This document discusses how easily user-mode rootkits and malware can be developed for BlackBerry devices by exploiting application programming interfaces (APIs) and oversight in privilege handling. It provides examples of real malware like Android Plankton and Geinimi that steal information by abusing APIs rather than exploiting vulnerabilities. The document argues that similar techniques could be used to create malware disguised as media players or chat applications for BlackBerry, which could steal files, conversations, and device information by accessing the unencrypted filesystem and chat logs. Code snippets are provided to demonstrate how this could be done by reading and writing files and monitoring communication history folders.
Related topics: