Ikee author develops iPhone apps; Apple sees no need for security

2009-12-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Job offer for iPhone worm author; Apple doesn't see need for security apps.


The author of the first worm for Apple’s iPhone has been offered a job with Australain iPhone application developer Mogeneration. 21-year-old Ashley Towns claims to have written the Ikee worm – which infects jailbroken iPhones – for purely altruistic reasons, in order to raise awareness of the dangers of using jailbroken iPhones.

When Towns announced his job offer via Twitter, one could almost hear the IT security community collectively sighing and shaking its head in disbelief as the irresponsible actions of this misguided and unrepentant young man were rewarded. Indeed, proof of the irresponsibility of Towns’ actions came when, just two weeks after the release of Ikee, the malicious ‘Duh’ worm appeared – based on Towns’ creation.

Despite Towns’ creation having started the ball rolling with iPhone malware, no anti-virus protection has yet been made available for the device. Apple tightly controls the applications that run on its iPhone devices and the company’s approval and collaboration would be required in order for security applications to be developed for the device. However, since both Ikee and Duh target jailbroken iPhones – and no malware has yet appeared for unmodified devices – Apple has not felt the need to enter into discussion with any anti-malware developers.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

VB2019 paper: DNS on fire

Cisco Talos has identified malicious actors that have been targeting the DNS protocol successfully for the past several years. In this paper, researchers Warren Mercer & Paul Rascagnères present two of the threat actors they have been tracking.

Dexofuzzy: Android malware similarity clustering method using opcode sequence

This paper proposes the use of the ‘Dalvik EXecutable Opcode Fuzzy’ (‘Dexofuzzy’) hash to find similar malware variants without the need for an analyst to have systematic or mathematical knowledge.

VB2019 paper: We need to talk – opening a discussion about ethics in infosec

Several professionals defend the notion that technology and ethics have nothing to do with each other. This paper presents various schools of thought pertaining to the philosophy of justice, and explores how they could help us solve some of the…

VB2019 paper: Inside Magecart: the history behind the covert card-skimming assault on the e-Commerce industry

Magecart is an umbrella term given to at least 12 cybercrime groups that are placing digital credit card skimmers on compromised e-commerce sites at an unprecedented rate and with frightening success. This paper presents a timeline of the Magecart…

VB2019 paper: Exploring Emotet, an elaborate everyday enigma

Since its appearance more than five years ago, the Emotet trojan has been – and remains – the most notorious and costly active malware. This paper discusses the reverse engineering of its components, as well as the capabilities and features of…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.