Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Mobile Tech
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
SIM Card Flaw Leaves 750 Million Phones at Risk
SIM Card Flaw Leaves 750 Million Phones at Risk

By Seth Fitzgerald
July 22, 2013 10:12AM

    Bookmark and Share
Even though a large portion of the phones tested did not accept an SMS message pretending to be from the phone's wireless carrier, many of them did, and in doing so the phone frequently provided the SIM card's cryptographic signature. Because they used weak encryption, the signatures were quickly cracked. That then provided a way to download a virus.
 



A German security researcher has found a major flaw in the type of encryption that many cell phone SIM cards use.

According to researcher Karsten Nohl, the DES (data encryption standard) protocol which has been around since the 1970s is weak against attacks, despite it still being used on half of all SIM cards.

Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas next week, tested 1,000 SIM cards over a two-year period and has come to the conclusion that as many as 750 million cell phones globally could be vulnerable to these relatively easy attacks.

The two largest carriers in the U.S., Verizon and AT&T, both reportedly have said they have moved away from DES encryption and their SIM cards are not vulnerable to the flaw.

The Attack

By looking at the security features present on the test phones, he discovered that in a quarter of them that use the older encryption standard, a hacker could exploit carrier text messages. Cell phone carriers frequently send out text messages to phones, and Nohl was able to trick devices into seeing him as a carrier. After doing so, the phone accepted a text message and replied with the SIM card's 56-digit key.

Once hackers have access to a SIM card's unique key, they are able to take over the device. Nohl said hackers with a SIM key are able to do practically anything they want with the phone.

"We can remotely install software on a handset that operates completely independently from your phone," Nohl said. "We can spy on you. We know your encryption keys for calls. We can read your SMS's. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account."

Even though a large portion of the phones that Nohl tested did not accept the message pretending to be from the carrier, many of them did, and in doing so the phone frequently provided a cryptographic signature. The issue with the signatures used by the SIM cards is that Nohl was able to crack them in under a minute.

Breaking the encryption key gave Nohl access to the phone, allowing him to download a virus onto the SIM card that would eavesdrop on calls, collect data, and send messages or calls.

Fixing the Vulnerability

Nohl has yet to release the specifics of his research to the public but he has already notified the GSM Association about his findings. The International Telecommunications Union, a sub-group of the United Nations, said the research was "hugely significant."

Wireless telecom analyst Jeff Kagan said most people do not add virus protection to their cell phones, and when combined with weak encryption security, phones are vulnerable devices.

When it comes to fixing the problem, which potentially affects more than 750 million devices, Kagan said there were a few things that must be done.

"The solution has to come from many areas," Kagan told us. "One is to continually upgrade SIM cards. Two is to have security protection on the networks, which we do have. Three is to personally protect our devices with protection software like we do on our computers."
 

Tell Us What You Think
Comment:

Name:

Andreas:

Posted: 2013-07-23 @ 6:30am PT
Can you say fear mongering?



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Mobile Tech
1.   T-Mobile Calls 'BS' on AT&T Promo
2.   Win Phone 8.1 Update Already on Way
3.   Researchers Tout Battery Breakthrough
4.   Samsung Postpones Tizen Phone
5.   Verizon Throttling Data Speeds


advertisement
T-Mobile Calls 'BS' on AT&T Promo
Says 'Best Ever Pricing' is a joke.
Average Rating:
Researchers Tout Battery Breakthrough
Lithium anode could triple capacity.
Average Rating:
Is the Amazon Fire Phone a Winner?
It coulda been a contender -- but isn't.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 

Mobile Technology Spotlight
T-Mobile Calls 'BS' on AT&T's New Promotion
While Verizon Wireless is moving to throttle bandwidth hogs, a scrappy T-Mobile is taking on the giants with a limited-time promotion it hopes will drive up the churn rates of its wireless rivals.
 
Microsoft Update to Windows Phone 8.1 Already Coming
An update to Windows Phone 8.1 is on the way just weeks after the release of the product itself. Microsoft has begun detailing some of the update features to phone manufacturers.
 
Stanford Researchers Report Battery Breakthrough
Stanford researchers have found a way to use lithium in a battery's anode, a breakthrough that could triple capacity and has been described as the "holy grail of battery science."
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.