<<<
Friday, October 15, 2010
>>>
 
Espionage Suite: Phone Creeper v0.95 Posted by Sean @ 11:27 GMT

XDA-Developers member Chet Striker recently tweeted about his mobile espionage suite called Phone Creeper.

Version 0.95 was released today.

Phone Creeper is a Windows Mobile application (also being developed for Android).

Phone Creeper v0.95

"This is a phone espionage suite. It can be silently installed by just inserting an [SD] card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely [controlled] by [SMS] text messages."

Silent installation, doesn't show up under installed programs, and allows for remote control.

Here are some of the commands:

  •  View sent call logs (even deleted)
  •  View received SMS logs (even deleted)
  •  Get contacts
  •  Get appointments
  •  Get tasks
  •  Get GPS location and Google Maps link

Sounds like a fully featured spy-tool, right?

So why does Striker develop Phone Creeper? After all, he doesn't sell it, and there's no money involved.

From his Ethical Statement:

"[The] main reason i've created this is just because I could and because it seemed challenging and different and fun. I don't actually have anybody to spy on, nor would I want to."

"I don't condone mal-intented use of my program, as I said before it's because I can and it's fun."

Okay, so, he's a guy that wants to develop some cool James Bond-like software. And Phone Creeper does boast an impressive set of features. But still, this could be used to do real harm in the wrong hands. Striker even acknowledges this in his ethical statement. His most recent post also includes his RemoveCreeper.zip.

We've added detection for Phone Creeper as a backdoor and our Mobile Security will block its installation.

Striker doesn't seem like a bad guy in our book, but a silently installing espionage suite should be detected by a security suite, the author's motives aren't as important as what the tool actually does.

But decide for yourself, read his statement and then leave us a comment.






<<< Mobile Security Review
|
Vote in the Computer Weekly IT Blog Awards 2010 >>>