Home > 2011 > Personal Finance > Worse than Zombies: The Mobile Botnets are Coming

Worse than Zombies: The Mobile Botnets are Coming

Advertiser Disclosure Comments 0 Comments

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it.

A screen lock is no longer enough.

Dream Droid, a botnet-type of malware program, recently infected the Android Market. It got its name because the malware activated at night, affecting users while they were asleep. Originally it was thought that 21 apps were infected, but an independent security firm found an additional 30 apps. Google flipped its famous kill switch—a scary, but seemingly necessary, piece of code that accesses phones without users’ permission and deletes the offending software. About 260,000 Android users were hit. The phone’s IMEI identifier numbers were stolen, but no other personal user information was breached.

[Article: Worried About Online Security? Use a Temporary Credit Card Number]

Dream Droid and other mobile botnets such as Zeus Mobile are more than viruses or spyware. They take over a phone. In this case the software “rooted” the users’ phones, giving complete access to whoever was on the controlling end of the botnet. Most botnets go undetected. A hacker or botmaster simply gains access then does nothing. Often these networks of captured phones and computers are sold in underground Internet forums to spammers or hackers with even darker intentions—attacking the financial system, for example. They deploy software from the hijacked computers, effectively rerouting their steps.

It’s nasty stuff.

And aside from having your phone hijacked for evil, there are very real identity theft risks. Access to root on a phone means everything on that phone has been pealed open like a can of tuna.

What can you do about botnets, viruses and malware on your mobile phone? Not much, unfortunately, except to be very aware of the apps you’re downloading and why. There are also some security applications worth trying, such as Lookout Mobile Security, but how they’ve responded in a case like Dream Droid remains unseen.

[Free Tool: Obtain your Identity Risk Score from Credit.com]


This article originally appeared on Identity Theft 911 on June 14, 2011.


More from Identity Theft 911:

Comments on articles and responses to those comments are not provided or commissioned by a bank advertiser. Responses have not been reviewed, approved or otherwise endorsed by a bank advertiser. It is not a bank advertiser's responsibility to ensure all posts and/or questions are answered.

Please note that our comments are moderated, so it may take a little time before you see them on the page. Thanks for your patience.

Certain credit cards and other financial products mentioned in this and other articles on Credit.com News & Advice may also be offered through Credit.com product pages, and Credit.com will be compensated if our users apply for and ultimately sign up for any of these cards or products. However, this relationship does not result in any preferential editorial treatment.