Client Login
24 hr HELPDESK: 1.877.247.1664

News & Communications

September 2014

• 5 Million Passwords Leaked

February 2013

• Flames Ticket GIVEAWAY!

December 2012

• Holiday Update, from the Team at Benson & Associates

October 2012

• If it ain't broke, don't fix it. I'm talking to you, Microsoft

September 2012

• Microsoft to end support of Windows XP and Office 2003

June 2012

• Microsoft Unveils New tablet

April 2012


February 2012

• Buzzwords We Hate

December 2011

• Benson IT News

• Backup and Disaster Recovery / Business Continuity Planning

September 2011

• eScan Update

• HP Notebook PC battery Pack Replacement Program - IMPORTANT SAFETY RECALL

August 2011

• Reclaim your privacy settings on LinkedIn

July 2011

• Anti-virus Software Scam

• Electronics recycling fees are being reduced

June 2011

• Canada Post Strike

May 2011

• The Importance of Backups

April 2011


March 2011

• The end to pharmaceutical scam emails?

February 2011

• MDaemon v12 - BlackBerry Edition

November 2010

• Barracuda Spam and Virus Protection

• Microsoft's Streetslide takes on Google Streetview

October 2010

• A Few Perspectives on

• The History Of The (Fake) 'Free Public WiFi' You Always See At Airports

September 2010

• We Have Moved

August 2010

• Private browsing: not so private

• Microsoft Releases Emergency Patch For Windows

July 2010

• How to spot an e-mail hoax

June 2010

• MDaemon v11 Released

May 2010

• Autotask Community Live!

April 2010

• Facebook Privacy Warning

• Slaying Zombie Servers

• Going Green

• Alberta Immigrant Nominee Program

March 2010

• Beginner Tips for SEO

• What the heck is SEO, and does it actually work?

February 2010

• Encourage Your Customers to Complain

• Five Reasons to Consider Managed Service

January 2010

• Social Networking Sites

• Happy New Year

December 2009

• iPhone Rick Roll

November 2009

• Flu Season Alert

• Make Your Tech Guy Sweat

• Flash Player Alert

October 2009

• Genie Timeline Now Available

• Independent Anti-Virus Field Test

September 2009

August 2009

July 2009

June 2009

• Cloud Computing

• Kids Up Front

• Benson & Associates NEW Advertisement

May 2009

April 2009

March 2009

February 2009

January 2009

November 2008

August 2008

May 2008

April 2008

March 2008

February 2008

November 2007

June 2007

September 2005

August 2005

iPhone Rick Roll - 2009-12-09

iPhone users have this weekend been on the receiving end of the first in-the-wild virus for Apple's cult mobile phone. The iPhone virus, called "Ikee", changes the phone's background picture to 1980s singer Rick Astley, and then goes looking for other iPhones on the network to infect.

The Ikee virus spreads using SSH, which is pre-installed, but not enabled, on the iPhone. However, many users who have jailbroken their phones may have enabled SSH as a convenient way of logging into and accessing their phones from other computers. Unfortunately, even though the iPhone ships with SSH turned off, Apple's pre-configuration of SSH sets the same root password on every single iPhone. If you turn on SSH without changing this password, you are woefully insecure.

Early indications are that the Ikee virus was written by a 21-year-old from Wollongong in New South Wales who has recently tweeted that he's "kinda...worried about legal implications." If he did write _and set loose_ this virus on the network, he probably ought to be worried, since breaking into other people's computers isn't acceptable -- even if they have chosen (or, in this case, Apple has chosen on their behalf) an effectively useless password.

Fortunately, the Ikee virus is not explicitly destructive, and -- unlike the vast majority of modern malware -- doesn't seem to have been written as a vehicle for ongoing cybercriminality. Indeed,it seems that, after infecting your iPhone, the virus turns SSH off, thus protecting the device against further attacks of this sort.

Infection seems to be confined to Australia at the moment, though there are unconfirmed reports of Ikee in Thailand and Japan.

This is unsurprising, since the latest variant of the worm greatly favours attacking Australian mobile phone networks. It targets phones throughout several large IP ranges apparently belonging to Vodafone Australia, Optus and Telstra, attacking just one randomly-generated IP address outside these ranges every time it spreads. Since the source code of Ikee is available, however, this could easily change in future variants.

Note also, that a Dutch hacker recently used the same approach -- logging in to jailbroken phones via the known SSH password -- to inject a message asking for 5 Euros to tell you how to secure your iPhone against further attacks.

"If you have a jailbroken iPhone, change your SSH passwords now," urges Paul Ducklin, Sophos's Head of Technology, Asia Pacific. "If you don't have a jailbroken iPhone, you probably also ought to change those passwords, since it makes no sense to have poor passwords pre-configured for any operating system service, whether it runs by default or not. Ironically, it seems that Apple don't want you to do that -- just the sort of operational restriction which led to jailbreaking in the first place."

If you have any questions about the information above or wish to remove malware from your SmartPhone or computing device, please contact Benson & Associates helpdesk at 1-877-247-1664.