First Trojan To Target WindowsCE PDAs Emerges - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications

First Trojan To Target WindowsCE PDAs Emerges

The malicious code will let an attacker gain control of the handheld device.

The first backdoor Trojan horse designed to attack Pocket PC PDAs running the WindowsCE operating system has been discovered, several antivirus companies said on Thursday. The Trojan was named Backdoor.Bardor.A by antivirus firm Symantec and Backdoor.WinCE.Brador.a by antivirus firm Kasperky Labs. Once installed on a Pocket PC device, it allows an attacker to gain control over the device once it is restarted and connected to the Internet.

According to Symantec, an infected handheld device will transmit its IP address through a backdoor, or security hole, over the Internet to the attacker. It will then open a communications channel on port 44299 and await further instructions from the attacker.

Both Symantec and Kaspersky Labs say the backdoor works with handhelds built with the widely used ARM CPU.

Symantec has classified the threat posed by the Trojan as a 1, the lowest ranking on its scale of 1 to 5.

Both Symantec and Kaspersky Labs say they have updated their antivirus signatures to protect customers against this new threat.

Oliver Friedrichs, senior manager of Symantec Security Response, says the Trojan was submitted to Symantec for analysis from one of its virus sample exchange networks. He says the Trojan hasn't been spotted on the Internet yet.

As with all Trojan horses, this one doesn't spread on its own, so PDA users need to be enticed to download the malicious application or open an E-mail attachment that contains it. Says Friedrichs, "Users shouldn't open or execute files from unknown sources."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Get Your Enterprise Ready for 5G
Mary E. Shacklett, Mary E. Shacklett,  1/14/2020
Commentary
Modern App Dev: An Enterprise Guide
Cathleen Gagne, Managing Editor, InformationWeek,  1/5/2020
Slideshows
9 Ways to Improve IT and Operational Efficiencies in 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/2/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll