News / Science & Technology

UN Warns on Mobile Cybersecurity Bugs to Prevent Attacks

A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013. A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
x
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
Reuters
— A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cybersecurity risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES. The technology is still used on at least one out of eight SIMs, or a minimum of 500 million phones, according to Nohl.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview. "If you have a MasterCard number or PayPal data on the phone, we get that too."

IPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement.

Apple and Google declined comment.

CTIA, a U.S. mobile industry trade group based in Washington, D.C., said the new research likely posed no immediate threat.

"We understand the vulnerability and are working on it," said CTIA Vice President John Marinho. "This is not what hackers are focused on. This does not seem to be something they are exploiting."

You May Like

Lebanese Media Unite to Support Palestinians in Gaza

Joint newscast billed as Arab world’s first unified news bulletin in support of Hamas-controlled Gaza Strip More

Photogallery Australian PM Alleges ‘Coverup’ at MH17 Crash Site

Meanwhile, Russia's ambassador to Malaysia denies plane's black boxes were opened before they were handed over to Malaysian officials More

Despite Advances in AIDS Treatment, Stigma Lingers

Leading immunologist tells VOA that stigma is often what prevents those infected with disease from seeking treatment More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Nature of Space Exploration Enters New Agei
X
Elizabeth Lee
July 20, 2014 2:36 AM
Forty-five years ago this month, the first humans walked on the moon. It was during an era of the space race between the United States and the Soviet Union. World politics have changed since then and -- as Elizabeth Lee reports -- so has the nature of space exploration.
Video

Video Nature of Space Exploration Enters New Age

Forty-five years ago this month, the first humans walked on the moon. It was during an era of the space race between the United States and the Soviet Union. World politics have changed since then and -- as Elizabeth Lee reports -- so has the nature of space exploration.
Video

Video Chicago’s Argonne Lab Developing Battery of the Future

In 2012, the U.S. Department of Energy’s Office of Science awarded a $120 million grant to a new technology center focused on battery development - headquartered at Argonne National Laboratory in suburban Chicago, Illinois. As VOA’s Kane Farabaugh reports, there scientists are making the next technological breakthroughs in energy storage.
Video

Video In NW Pakistan, Army Offensive Causes Massive Number of Displaced

Pakistan’s army offensive in North Waziristan has resulted in the large-scale displacement of the local population. VOA's Ayaz Gul reports from northwest Pakistan where authorities say around 80 percent of the estimated 1 million internally displaced persons [IDPs] have settled in Bannu district, while much of the remaining 20 percent are scattered in nearby cities.
Video

Video Kurdish Peshmerga Force Secures Kirkuk, Its Oil

The Kurdistan regional government has sent its Peshmerga troops into the adjacent province of Kirkuk to drive out insurgents, and to secure the area's rich oil fields. By doing this, the regional government has added a fourth province to the three it officially controls. The oil also provides revenue that could make an independent Kurdistan economically strong. VOA’s Jeffrey Young went out with the Peshmerga and filed this report.
Video

Video Malaysia Reeling: Second Air Disaster in Four Months

Malaysia is reeling from the second air disaster in four months involving the country’s flag carrier. Flight 340 vanished in March and despite an extensive search, no debris has been found. And on Thursday, Flight 17, likely hit by a surface-to-air missile, came apart over eastern Ukraine. The two incidents together have left more than 500 people dead. VOA Correspondent Steve Herman reports from Kuala Lumpur.
Video

Video Diplomatic Crisis Grows Over MH17 Plane Crash

The Malaysia Airlines crash in eastern Ukraine is drawing reaction from leaders around the world. With suspicions growing that a surface-to-air missile shot down the aircraft, there are increasing tensions in the international community over who is to blame. Henry Ridgwell reports for VOA from London.
Video

Video Undocumented Immigrants Face Perilous Journey to US, No Guarantees

Every day, hundreds of undocumented immigrants from Central America attempt the arduous journey through Mexico and turn themselves over to U.S. border patrol -- with the hope that they will not be turned away. But the dangers they face along the way are many, and as Ramon Taylor reports from the Rio Grande Valley in Texas, their fate rests on more than just the reception they get at the US border.
Video

Video Scientists Create Blackest Material Ever

Of all the black things in the universe only the infamous "black holes" are so black that not even a tiny amount of light can bounce back. But scientists have managed to create material almost as black, and it has enormous potential use. VOA’s George Putic has more.
Video

Video Fog Collector Transforming Maasai Water Harvesting in Kenya

The Maasai people of Kenya are known for their cattle-herding, nomadic lifestyle. But it's an existence that depends on access to adequate water for their herds and flocks. Lenny Ruvaga reports for VOA, on a "fog collector."

AppleAndroid