SHARE
Facebook X Pinterest WhatsApp

What lessons can be learned from the iPhone worms?

Written By
thumbnail
Web Webster
Web Webster
Nov 24, 2009

“Ikee was created on November 4 by Ashley Towns, a programmer
from Wollongong, Australia. The worm propagates by scanning IP
ranges in the blocks used by the iPhone’s Australian carrier,
checking for iPhone OS fingerprints, and looking for a running SSH
daemon on any iPhones it finds. Because all iPhones ship from the
factory with the same default root password, “alpine”, the worm can
connect, copy itself over to the new device, install its signature
wallpaper, and repeat. Ikee also deactivates SSHd on the host phone
as part of its payload, but it does not change the root password.
Thus, restarting SSH makes the phone vulnerable to reinfection.

“It attracted considerably less public attention than Ikee, but
on November 2, a worm surfaced in the Netherlands using the exact
same attack vector: IP range scanning of the approved 3G carrier,
OS fingerprinting, and connecting via SSH using the default
password. The Dutch worm lacked the campy sensibility of Ikee;
rather than Rickrolling the iPhone’s wallpaper, it popped-up a
message telling the user that the iPhone was insecure and asking
€4.95 for instructions on how to secure it. That same day,
however, the author changed his mind and posted both an apology and
free instructions for securing the phone on the web site to which
the worm pointed its victims.”

Complete Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.