Οι σύγχρονες συσκευές της Samsung, όπως τις S6, S6 Edge και Note 4 είναι ευάλωτες σε επιθέσεις man-in-the-middle που επιτρέπουν την υποκλοπή τηλεφωνικών κλήσεων χρησιμοποιώντας επιβλαβείς σταθμούς βάσης, σύμφωνα με τα ευρήματα μιας researchs.
Daniel Komaromy from San Francisco and Nico Golde from Berlin presented the attacks at the Mobile Pwn2Own PacSec competition in Tokyo.
The researchers did not reveal all of their findings publicly but sent them to Samsung.
The man-in-the-middle attack requires an OpenBTS base station near the target devices. The villain station baseband then uploads malicious firmware to the baseband of the phone's processor (the chip that handles voice calls).
Malicious firmware promotes phone calls through the dummy base station, which redirects them to a proxy that records everything and sends them to the recipient.
Komaromy reports that the full PoC attack will be presented after more work in the project.
"Her example amendmentbaseband wiretapping is just one example,” Komaromy told Vulture South.
"The idea is that you can redirect calls to a proxy (like a SIP proxy) and that way you can make man-in-the-middle on every call."
"This means that the attacker will see the original call connected - but will be able to record everything through the proxy that acts as an interception implant."
The researchers' attack was tested on a new Samsung Galaxy Edge S6 that PacSec organizer Dragos Ruiu bought especially for the occasion.