Bluetooth-Worm

Classification

Category :

Malware

Type :

Bluetooth-Worm

Aliases :

Bluetooth-Worm

Summary

A Bluetooth-worm is a type of worm that spreads primarily over a Bluetooth network. A Bluetooth-worm is almost always designed to function on mobile devices, particularly handphones, which make more use of Bluetooth connectivity than computers.

Removal

If F-Secure's Mobile Security is installed on the mobile device, the following disinfection steps can be performed:

  • Activate the Anti-Virus
  • Scan the phone and remove any components of the malware
  • Reboot the phone to remove memory-resident components

Downloading F-Secure Mobile Security directly onto a phone

Mobile Security can be downloaded directly to the mobile device:

  • Open web browser on the phone
  • Go to https://f-secure.mobi
  • Select link "Download Mobile Security"
  • Download the file and select open after download
  • Install Mobile Security

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Due to the limitations of Bluetooth connectivity, a user must have their device's Bluetooth functionality switched on and set in discoverable mode to be reachable by a Bluetooth-worm; the user must also actively accept a transmission request from an infected device before the Bluetooth-Worm can successfully arrive on the new device.

A Bluetooth-worm may or may not include a malicious payload. Examples of malicious actions a Bluetooth-worm can perform are:

  • Sending SMS or MMS messages
  • Modifying files on the phone
  • 'Locking' the phone so that it is inaccessible
  • Damaging the phone's system files so that the device is completely unusable