Featured Articles

IHS teardown reveals Galaxy S5 BOM

IHS teardown reveals Galaxy S5 BOM

Research firm IHS got hold of Samsung’s new flagship smartphone and took it apart to the last bolt to figure out…

More...
Galaxy S5, HTC One M8 available selling well

Galaxy S5, HTC One M8 available selling well

Samsung’s Galaxy S5 has finally gone on sale and it can be yours for €699, which is quite a lot of…

More...
Intel lists Haswell refresh parts

Intel lists Haswell refresh parts

Intel has added a load of Haswell refresh parts to its official price list and there really aren’t any surprises to…

More...
Respawn confirms Titanfall DLC for May

Respawn confirms Titanfall DLC for May

During his appearance at PAX East panel and confirmed on Twitter, Titanfall developer Respawn confirmed that the first DLC pack for…

More...
KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 gained a lot of overclocking experience with the GTX 780 Hall of Fame (HOF), which we had a chance to…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 11 March 2011 10:18

Boffins can switch off a mobile phone using SMS

Written by Nick Farell
y_exclamation

Attack of doom
Two insecurity experts have been showing off a technique which allows them to control a mobile phone anywhere in the world using SMS. Nico Golde and Collin Mulliner showed a video demonstration of phones from a wide range of manufacturers, including LG, Sony Ericsson, Nokia and others rebooting, freezing and generally acting flaky after receiving the crafted SMS messages.

The pair used the technique on feature phones, because feature phones still are far more prevalent in most of the world than smartphones are, so the target area is much larger. In a demonstration at CanSecWest  the pair said that the attack did not need user interaction  and the attacker can be anywhere in the world.

What they did was set up their own GSM network using a laptop running OpenBSC and targeted various phones that they purchased on eBay. These included a Nokia S40, a variety of LG handsets and Sony Ericsson devices. The messages they sent included a binary payload.

In most cases they could get the phone to reboot or freeze on a start-up screen. In one case they totally bricked a Sony Ericsson phone.

More here.


Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

Comments  

 
+3 #1 Bl0bb3r 2011-03-11 22:09
All nice and well until filtering is handled at the operator level before the client gets the message.
 

To be able to post comments please log-in with Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments