Abstract
We present an analysis of the iKee.B (duh) Apple iPhone bot client, captured on November 25, 2009. The bot client was released throughout several countries in Europe, with the initial purpose of coordinating its infected iPhones via a Lithuanian botnet server. This report details the logic and function of iKee’s scripts, its configuration files, and its two binary executables, which we have reverse engineered to an approximation of their C source code implementation. The iKee bot is one of the latest offerings in smartphone malware, in this case targeting jailbroken iPhones. While its implementation is simple in comparison to the latest generation of PC-based malware, its implications demonstrate the potential extension of crimeware to this valuable new frontier of handheld consumer devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Javox.com: Secure your jailbroken iphone from ssh hacking with mobileterminal app (2009), http://jaxov.com/2009/11/secure-your-jailbroked-iphone-from-ssh-hacking-with-mobileterminal-app/
Danchev, D.: ihacked: jailbroken iphones compromised, $5 ransom demanded (2009), http://blogs.zdnet.com/security/?p4805
Ashford, W.: First ever iphone worm ikee unleashed by aussie hacker (2009), http://www.computerweekly.com/Articles/2009/11/09/238469/First-ever-iPhone-worm-Ikee-unleashed-by-Aussie-hacker.htm
McIntyre, S.: Meldingen door security office xs4all blog (2009), http://www.xs4all.nl/-veiligheid/security.php
Moore, D., Shannon, C., Claffy, K.: Code Red: A case study on the spread and victims of an Internet worm. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop (2002)
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The spread of the sapphire/slammer worm. Technical report, Cooperative Association for Internet Data Analysis (2003)
Shannon, C., Moore, D.: The Spread of the Witty Worm (2004), http://www.caida.org/analysis/security/witty/
Porras, P., Saidi, H., Yegneswaran, V.: A Multiperspective Analysis of the Storm Worm. SRI Technical Report (2007)
Porras, P., Saidi, H., Yegneswaran, V.: A foray into conficker’s logic and rendezvous points. In: Proceedings of LEET (2009)
Ferrie, P., Szor, P.: Cabirn fever. In: Proceedings of Virus Bulletin (2004)
F-Secure: F-Secure virus information pages. Commwarrior (2005), http://www.f-secure.com/v-descs/commwarrior.shtml
Gostev, A., Maselnnikov, D.: Mobile malware evolution: Part 3 (2009), http://www.viruslist.com/en/analysis?pubid=204792080
Hypponen, M.: Status of cell phone malware in 2007 (2007)
Cheng, Z.: Mobile malware: Threats and prevention. McAfee Technical Report (2007)
Bulygin, Y.: Epidemics of mobile worms. In: Proceedings of Malware (2007)
Fleizach, C., Liljenstam, M., Johansson, P., Voelker, G.M., Mehes, A.: Can you infect me now? Malware propagation in mobile phone networks. In: Proceedings of WORM (2007)
Hex-Rays.com: The ida pro home page (2009), http://www.hex-rays.com
Forge, S.: Desquirr distribution page (2009), http://desquirr.sourceforge.net/desquirr/
Ducklin, P.: Password recovery for the latest iphone worm (2009), http://www.-sophos.com/blogs/duck/g/2009/11/23/iphone-worm-password/
Leyden, J.: iphone worm hijacks ing customers (2009), http://www.theregister.co.uk/-2009/11/23/iphone_cybercrime_worm/
Danchev, D.: Os fingerprinting apple’s iphone 2.0 software - a ”trivial joke” (2009), http://blogs.zdnet.com/security/?p1603
Abbey, J.D.: Why should i jailbreak my iphone? (2009), http://appadvice.com/-appnn/2009/03/why-should-i-jailbreak-my-iphone/
Nelson, R.: Jailbroken stats: Recent survey suggests 8.43% of iphone users jailbreak (2009), http://www.iphonefreak.com/2009/08/jailbroken-stats-recent-survey-suggests-843-of-iphone-users-jailbreak.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Porras, P., Saïdi, H., Yegneswaran, V. (2010). An Analysis of the iKee.B iPhone Botnet. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)