You would have to figure out how the mobile partner itself responds to the text messages, or you could do a two way deployment attack, one part delivers the virus and two is that the text message is a trigger. Or Worse, text messages are just files, probably with an extension and a structure to ID them as such, if you could push a virus/Worm that can morph with the current text message extension then it can be sent as a text message and then on reaching the mobile partner, it can execute using the rights that the mobile partner uses since it will have reached its destination.
As far as Linux is concerned, There are Linux mobile partners and i also realized that Linux can send and receive text messages via Bluetooth and via modem, it just requires one to have the GUI component installed since modem manager can actually send and receive text messages and if your using a modern distribution of Linux then you have this running. On Sun, Aug 18, 2013 at 7:07 PM, Benjamin Tayehanpour < [email protected]> wrote: > The vulnerability isn't in the modem hardware itself, it's in that > piece-of-crap software bundled with it. Linux users should be > completely unaffected by this bug, as should any Windows user who > didn't install (or at least aren't using) the completely unnecessary > dial-up software. From *at least* Windows XP onwards, it's perfectly > possible to add a dial-up connection using Windows's regular > mechanisms for such things, rendering the bundled software a complete > waste of resources. Having unnecessary code (especially closed, > non-peer-reviewed code) running is always a potential security risk. > > On 18 August 2013 08:15, roy mukasa <[email protected]> wrote: > > Vulnerability in USB modems allows hacker to access miliions of computers > > remotely. > > > > Read more about it here > > > > Regards > > > > -- > > Creativity is intelligence having fun... > > > > _______________________________________________ > > The Uganda Linux User Group: http://linux.or.ug > > > > Send messages to this mailing list by addressing e-mails to: > [email protected] > > Mailing list archives: http://www.mail-archive.com/[email protected]/ > > Mailing list settings: http://kym.net/mailman/listinfo/lug > > To unsubscribe: http://kym.net/mailman/options/lug > > > > The Uganda LUG mailing list is generously hosted by INFOCOM: > > http://www.infocom.co.ug/ > > > > The above comments and data are owned by whoever posted them (including > > attachments if any). The mailing list host is not responsible for them in > > any way. > _______________________________________________ > The Uganda Linux User Group: http://linux.or.ug > > Send messages to this mailing list by addressing e-mails to: > [email protected] > Mailing list archives: http://www.mail-archive.com/[email protected]/ > Mailing list settings: http://kym.net/mailman/listinfo/lug > To unsubscribe: http://kym.net/mailman/options/lug > > The Uganda LUG mailing list is generously hosted by INFOCOM: > http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The mailing list host is not responsible for them in > any way. >
_______________________________________________ The Uganda Linux User Group: http://linux.or.ug Send messages to this mailing list by addressing e-mails to: [email protected] Mailing list archives: http://www.mail-archive.com/[email protected]/ Mailing list settings: http://kym.net/mailman/listinfo/lug To unsubscribe: http://kym.net/mailman/options/lug The Uganda LUG mailing list is generously hosted by INFOCOM: http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The mailing list host is not responsible for them in any way.
