Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Viruses & Malware
Cisco UCS Invicta Series flash memory systems
Average Rating:
Rate this article:  
SIM Card Flaw Leaves 750 Million Phones at Risk
SIM Card Flaw Leaves 750 Million Phones at Risk

By Seth Fitzgerald
July 22, 2013 10:12AM

Bookmark and Share
Even though a large portion of the phones tested did not accept an SMS message pretending to be from the phone's wireless carrier, many of them did, and in doing so the phone frequently provided the SIM card's cryptographic signature. Because they used weak encryption, the signatures were quickly cracked. That then provided a way to download a virus.
 


A German security researcher has found a major flaw in the type of encryption that many cell phone SIM cards use.

According to researcher Karsten Nohl, the DES (data encryption standard) protocol which has been around since the 1970s is weak against attacks, despite it still being used on half of all SIM cards.

Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas next week, tested 1,000 SIM cards over a two-year period and has come to the conclusion that as many as 750 million cell phones globally could be vulnerable to these relatively easy attacks.

The two largest carriers in the U.S., Verizon and AT&T, both reportedly have said they have moved away from DES encryption and their SIM cards are not vulnerable to the flaw.

The Attack

By looking at the security features present on the test phones, he discovered that in a quarter of them that use the older encryption standard, a hacker could exploit carrier text messages. Cell phone carriers frequently send out text messages to phones, and Nohl was able to trick devices into seeing him as a carrier. After doing so, the phone accepted a text message and replied with the SIM card's 56-digit key.

Once hackers have access to a SIM card's unique key, they are able to take over the device. Nohl said hackers with a SIM key are able to do practically anything they want with the phone.

"We can remotely install software on a handset that operates completely independently from your phone," Nohl said. "We can spy on you. We know your encryption keys for calls. We can read your SMS's. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account."

Even though a large portion of the phones that Nohl tested did not accept the message pretending to be from the carrier, many of them did, and in doing so the phone frequently provided a cryptographic signature. The issue with the signatures used by the SIM cards is that Nohl was able to crack them in under a minute.

Breaking the encryption key gave Nohl access to the phone, allowing him to download a virus onto the SIM card that would eavesdrop on calls, collect data, and send messages or calls.

Fixing the Vulnerability

Nohl has yet to release the specifics of his research to the public but he has already notified the GSM Association about his findings. The International Telecommunications Union, a sub-group of the United Nations, said the research was "hugely significant."

Wireless telecom analyst Jeff Kagan said most people do not add virus protection to their cell phones, and when combined with weak encryption security, phones are vulnerable devices.

When it comes to fixing the problem, which potentially affects more than 750 million devices, Kagan said there were a few things that must be done.

"The solution has to come from many areas," Kagan told us. "One is to continually upgrade SIM cards. Two is to have security protection on the networks, which we do have. Three is to personally protect our devices with protection software like we do on our computers."
 

Tell Us What You Think
Comment:

Name:

Andreas:

Posted: 2013-07-23 @ 6:30am PT
Can you say fear mongering?



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Viruses & Malware
1.   Android 'Fake ID' Puts Millions at Risk
2.   Big DDoS Attacks Hit Record in 2014
3.   Google Hacker Team to Hunt Bugs
4.   Russian Hacker's Charges Revealed
5.   Hackers Target Western Energy Firms


advertisement
Android 'Fake ID' Puts Millions at Risk
Users: stick to apps from Google Play.
Average Rating:
Big DDoS Attacks Hit Record in 2014
Attackers often use NTP reflection.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.