
Reviewer's Notes

"Hackers are simply trying to put it out there that it can be done," said Vincent Weafer, senior director of security response for Symantec Corp., a security software firm. "The motivation is to say [cell phones] aren't as secure as you think."

Mobile phones are a tempting target because they have become a part of everyday life. In addition, consumers are buying more sophisticated "smart phones" with Internet connections that provide an easier pathway for cell phone infections. Few phones come equipped with protection against malicious software, though some companies are starting to install it. Most cell phone users aren't on guard for attacks like those that periodically bring down computers worldwide, and at this point there is little they can do to protect themselves.

"The impact is potentially larger on the phone because we're not savvy about that," said Victor Kouznetsov, senior vice president of mobile solutions at McAfee Inc., a security software firm. "Also, the profile of a mobile society is a cross-section of society who are potentially less [technically] savvy than computer users."

Skulls is one of five malicious software programs attacking cell phones this year, security experts and analysts said. The scale of such attacks is hard to quantify because the federally funded CERT Coordination Center at Carnegie Mellon University, which monitors viruses and other malicious software on the Internet, does not separately tally reports of such problems with cell phones.

But there are anecdotal reports. For instance, in Japan, cell phones have frequently been "spammed" with junk messages, some of which redirect phones to Web sites that cause the phones to crash.

Most basic phones can send and receive text messages, which makes them vulnerable to some attacks. And new ways of using cell phones encourage the spread of viruses. For instance, cell phones can transfer infections when users participate in a dating service that allows them to contact strangers in the same room via text messages or play online games.

The potential for trouble increases with smart phones. Like a computer, the newer phones can run e-mail programs and download PowerPoint slides, games and other applications that can come with malicious software attached. Such advanced phones make up 2 percent of cell phones in the United States, according to the Yankee Group research firm. But Yankee Group expects that share to increase to 17 percent by 2008.

Software that protects computers from viruses and other bad software has not been programmed for cell phones.

CONTINUED    1 2    Next >

© 2004 The Washington Post Company