This article needs attention from an expert in Cybersecurity. Please add a reason or a talk parameter to this template to explain the issue with the article. WikiProject Cybersecurity may be able to help recruit an expert.(August 2012)
Commwarrior was particularly effective via the MMS vector it used to infect other phones. It appeared as though it had been sent from a source that was known to the victim, leading even security-conscious users to open the infected message. Actually, the message was sent at random to a contact in the sender's address book.
Once the message is opened, the virus attempts to install itself on the phone via a SIS file. As it runs, the worm is executed every time the phone is switched on.
A secondary method of infection is to create a malicious .SIS file on a compromised phone. Once per minute thereafter, the worm attempts to send this file to any phone that has Bluetooth enabled.