[Infowarrior] - BlackBerry Spyware Wasn’t Ready for Prime Time
Richard Forno
rforno at infowarrior.org
Wed Jul 22 01:16:16 UTC 2009
Researcher: BlackBerry Spyware Wasn’t Ready for Prime Time
• By Kim Zetter
• July 21, 2009 |
• 2:47 pm |
http://www.wired.com/threatlevel/2009/07/blackberry-spyware/
A BlackBerry software upgrade in the Middle East that turned out to be
an e-mail interception program was likely a buggy beta version of a
U.S.-made surveillance product, according to an analyst who dissected
the malicious code.
Sheran Gunasekera, who works as a security consultant in Asia,
released a white paper examining the spyware. (.pdf) Gunasekera said
the software had no protective measures to obfuscate it, making it
easy to decompile and examine — an unusual flaw for a program designed
for surreptitious interception.
What’s more, command messages sent to the BlackBerry to initiate and
halt interception can be transmitted to the device through e-mail or
BlackBerry’s proprietary PIN messaging system. But the PIN messages
are visible on the handheld’s screen for a fraction of a second when
they arrive and a copy of commands sent via e-mail appear in the
user’s inbox, which would conceivably alert an observant user to
suspicious activity. Gunasekera says the e-mail command function is
turned off by default, apparently because of this glitch.
The spyware came to light when Etisalat, a phone and internet service
provider in the United Arab Emirates, pushed out a message to its more
than 100,000 UAE BlackBerry subscribers on July 8, notifying them that
they needed to install a “performance-enhancement patch” to their
devices. Users complained that after installing the patch, the
performance of their device degraded and the battery drained.
Another researcher named Nigel Gourlay was the first to examine the
code and report that it was spyware, designed to intercept a user’s e-
mail messages. The program appeared to be written by a U.S.-based
company named SS8, which markets surveillance tools to law-enforcement
and intelligence agencies. The company hasn’t responded to repeated
inquiries from Threat Level.
Etisalat has not responded directly to criticism that it abused the
trust of customers by lying to them about the nature of the program.
Lawful interception in the United States is generally done at the ISP
level, not at the client level, although the FBI is allowed to install
spyware on an individual suspect’s computing device after obtaining a
warrant.
Research-in-Motion, which makes the BlackBerry, issued a statement
saying that it did not authorize the upgrade and “was not involved in
any way in the testing, promotion or distribution of this software
application.”
The company has issued a free tool to help BlackBerry users remove the
spyware from their phones.
Gunasekera said the SS8 spyware is designed to check whether it’s
visible in the BlackBerry application folder every time the handheld
is rebooted. If it is, it hides itself.
The spyware has limited functionality in its present form, because it
intercepts only outgoing e-mail messages sent by the user, not
incoming ones. It also doesn’t intercept instant messages, BlackBerry
PIN messages, phone calls, SMS messages or Bluetooth, wireless or GPS
data. Nor does it have the ability to be silently updated with a newer
version of the program.
The performance degradation and battery drain were caused in part
because the program regularly checked every message folder for new
messages, draining the processing power.
Gunasekera says now that the source code has been released, it can be
easily modified by anyone and used to intercept messages from
unsuspecting BlackBerry users who are tricked into installing the
program.
“[T]here may be possibilities that other, less ethical groups, use
this software to aid them in rapidly developing and deploying improved
versions of the spyware,” he writes on his blog.
Gunasekera has provided a tool on his site to help users search their
phones for this or other spyware. He has included source code for the
tool, but Threat Level recommends consumers use the official tool
provided by Research-in-Motion.
More information about the Infowarrior
mailing list