ChannelLife New Zealand - Industry insider news for technology resellers
Story image

iWorm ikee: Sex and Drugs and Rick and Roll

Fri, 13th Nov 2009
FYI, this story is more than a year old

The iPhone, it seems, is under siege: a recent worm exploits a known (and previously exploited) vulnerability that affects the owners of ‘jailbroken’ phones on which OpenSSH has been installed. (Jailbreaking allows iPhone users to install and use unapproved applications.)

Of course, there's been an enormous amount of media coverage on this already (I've just returned from a conference trip at which I had no email access), and I don't care for "me too" blogs, but there's also been a certain element of mythmaking, so I'm going to concentrate on a few aspects of this (admittedly interesting) event that I don't think have received sufficient attention.

Jailbreaking is (irrespective of whether it's a good idea) enough to expose an iPhone to infection by this particular worm.

• As far as I can tell, every known variant spreads by scanning hardcoded IP ranges owned by Optus in Australia (for more, click here and here). That doesn't mean a comparable attack can't be carried out in any IP space, of course (an Intego blog does suggest a spread beyond Australia, but I haven't seen that corroborated elsewhere so far), especially as the source code was publicly available for a while and lots of people seem to be furiously searching for it. No doubt for entirely virtuous reasons. (Thanks, Graham.)

• Jailbreaking doesn't entail installing OpenSSH. You have to have chosen to install it subsequently. (Thanks, Roel.) That doesn't mean, though, that similar exploits can't be used with other applications.

• You also need to be using the default passwords for the root and mobile accounts: resetting those passwords blocks this particular infection. That doesn't fix everything, though. Passwords may be reset to default, notably by firmware upgrades.

So is this really harmless fun? The apparent creator of this mess seems to think so (for more, click here). That interview seems to me to argue a moral sensibility displaying an immaturity close to the sociopathic, but at least he seems to have attempted to give some information about removing the infection. Given his admitted carelessness in coding and failure to anticipate some of the effects of his malware, you might want to be careful about taking his advice. As I don't have an iPhone or a sample, I'm not currently able to verify its accuracy.

Apparently a number of people agree that it's harmless. Apart from some reports that refer to this "prank" (I'm reminded of Microsoft's attempts to minimise the importance of WM/Concept, the first major Word macro virus, by dubbing it Prank Macro), a poll conducted by Sophos apparently determined that 76% of respondents consider malware an acceptable way to raise security awareness. Well, I never heard that one before… Oh, wait a minute, isn't that the excuse used by countless script kiddies and hobbyist virus writers, not to mention BBC journalists in the market for buying botnets? Well, I'm sure malware will start having a beneficial effect on public security awareness any century now.

If you have a jailbroken iPhone, now would be a good time to make sure that you've reset the passwords for the root and mobile accounts. See here for details on how to do this.

David Harley BA CISSP FBCS CITPDirector of Malware IntelligenceESET

Update: there's more information on the Windows 7 exploit mentioned below in a Register article here.

Update 2: I keep seeing references to this as a virus or worm. However, the code I've seen does not contain any self-replicative functionality. It's not even a Trojan, as such.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X