Researchers exploit cellular tech flaws to intercept phone calls
Femtocells used to boost corporate cellular coverage can be tweaked to listen in on calls and steal data, researchers say at Black Hat
Computerworld - LAS VEGAS -- Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data.
Tom Ritter and Doug DePerry , researchers from iSec Partners, used an femtocell from Verizon to demonstrate how hackers can eavesdrop on phone conversations and see text messages and photos sent or received by nearby cell phone users.
The femtocells used by other phone carriers can be exploited as well, the researchers noted at the hacker conference here this week.
Femtocells are small, low-power base stations provided by phone companies to extend cellular coverage, especially inside buildings and facilities with spotty coverage. The devices use cable or DSL services to connect to a service providers' network.
Nearby mobile phones automatically connect to femtocells if both are from the same service provider. The phone sends all traffic through the femtocell.
Ritter and DePerry gained root access to the Linux operating system used in Verizon's femotcell by interfacing with he device via an HDMI port at the base of the system. Then they used the root access to tweak the femtocell to intercept voice and text messages from cell phones connected to the device.
As part of the demonstration, the researchers intercepted text messages sent by some of those at the presentation and replayed audio of a phone call made by one of the researchers during the demo. They also showed how root access on a femotcell can be used to clone cell phones connected to the device.
The researchers noted that Verizon patched the flaw in its femtocells after it was notified. But they added that femtocells from other vendors are vulnerable to the same kind of exploits.
Alex Watson, director of security research at Websense Inc said the research by Ritter and DePerry shows how cellular networks are as susceptible to security vulnerabilities as WiFi networks. He noted that service providers are deploying femtocells in growing numbers to expand their coverage, exposing a lot of users to potential hacks.
"They showed that cellular networks are not bullet proof. They showed that cellular technologies do have flaws and cannot be taken as perfect," he said.
IT security managers should pay attention to such risks and ensure that cell phones that connect to the corporate network have multiple layers of protection, including encryption of data at rest and in transmission.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts