All Top Banking

Midnight Raid Attack Creates HelluvaSMS

Posted by John B. Frank Monday, April 20, 2009

Source: CNet
Complete item

Description:

Be careful who you give your mobile phone number out to. An attacker with the right toolkits and skill could hijack your phone remotely just by sending SMS messages to it, according to mobile security firm Trust Digital.

In what it calls a "Midnight Raid Attack" because it would be most effective when a victim is asleep, an attacker could send a text message to a phone that would automatically start up a Web browser and direct the phone to a malicious Web site, said Dan Dearing, vice president of marketing at Trust Digital. The Web site could then download an executable file on the mobile phone that steals data off the phone, he said.

Dearing demonstrates how this can be done in a video on YouTube.


In another type of attack, an attacker could hijack a phone by sending a type of SMS message called a control message over the GSM network to a victim's phone that is using a Wi-Fi network and then use special toolkits to sniff the Wifi traffic looking for the victim's e-mail log-in information. This attack is explained in another YouTube video.

While the attacks at this point are proof-of-concepts, they could be done if someone has the requisite knowledge and toolkits, said Dearing. Trust Digital recently announced software called EMM 8.0 that can help organizations protect employee phones from these types of attacks, he said.

"This is a completely real threat," said Philippe Winthrop, a director in the global wireless practice at Strategy Analytics. "We will see these attacks. It's a matter of time."

Reblog this post [with Zemanta]

2 comments

  1. cat Says:
  2. be entertained

     
  3. Anonymous Says:
  4. THIS HAPPENED TO BOTH ME AND MY GIRLFRIEND EARLIER THIS MONTH (APRIL '09) IN VANCOUVER, WASHINGTON! DRUGGIES FROM CAMAS, WASHINGTON COMPROMISED MY YAHOO & MYSPACE ACCOUNTS AS WELL AS OUR CELLPHONES. THEY INTRODUCED SPYBOTS, IBOTS, AND NETBOTS TO MY PC AND DID A MIDNIGHT RAID ON OUR CELLPHONES CAPTURING ALL THE ADDRESSES ON OUR SIMCARDS. THEY TURNED OFF ENCRYPTION FEATURES ON BOTH THE CELLPHONES AND THE PCS, BROKE INTO MY HOUSE AND CHANGED SETTINGS ON THE PC, TURNED OFF FIREWALLS AND VIRUS PROTECTION. ALL OF THIS IS DRUG RELATED WHICH PEOPLE HAVE REPORTED TO AUTHORITIES NUMEROUS TIMES.

     

Post a Comment

Powered by Blogger.

Blog Archive

Search This Blog

Our Manufacturing Facility

Learn More About Us

Find out how our patented technology can empower your financial institution.

Our secure two-factor online banking authentication eliminates dangerous passwords and usernames and replicates the same trusted process used to access cash at ATM's. (Insert Bank Issued Card, Enter Bank Issued PIN)

There is an R.O.I. as FI's also earn recurring revenue from each transaction conducted using our PCI 2.0 Certified PIN Entry Device. Our technology also provides a unique real-time P2P "Instant-Transfer" which allows your online banking customer to transfer cash from ANY of their bankcards to ANY other bankcard...with the Swipe of a card.

Help your bank eliminate phishing and your customers avoid identity theft by providing them with the ability to stop typing and start swiping. There is no safer way to conduct financial transactions online than by 3DES DUKPT encrypting the cardholder details, which we do at the mag-head "inside the box/outside the browser."

Total Pageviews

SLIM for PC or SmartPhone

SLIM for PC or SmartPhone
Click to Inquire

Chip and PIN eCommerce and Mobile

Chip and PIN eCommerce and Mobile
Click to Inquire

Kapersky Calls for Mass Adoption of Card Readers

Kapersky Calls for Mass Adoption of Card Readers

Translate This Blog

BobCaps

Search ePayment News (example: NFC)

About Me

My photo
Named one of the best Payment Industry News Blogs 4 Years Running

Feedjit

My Zimbio