Hacker Unleashes BlackBerry Spyware Source Code
Proof-of-concept demonstrates ease at which mobile spyware can be created to pilfer text messages and email, eavesdrop, and track victim's physical location via smartphone's GPS
February 8, 2010
A researcher at the ShmooCon hacker conference yesterday demonstrated how BlackBerry applications can be used to expose sensitive information without the use of exploits.
Tyler Shields, senior researcher for Veracode's Research Lab, also released proof-of-concept source code for a spyware app he created and demonstrated at the hacker confab in Washington, D.C., that forces the victim's BlackBerry to hand over its contacts and messages. The app also can grab text messages, listen in on the victim, as well as track his physical location via the phone's GPS.
(To view a images from ShmooCon, including Shields using his spyware, go here).
The spyware sits on the victim's smartphone, and an attacker can remotely use the app to dump the user's contact list, email inbox, and SMS message. It even keeps the attacker updated on new contacts the victim adds to his contact list. "This is a proof-of-concept to demonstrate how mobile spyware and applications for malicious behavior are trivial to write just by using the APIs of the mobile OS itself," Shields says.
Smartphones are expected to become the next big target as they get more functionality and applications, yet remain notoriously unprotected, with only 23 percent of its users deploying security on these devices. And smartphone vendors for the most part have been lax in how they vet applications written for their products, security experts say.
"Personal information is traveling from the PC to the smartphone. The same data they are attacking on the PC is now on a lower-security form factor where security is less mature," Shields says. "It makes sense that [attackers] will follow the money to that new device."
His spyware app, TXSBBSpy, could be plugged into an innocuous-looking video game or other application that a user would download. Then the bad guys could harvest contacts they could sell for spamming purposes, for instance, he says. Although Shields' spyware app is only a blueprint for writing a spyware app, writing one of these apps is simple, he says.
"If we try to tell ourselves that the bad guys don't already know how to do this, we're lying. This is trivial to create," he says. Shields has posted a video demo of his BlackBerry spyware tool.
Indeed, smartphone apps were a hot topic last week: A researcher at Black Hat DC demonstrated his own spyware app for iPhones, SpyPhone, which can harvest email addresses as well as information from the user's Safari searches and his or her keyboard cache. Nicolas Seriot, a software engineer and scientific collaborator at the Swiss University of Applied Sciences, says Apple iPhone's review process for apps doesn't stop these types of malicious apps from being downloaded to iPhone users.
Veracode's Shields says app stores such as BlackBerry's, where users download free or fee-based applications for their phones, can be misleading to users. "The app store makes the problem worse by giving customers a sense of security, so they don't necessarily screen for this 'trust' button," Shields says.
The problem is that mobile spyware is "trivial" to create, and the security model of most mobile platforms is inadequate because no one uses the security features and sandboxing methods that protect user data, he says.
Shields recommends that enterprises using BlackBerry Enterprise Server set policies that restrict users from downloading third-party applications or whitelist the ones that are vetted and acceptable.
Users can also configure their default app permissions so that when an app tries to access a user's email or contact list, the OS prompts the user for permission. Shields says to avoid setting an app to "trusted application status."
A RIM spokesperson noted in a statement responding to Shields' research that a spyware app can't install itself on a BlackBerry. "Applications containing spyware cannot be installed on a BlackBerry smartphone without the user's explicit consent, unless of course someone else gains physical possession of the user's device along with knowledge of any enabled password," the spokesperson said.
Users also "can review and confirm the list of installed apps on their device by looking in the 'Options' area at any time," the RIM spokesperson said.
As for app store owners like BlackBerry AppWorld, Apple iTunes, and Google Android Marketplace, Shields recommends the vendors check the security of all applications in these stores. That way, apps would undergo a rigorous vetting process before they hit the stores. "Some are [doing this], but I'm not sure to what degree," he says. "Regardless of what they are catching or not, they are not telling us what they are looking for."
Shields' TXSBBSpy spyware, meanwhile, isn't the first such tool for the BlackBerry. There's the controversial tool FlexiSPY, aimed at tracking employees, children, or cheating spouses, but considered by anti-malware companies as malicious code. And there has been at least one documented case of a major spyware infiltration on the BlackBerry: Users in the United Erab Emirates last year were sent a spyware-laden update to their BlackBerrys on the Etisalat network.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like