LINE

    Text:AAAPrint
    Sci-tech

    'Ghost Telephonist' lets hackers take over your phone number

    1
    2017-07-31 09:58Xinhua Editor: Mo Hong'e ECNS App Download

    The UnicornTeam researchers from 360 Technology, China's leading security company, demoed an "evil attack" at the on-going hacker summit in Las Vegas, Nevada. The attack, "Ghost Telephonist", can let hackers get the content of a user's call and SMS.

    In the team's presentation at the on-going hacker summit Black Hat USA 2017 and DEF CON in Las Vegas, Nevada, security researchers introduced one vulnerability in CSFB (Circuit Switched Fallback) in 4G LTE network. In the CSFB procedure, researchers found the authentication step is missing.

    "Several exploitations can be made based on this vulnerability," Unicorn Team wireless security researcher Huang Lin, told Xinhua. "We have reported this vulnerability to the Global System for Mobile Communications Alliance(GSMA)".

    The security research team presented a scenario where one could reset a Google account password using a stolen mobile number.

    After hijacking a user's communication, researcher signed in the user's Google Email and clicked "forget the password". Since Google sends verification code to the victim's mobile, attackers can intercept the SMS text, thereby reseting the account's password. The victim keeps online in 4G network and is not aware of the attack.

    A lot of Internet application accounts use verification SMS to reset the login password, which means attacker can use a cellphone number to start password reset procedure then hijack the verification SMS.

    According researchers, the attacker can also initiate a call/SMS by impersonating the victim. Furthermore, Telephonist Attack can obtain the victim's phone number and then use the phone number to make advanced attack. The victim will not sense being attacked since no 4G or 2G fake base station is used and no cell re-selection. These attacks can randomly choose victims or target a given victim.

    The research team proposed many countermeasures to operators and Internet service provider as well. Researchers say now they are collaborating with operators and terminal manufactures to fix this vulnerability.

      

    Related news

    MorePhoto

    Most popular in 24h

    MoreTop news

    MoreVideo

    News
    Politics
    Business
    Society
    Culture
    Military
    Sci-tech
    Entertainment
    Sports
    Odd
    Features
    Biz
    Economy
    Travel
    Travel News
    Travel Types
    Events
    Food
    Hotel
    Bar & Club
    Architecture
    Gallery
    Photo
    CNS Photo
    Video
    Video
    Learning Chinese
    Learn About China
    Social Chinese
    Business Chinese
    Buzz Words
    Bilingual
    Resources
    ECNS Wire
    Special Coverage
    Infographics
    Voices
    LINE
    Back to top Links | About Us | Jobs | Contact Us | Privacy Policy
    Copyright ©1999-2018 Chinanews.com. All rights reserved.
    Reproduction in whole or in part without permission is prohibited.
    主站蜘蛛池模板: 塔河县| 康定县| 临沭县| 湟源县| 崇州市| 宁国市| 平塘县| 酉阳| 杭州市| 会昌县| 宿州市| 彭州市| 洪江市| 商洛市| 潜江市| 上杭县| 凤城市| 丘北县| 新丰县| 黔江区| 平和县| 乌什县| 和政县| 汉川市| 稷山县| 确山县| 新乐市| 清新县| 建昌县| 城固县| 怀远县| 台北县| 青铜峡市| 宜都市| 榆中县| 台东市| 富锦市| 洮南市| 政和县| 哈尔滨市| 分宜县|