|
2014-09-03
, 16:05
|
Posts: 1,994 |
Thanked: 3,342 times |
Joined on Jun 2010
@ N900: Battery low. N950: torx 4 re-used once and fine; SIM port torn apart
|
#2
|
The Following User Says Thank You to Wikiwide For This Useful Post: | ||
|
2014-09-03
, 16:39
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#3
|
Could a Neo900 do something like this?
http://www.wired.com/2014/09/cryptop...e-cell-towers/
The Following 4 Users Say Thank You to juiceme For This Useful Post: | ||
|
2014-09-03
, 18:50
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#4
|
As usual the article contained just a pinch of facts and a load of BllSHT to go
- yes, it is possible to hijack UE<->RAN connections
- no, it still isn't possible to actuate phone camera or sound pickup without initiating a call
- no, the "firewall" proposed on cryptophone is not feasible
The Following 3 Users Say Thank You to For This Useful Post: | ||
|
2014-09-04
, 00:23
|
|
Posts: 2,222 |
Thanked: 12,651 times |
Joined on Mar 2010
@ SOL 3
|
#5
|
Could a Neo900 do something like this?
http://www.wired.com/2014/09/cryptop...e-cell-towers/
The Following 4 Users Say Thank You to joerg_rw For This Useful Post: | ||
|
2014-09-04
, 00:30
|
|
Posts: 257 |
Thanked: 2,053 times |
Joined on Sep 2010
@ Warsaw, Poland
|
#6
|
Could a Neo900 do something like this?
http://www.wired.com/2014/09/cryptop...e-cell-towers/
The Following 4 Users Say Thank You to dos1 For This Useful Post: | ||
|
2014-09-04
, 00:50
|
|
Posts: 3,141 |
Thanked: 8,161 times |
Joined on Feb 2013
@ From my Gabriola Island hermitage, near the Edge of the World
|
#7
|
|
2014-09-04
, 09:32
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#8
|
- Not so sure about this one, but I feel confident,that once you have hijacked the phones GSM/GPRS you can gain enough control to activate the camera and microphone etc by several types of attack. Possibly you can do this by a specially crafted SMS, but definately I have no doubt you can do this if you hijack the phone GPRS connection.
|
2014-09-04
, 17:32
|
|
Posts: 2,222 |
Thanked: 12,651 times |
Joined on Mar 2010
@ SOL 3
|
#9
|
Well, in an infinite universe anything is possible, and I do not doubt that the UMTS signaling stack is perfect: far from it. There might well be bugs that allow some undocumented functionality to emerge.
However, there is no possible legal state transition that could lead to this kind of action.
The only way I can see for this to happen would be if the attacker could inject malicious code into the target UE and get it running; imagine for example an instance of Prey on the device controlled by remote malicious party.
Such attack would be device-dependent however, there might be some manufacturer/model that is vulnerable to a hand-crafted attack vector specifically targeted to it but no possibility to create a generic attack.
The attack device can easily masquarade using existing cell area&BTS signatures that it anyway can observe. There is pretty much no way that the target UE can shield against this type of attack.
The Following 4 Users Say Thank You to joerg_rw For This Useful Post: | ||
|
2014-09-04
, 19:47
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#10
|
However please note that Neo900 has NO way the GSM/UMTS stack can inject ANY commands into the main system. Our modem is sandboxed and we even do more than this, we have surveillance for the sandbox, detecting every little move the modem does, then decide if it's concerning or expected. Worst case we shoot complete modem down when it misbehaves. In that regard we're even better than cryptophone used for the IMSI-catcher "firewall" liked to in above post.
Regarding masquerading an IMSI-catcher as regular BTS (incl Cell_ID and all): _can_ be done, but begs for trouble, so usually they don't do it aiui.
/j
http://www.wired.com/2014/09/cryptop...e-cell-towers/