Samsung S6 and S6 Edge vulnerable to man-in-the-middle attacks

Οι σύγχρονες συσκευές της Samsung, όπως τις S6, S6 Edge και Note 4 είναι ευάλωτες σε επιθέσεις man-in-the-middle που επιτρέπουν την υποκλοπή τηλεφωνικών κλήσεων χρησιμοποιώντας επιβλαβείς σταθμούς βάσης, σύμφωνα με τα ευρήματα μιας s.
mitm Samsung
Daniel Komaromy from San and Nico Golde from Berlin presented the attacks at the Mobile Pwn2Own PacSec competition in Tokyo.

The researchers did not reveal all of their findings publicly but sent them to Samsung.

The man-in-the-middle attack requires an OpenBTS base station near the target devices. The villain baseband then uploads malicious firmware to the baseband of the phone's processor (the chip that handles voice calls).

Malicious firmware promotes phone calls through the dummy base station, which redirects them to a proxy that records everything and sends them to the recipient.

Komaromy reports that the full PoC attack will be presented after more work in the project.

"Her example baseband wiretapping is just one example,” Komaromy told Vulture South.

"The idea is that you can redirect calls to a proxy (like a SIP proxy) and that way you can make man-in-the-middle on every call."

"This means that the attacker will see the original call connected - but will be able to record everything through the proxy that acts as an interception implant."

The researchers' attack was tested on a new Samsung Edge S6 that PacSec organizer Dragos Ruiu bought especially for the occasion.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).