Results 1 to 3 of 3

Thread: Trojan targets mobiles phones running Java (J2ME) applications

  1. #1
    Join Date
    May 2008
    Posts
    193

    Trojan targets mobiles phones running Java (J2ME) applications

    Overview -

    This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

    Aliases

    * Trojan-SMS.J2ME.RedBrowser.a

    Characteristics -

    The risk assessment of this threat has been updated to Low-Profiled as it represents a new Proof of Concept (POC) for premium-rate SMS fraud on a variety of mobile platforms.
    --

    J2ME/RedBrowser.a is a trojan horse program that pretends to access WAP web pages via SMS messages. In reality instead of retrieving WAP pages, it sends SMS messages to Premium Rate numbers thus costing the user more than intended.

    Symptoms -

    J2ME/RedBrowser.a arrives in a JAR file named “redbrowser.jar ”.

    Upon startup the following text(translated from Russian) is displayed:

    "Carefully read following description of RedBrowser program This program allows viewing WAP pages without GPRS connection.

    RedBrowser connects to SMS server of your operator (MTS, BEELINE, MEGAFON).

    Page is loaded by receiving encoded SMS. First 5Mb (650 SMS) of traffic are provided free of charge in test mode. ATTENTION!!! Program RedBrowser works ONLY on above mentioned cellular operators."

    J2ME/RedBrowser.A currently is known to run on the following phones:

    +
    Nokia 6681
    + Sony-Ericsson W800i
    + Blackberry 8700c




    Figure 1 - Logo displayed by Redbrowser.A on startup.


    The user will be continually prompted to allow the sending of the SMS messages.




    Figure 2 - The user is continually prompted to allow the SMS messages to be sent





    Figure 3 - Redbrowser.a claims to download WAP pages via SMS.


    SMS sending does not appear to function completely in the United States, we are currently assuming this is due to the numbers dialed being local to Russia.

    J2ME/RedBrowser.a appears to have been written using the MIDletPascal programming tool.

    The malware will not install on the P900 due to its use of a restricted API.

    Method of Infection -

    This malware requires that the user intentionally install it upon the device. As always, users should never install unknown or un-trusted software. This is especially true for illegal software, such as cracked applications—they are a favorite vector for malware infection.

    Removal -

    All Users:
    Use current engine and DAT files for detection. Delete any file which contains this detection.

    Source

  2. #2
    Join Date
    Dec 2007
    Posts
    493
    Will it infect my Sony Ericsson W550i also.

  3. #3
    Join Date
    Aug 2008
    Posts
    281
    Well this is something new to me i wasn't aware of the fact that java based phones can also get virus & trojen in them!
    I need to get updated with this!

Similar Threads

  1. How to make china phones supported with java applications
    By odnid00 in forum Portable Devices
    Replies: 2
    Last Post: 09-03-2012, 12:01 PM
  2. Download File Explorer for J2ME phones for Free!
    By Rudra.J in forum Portable Devices
    Replies: 20
    Last Post: 09-10-2011, 09:37 AM
  3. Download Bolt Web Browser for Mobile Phones [J2ME]
    By Bon-Z in forum Portable Devices
    Replies: 7
    Last Post: 02-08-2010, 02:14 PM
  4. J2ME Ticker from java
    By REDBULL in forum Software Development
    Replies: 3
    Last Post: 09-12-2009, 10:04 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,585,158.59256 seconds with 17 queries