SlideShare a Scribd company logo
1 of 16
Presentation on
Mobile Viruses & Worms
Sourav Verma
11EBKCS054
Contents:
Introduction
Definition of various terms
Motivation for Creating Virus
Characteristics of Viruses
Virus/Worm type overview
Attack Vector for mobile malware
Harm causes by Mobile Malware
Protection & Prevention Mechanisms
Case Study
Introduction
All of us are familiar with cell phones. The use of
cell phones to access internet and to share
executable files have increased. With the
number of functionalities, the amount of
personal data at risk is high. If mobile devices
are not handled properly, it may prove to be
fatal to our privacy. It’s not just PCs that are
vulnerable to virus attacks these days now. We
also have to protect our phone from mobile
virus & PDA(Personal Digital Assistants) too.
Definition of Various Terms
VIRUS: Virus Stands for “Vital Information
Resources Under Seize”. It’s a malicious piece of
code that attach itself to a host program to be
able to replicate & performs destructive actions.
A virus might rapidly infect every file on
individual computer or slowly infect documents
in the computer but it does not intentionally try
to spread itself from infected computer to other.
Worms: Worm is a program that is designed to
copy itself from one device to another. Worms
are insidious because they rely less(or not at all)
upon human behavior in order to spread
themselves from one computer to another.
TROJAN HORSES: Trojan Horse is a program that
pretends to be useful program but do some
unwanted actions. Trojan Horse does not require
a host and does not replicate. A special type is
backdoor Trojan, which does not do anything
destructive, but sets computer open for Remote
Control & Unauthorized Access.
Mobile Phone Virus: Mobile virus is an electronic
virus that targets mobile phones or wireless
devices like pda, Smartphone, tablets etc. It’s a
computer virus specifically adapted for the
cellular environment and designed to spread
from one vulnerable phone to another.
Motivation For Creating Virus
Curiosity
Challenge
To gain wider attention
Some new antivirus companies wants to
enter new market.
Characteristics of Virus
Size
Versatility
Propagation
Effectiveness
Functionality
Persistence
Virus/Worm Type Overview
Binary File Virus and Worms
Binary Stream Worm
Script File Virus or Worm
Macro Virus
Boot Virus
Multipartite Virus
Attack Vectors For Mobile Malware
Bluetooth
WiFi
SMS/MMS
Internet
Serial/USB
Example of Attack Vector
Harm causes by Mobile Malware
 Causing Financial Loss to the user
 Initiate unnecessary calls, send SMS or MMS
 Send private information to predefines phone/Server
 Spread via Bluetooth, causing drainage of battery
 Cause the device to work slowly
 Infect Files or Wipe out information
 Install bogus applications on the device
 Allow remote control of the device
 Cause system crash or failure
PROTECTION & Prevention Mechanisms
Keeping Device in non-discoverable Bluetooth
Mode
Installing an Antivirus or Intrusion Detection
System
Installing Firmware updates
Exercising cautions when installing or
downloading applications from untrusted
sources.
Filtering out Malware at service Provider
Case Study- CABIR
First Mobile Worm
Only as Proof-Of-Concept
Spread vector – Bluetooth
Infected file – caribe.sis
15 new variants exist
Case Study- COMWAR
Second landmark in mobile worms
Spread vector - Bluetooth and MMS
Large spread area due to MMS
Not as proof of concept – Intention to harm by
charging the mobile user
Multiple variants detected
Case Study- CARDTRAP
First cross-over mobile virus found
Can migrate from mobile to PC
Propagates as infected mobile application as
well as Windows worm
2 variants found – Both install with legitimate
applications
– Black Symbian
– Camcorder Pro
THANK YOU 

More Related Content

What's hot

Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virussmithz
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Code Red Worm
Code Red WormCode Red Worm
Code Red WormRaDe0N
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its preventiondavidmmc
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 

What's hot (20)

Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer virus
Computer virusComputer virus
Computer virus
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Assignment
AssignmentAssignment
Assignment
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 

Similar to Mobile virus & worms

Similar to Mobile virus & worms (20)

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
M
MM
M
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
How do I activate my McAfee product key?
How do I activate my McAfee product key?How do I activate my McAfee product key?
How do I activate my McAfee product key?
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Mobile virus & worms

  • 1. Presentation on Mobile Viruses & Worms Sourav Verma 11EBKCS054
  • 2. Contents: Introduction Definition of various terms Motivation for Creating Virus Characteristics of Viruses Virus/Worm type overview Attack Vector for mobile malware Harm causes by Mobile Malware Protection & Prevention Mechanisms Case Study
  • 3. Introduction All of us are familiar with cell phones. The use of cell phones to access internet and to share executable files have increased. With the number of functionalities, the amount of personal data at risk is high. If mobile devices are not handled properly, it may prove to be fatal to our privacy. It’s not just PCs that are vulnerable to virus attacks these days now. We also have to protect our phone from mobile virus & PDA(Personal Digital Assistants) too.
  • 4. Definition of Various Terms VIRUS: Virus Stands for “Vital Information Resources Under Seize”. It’s a malicious piece of code that attach itself to a host program to be able to replicate & performs destructive actions. A virus might rapidly infect every file on individual computer or slowly infect documents in the computer but it does not intentionally try to spread itself from infected computer to other. Worms: Worm is a program that is designed to copy itself from one device to another. Worms are insidious because they rely less(or not at all) upon human behavior in order to spread themselves from one computer to another.
  • 5. TROJAN HORSES: Trojan Horse is a program that pretends to be useful program but do some unwanted actions. Trojan Horse does not require a host and does not replicate. A special type is backdoor Trojan, which does not do anything destructive, but sets computer open for Remote Control & Unauthorized Access. Mobile Phone Virus: Mobile virus is an electronic virus that targets mobile phones or wireless devices like pda, Smartphone, tablets etc. It’s a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • 6. Motivation For Creating Virus Curiosity Challenge To gain wider attention Some new antivirus companies wants to enter new market.
  • 8. Virus/Worm Type Overview Binary File Virus and Worms Binary Stream Worm Script File Virus or Worm Macro Virus Boot Virus Multipartite Virus
  • 9. Attack Vectors For Mobile Malware Bluetooth WiFi SMS/MMS Internet Serial/USB
  • 11. Harm causes by Mobile Malware  Causing Financial Loss to the user  Initiate unnecessary calls, send SMS or MMS  Send private information to predefines phone/Server  Spread via Bluetooth, causing drainage of battery  Cause the device to work slowly  Infect Files or Wipe out information  Install bogus applications on the device  Allow remote control of the device  Cause system crash or failure
  • 12. PROTECTION & Prevention Mechanisms Keeping Device in non-discoverable Bluetooth Mode Installing an Antivirus or Intrusion Detection System Installing Firmware updates Exercising cautions when installing or downloading applications from untrusted sources. Filtering out Malware at service Provider
  • 13. Case Study- CABIR First Mobile Worm Only as Proof-Of-Concept Spread vector – Bluetooth Infected file – caribe.sis 15 new variants exist
  • 14. Case Study- COMWAR Second landmark in mobile worms Spread vector - Bluetooth and MMS Large spread area due to MMS Not as proof of concept – Intention to harm by charging the mobile user Multiple variants detected
  • 15. Case Study- CARDTRAP First cross-over mobile virus found Can migrate from mobile to PC Propagates as infected mobile application as well as Windows worm 2 variants found – Both install with legitimate applications – Black Symbian – Camcorder Pro