Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Mobile Security
Register for a certification exam.
Average Rating:
Rate this article:  
SIM Card Flaw Leaves 750 Million Phones at Risk
SIM Card Flaw Leaves 750 Million Phones at Risk

By Seth Fitzgerald
July 22, 2013 10:12AM

Bookmark and Share
Even though a large portion of the phones tested did not accept an SMS message pretending to be from the phone's wireless carrier, many of them did, and in doing so the phone frequently provided the SIM card's cryptographic signature. Because they used weak encryption, the signatures were quickly cracked. That then provided a way to download a virus.
 


A German security researcher has found a major flaw in the type of encryption that many cell phone SIM cards use.

According to researcher Karsten Nohl, the DES (data encryption standard) protocol which has been around since the 1970s is weak against attacks, despite it still being used on half of all SIM cards.

Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas next week, tested 1,000 SIM cards over a two-year period and has come to the conclusion that as many as 750 million cell phones globally could be vulnerable to these relatively easy attacks.

The two largest carriers in the U.S., Verizon and AT&T, both reportedly have said they have moved away from DES encryption and their SIM cards are not vulnerable to the flaw.

The Attack

By looking at the security features present on the test phones, he discovered that in a quarter of them that use the older encryption standard, a hacker could exploit carrier text messages. Cell phone carriers frequently send out text messages to phones, and Nohl was able to trick devices into seeing him as a carrier. After doing so, the phone accepted a text message and replied with the SIM card's 56-digit key.

Once hackers have access to a SIM card's unique key, they are able to take over the device. Nohl said hackers with a SIM key are able to do practically anything they want with the phone.

"We can remotely install software on a handset that operates completely independently from your phone," Nohl said. "We can spy on you. We know your encryption keys for calls. We can read your SMS's. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account."

Even though a large portion of the phones that Nohl tested did not accept the message pretending to be from the carrier, many of them did, and in doing so the phone frequently provided a cryptographic signature. The issue with the signatures used by the SIM cards is that Nohl was able to crack them in under a minute.

Breaking the encryption key gave Nohl access to the phone, allowing him to download a virus onto the SIM card that would eavesdrop on calls, collect data, and send messages or calls.

Fixing the Vulnerability

Nohl has yet to release the specifics of his research to the public but he has already notified the GSM Association about his findings. The International Telecommunications Union, a sub-group of the United Nations, said the research was "hugely significant."

Wireless telecom analyst Jeff Kagan said most people do not add virus protection to their cell phones, and when combined with weak encryption security, phones are vulnerable devices.

When it comes to fixing the problem, which potentially affects more than 750 million devices, Kagan said there were a few things that must be done.

"The solution has to come from many areas," Kagan told us. "One is to continually upgrade SIM cards. Two is to have security protection on the networks, which we do have. Three is to personally protect our devices with protection software like we do on our computers."
 

Tell Us What You Think
Comment:

Name:

Andreas:

Posted: 2013-07-23 @ 6:30am PT
Can you say fear mongering?



Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.


 Mobile Security
1.   Data Recovered from 'Wiped' Phones
2.   Anti-Spying Blackphone Starts Shipping
3.   Android, Win Phone To Get Kill Switch
4.   Report: Spyware on Chinese Phone
5.   BlackBerry BBM Boosts Security


advertisement
Data Recovered from 'Wiped' Phones
Android 'factory reset' is inadequate.
Average Rating:
Anti-Spying Blackphone Starts Shipping
Development result of NSA revelations.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.