News / Science & Technology

UN Warns on Mobile Cybersecurity Bugs to Prevent Attacks

A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013. A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
x
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
Reuters
A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cybersecurity risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES. The technology is still used on at least one out of eight SIMs, or a minimum of 500 million phones, according to Nohl.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview. "If you have a MasterCard number or PayPal data on the phone, we get that too."

IPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement.

Apple and Google declined comment.

CTIA, a U.S. mobile industry trade group based in Washington, D.C., said the new research likely posed no immediate threat.

"We understand the vulnerability and are working on it," said CTIA Vice President John Marinho. "This is not what hackers are focused on. This does not seem to be something they are exploiting."

You May Like

Multimedia Social Media Documenting, Not Driving, Hong Kong Protests

Unlike in Arab Spring uprisings, pro-democracy protesters in Hong Kong aren't relying on Twitter and Facebook to organize, but social media still plays a role More

Analysis: Occupy Central Not Exactly Hong Kong’s Tiananmen

VOA's former Hong Kong, Beijing correspondent compares and contrasts 1989 Tiananmen Square protest with what is now happening in Hong Kong More

Bambari Hospital a Lone Place of Help in Violence-Plagued CAR

Only establishment still functioning in CAR's second city is main hospital More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
The Legacy of Jimmy Carter: The Preacher from Plainsi
X
October 01, 2014 10:45 AM
It is common in the United States to see tourists flock to sites associated with America's presidents. Some are privately owned and others are run by the National Park Service or the National Archives -- but most have helped draw business and people into the towns and cities where they are located. As VOA’s Kane Farabaugh reports, there is one particular presidential hometown that is unique in what it has to offer those who make the trip.
Video

Video The Legacy of Jimmy Carter: The Preacher from Plains

It is common in the United States to see tourists flock to sites associated with America's presidents. Some are privately owned and others are run by the National Park Service or the National Archives -- but most have helped draw business and people into the towns and cities where they are located. As VOA’s Kane Farabaugh reports, there is one particular presidential hometown that is unique in what it has to offer those who make the trip.
Video

Video Hong Kong Protests Draw New Supporters on National Holiday

On the 65th anniversary of the founding of Communist China, Hong Kong protesters are hoping to stage the largest pro-democracy demonstration since the 1989 Tiananmen protests. VOA's Brian Padden visited one of the protest sites mid-day, when the atmosphere was calm and where the supporters were enthusiastic about joining what they are calling the umbrella revolution.
Video

Video India's PM Continues First US Visit

India's prime minister is on his first visit to Washington, to strengthen political and economic ties between the world's oldest and the world biggest democracies. He came to the U.S. capital from New York, the first stop on his five-day visit to the country that denied him an entry visa in the past. From Washington, Zlatica Hoke reports Modi seemed most focused on attracting foreign investment and trade to increase job opportunities for his people.
Video

Video Malaysia Struggles to Stop People Joining Jihad

Malaysian authorities say militant groups like the so-called "Islamic State" have used social media to entice at least three dozen Malaysian Muslims to fight in what they call "jihad" in Syria and Iraq. As Mahi Ramkrishnan reports from Kuala Lumpur, counterterrorism police are deeply worried about what could happen when these militants return home.
Video

Video Could US Have Done More to Stop Rise of Islamic State?

President Obama says airstrikes against Islamic State militants in Syria will likely continue for some time because, in his words, "there is a cancer that has grown for too long." So what if President Obama had acted sooner in Syria to arm more-moderate opponents of both the Islamic State and the Syrian government? VOA State Department Correspondent Scott Stearns reports from the United Nations.
Video

Video Treasure Hunters Seek 'Hidden Treasure' in Central Kenya

Could a cave in a small village in central Kenya be the site of buried treasure? A rumor of riches, left behind by colonialists, has some residents dreaming of wealth, while others see it as a dangerous hoax. VOA's Gabe Joselow has the story.
Video

Video Ebola Patients Find No Treatment at Sierra Leone Holding Center

At a holding facility in Makeni, central Sierra Leone, dozens of sick people sit on the floor in an empty university building. They wait in filthy conditions. It's a 16-hour drive by ambulance to Kailahun Ebola treatment center. Adam Bailes was there and reports on what he says are some of the worst situations he has seen since the beginning of this Ebola outbreak. And he says it appears case numbers may already be far worse than authorities acknowledge.
Video

Video Identifying Bodies Found in Texas Border Region

Thousands of immigrants have died after crossing the border from Mexico into remote areas of the southwestern United States in recent years. Local officials in south Texas alone have found hundreds of unidentified bodies and buried them in mass graves in local cemeteries. Now an anthropologist and her students at Baylor University have been exhuming bodies and looking for clues to identify them. VOA’s Greg Flakus has more from Waco, Texas.
Colonel Steve ‘Spiros’ Pisanos left Greece and came to the U.S. to learn to fly. He flew fighters for the Allies in World War II, narrowly escaping death multiple times.Colonel Steve ‘Spiros’ Pisanos left Greece and came to the U.S. to learn to fly. He flew fighters for the Allies in World War II, narrowly escaping death multiple times.

AppleAndroid