Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Four new Trojans on the loose

Three aimed at mobiles.

Article comments

Four new Trojans are on the loose, three aimed at mobile phones and a fourth at PCs, anti-virus companies have warned.

The mobile phone worms are disguised as legitimate applications and spread via Bluetooth or multimedia messages and affect phones running Symbian. The computer worm spreads via e-mail and purports to offer pornography.

The phone worms - Bootton.E, Pbstealer.D and Sendtool.A - have a low infection rate at the moment. The first was spotted last week by F-Secure and Symantec and is perhaps the most potentially crippling of the three to those infected. It restarts the mobile but also releases corrupted components that cause a reboot to fail, leaving the device unusable.

Pbstealer.D sends an infected user's contact list, notepad and calendar to-do list to other nearby users via Bluetooth. The third sends malicious programs such as the Pbstealer Trojan to other devices via Bluetooth.

Fortunately, the worms are unlikely to spread very far. "They don't spread quickly because they're not purely autonomous," said Ollie Whitehause, a researcher with Symantec. Unlike worms on computers, the Trojan horses hitting cell phones spread as attachments that require users to download them.

The PC worm, Nyxem, however, is spreading rapidly and carries a potentially destructive set of instructions. Also nicknamed the Kama Sutra worm, it is programmed to overwrite all of the files on computers it infects on 3 February, said Mikko Hypponen, chief research officer at F-Secure Corp.

F-Secure researchers found the worm truncates files to 20 bytes and causes an error message when one is opened, he said. "We are expecting to see problems in two weeks' time," Hypponen said.

The worm appears to be programmed to overwrite all files on the third day of every month, Hypponen said. So far, there's no indication where Nyxem originated.

While most anti-virus vendors have issued updates for their software, Nyxem is spreading quickly - possibly because it is taking advantage of computers that have already had their anti-virus software disabled by some other virus such as Bagle.

The worm harvests e-mail addresses and then sends itself out again. The e-mail subject line may contain text that says "Miss Lebanon 2006" or "School girl fantasies gone bad," according to Sophos.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *