News / Science & Technology

UN Warns on Mobile Cybersecurity Bugs to Prevent Attacks

A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
x
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
Reuters
A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cybersecurity risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES. The technology is still used on at least one out of eight SIMs, or a minimum of 500 million phones, according to Nohl.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview. "If you have a MasterCard number or PayPal data on the phone, we get that too."

IPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement.

Apple and Google declined comment.

CTIA, a U.S. mobile industry trade group based in Washington, D.C., said the new research likely posed no immediate threat.

"We understand the vulnerability and are working on it," said CTIA Vice President John Marinho. "This is not what hackers are focused on. This does not seem to be something they are exploiting."

You May Like

Video One Year After Thai Coup, No End in Sight for Military Rule

Since carrying out the May 22, 2014 coup, the general has retired from the military but is still firmly in charge More

Goodbye, New York

This is what the fastest-growing big cities in America have in common More

Job-Seeking Bangladeshis Risk Lives to Find Work

The number of Bangladeshi migrants on smugglers’ boats bound for Southeast Asian countries has soared in the past two years More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Turkey's Main Opposition Party Hopes for Election Breakthroughi
X
May 22, 2015 10:23 AM
Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Turkey's Main Opposition Party Hopes for Election Breakthrough

Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Europe Follows US Lead in Tackling ‘Conflict Minerals’

Metals mined from conflict zones in places like the Democratic Republic of Congo are often sold by warlords to buy weapons. This week European lawmakers voted to force manufacturers to prove that their supply chains are not inadvertently fueling conflicts and human rights abuses. Henry Ridgwell reports from London.
Video

Video Class Tackles Questions of Race, Discrimination

Unrest in some U.S. cities is more than just a trending news item at Ladue Middle School in St. Louis, Missouri. As VOA’s Kane Farabaugh reports, it’s a focus of a multicultural studies class engaging students in wide-ranging discussions about racial tensions and police aggression.
Video

Video Mind-Controlled Prosthetics Are Getting Closer

Scientists and engineers are making substantial advances towards the ultimate goal in prosthetics – creation of limbs that can be controlled by the wearer’s mind. Thanks to sophisticated sensors capable of picking up the brain’s signals, an amputee in Iceland is literally bringing us one step closer to that goal. VOA’s George Putic reports.
Video

Video Afghan Economy Sinks As Foreign Troops Depart

As international troops prepare to leave Afghanistan, and many foreign aid groups follow, Afghans are grappling with how the exodus will affect the country's fragile economy. Ayesha Tanzeem reports from the Afghan capital, Kabul.
Video

Video Poverty, Ignorance Force Underage Girls Into Marriage

The recent marriage of a 17-year old Chechen girl to a local police chief who was 30 years older and already had a wife caused an outcry in Russia and beyond. The bride was reportedly forced to marry and her parents were intimidated into giving their consent. The union spotlighted yet again the plight of many underage girls in developing countries. Zlatica Hoke reports poverty, ignorance and fear are behind the practice, especially in Asia and Africa.
Video

Video South Korea Marks Gwangju Uprising Anniversary

South Korea this week marked the 35th anniversary of a protest that turned deadly. The Gwangju Uprising is credited with starting the country’s democratic revolution after it was violently quelled by South Korea’s former military rulers. But as Jason Strother reports, some observers worry that democracy has recently been eroded.
Video

Video California’s Water System Not Created To Handle Current Drought

The drought in California is moving into its fourth year. While the state's governor is mandating a reduction in urban water use, most of the water used in California is for agriculture. But both city dwellers and farmers are feeling the impact of the drought. Some experts say the state’s water system was not created to handle long periods of drought. Elizabeth Lee reports from Ventura County, an agricultural region just northwest of Los Angeles.
Video

Video How to Clone a Mammoth: The Science of De-Extinction

An international team of scientists has sequenced the complete genome of the woolly mammoth. Led by the Swedish Museum of Natural History in Stockholm, the work opens the door to recreate the huge herbivore, which last roamed the Earth 4,000 years ago. VOA’s Rosanne Skirble considers the science of de-extinction and its place on the planet
Video

Video Blind Boy Defines His Life with Music

Cole Moran was born blind. He also has cognitive delays and other birth defects. He has to learn everything by ear. Nevertheless, the 12-year-old has had an insatiable love for music since he was born. VOA’s June Soh introduces us to the young phenomenal harmonica player.

VOA Blogs