Mr Towns has now been employed as a iPhone application developer for Australian firm mogeneration.
Ikee was not malicious but paved the way for a more serious variant which targeted users of the online bank ING.
“It leaves a nasty taste that he has been rewarded like this, yet has not even expressed regret for his actions,”Graham Cluley of Security firm Sophos told BBC News.
‘Wild worm’
It was designed to exploit jail-broken phones, where a user has removed Apple’s protection mechanisms to allow the phone to run any software.
Estimates suggest there could be up to 25,000 jailbroken phones in
It specifically targeted those handsets with SSH (secure shell) installed, a program that enables other diveces to connect to the phone and modify the system and files.
The worm was able to infect those phones where the owners had not changed the default password after installing SSH.
It could be removed by changing the phone’s password and deleting some files.
After it was found circulating “in the wild”, a second worm was discovered. Mr Cluley said it was “based” on
The new worm redirects the bank’s customers to lookalike site with a log-in screen.It can also be used to remotely control the phone without the users permission.
Analysts said that it was designed with a “clear financial motive”
Mr Towns is the latest in a long line of programmers to find employment after a high-profile hack.
In 200,
He had previously pleaded guilty or being part of an organization that was thought to have caused millions of dollars worth of damage.
“We interviewed Ashley, assessed him with our iPhone developer test –which he passed with flying colours and we employed him today,” said a spokesperson for mogeneration.
No comments:
Post a Comment