
Attack Surface Analysis of BlackBerry Devices
• Along with matching .jad file:
http://www.badsite.com/game.jad
• Attacker starts worm by sending an email to a BlackBerry user of the form:
From:
Subject: Cool Game
Hey, check out this cool new game!
http://www.badsite.com/game.jad
• The user opens the .jad file, and is prompted to download and install the .cod file.
• The .cod file installs itself as a start-up process with no icon.
• The user thinks the download didn't work, and thinks nothing more of it.
• The next time the BlackBerry starts-up, the malicious code is executed.
• It enumerates the contact list, and forwards the email to everyone on the list.
• Those users open the email and the cycle continues.
Note that while this attack requires user interaction, it is not dissimilar to the level of interaction required
by successful PC based mass mailing worms such as W32.Beagle.A@mm
13
. Also if the .jad file in question
uses spoofed information as described in a previous section, it may encourage unwary users to run this
unsafe code.
Mitigation
You can set the following options to mitigate the attacks outlined above. See Mitigation Strategies for more
information.
Email Interception
23
IT Policy
Application Controls "Message Access" = Not Permitted
Device Firewall Block Incoming Messages > BlackBerry Internet Service = Ticked
Application Permissions User Data > Email = Deny
Other Device Settings
Commenti su questo manuale