News / Science & Technology

UN Warns on Mobile Cybersecurity Bugs to Prevent Attacks

A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013. A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
x
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
TEXT SIZE - +
Reuters
— A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cybersecurity risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES. The technology is still used on at least one out of eight SIMs, or a minimum of 500 million phones, according to Nohl.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview. "If you have a MasterCard number or PayPal data on the phone, we get that too."

IPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement.

Apple and Google declined comment.

CTIA, a U.S. mobile industry trade group based in Washington, D.C., said the new research likely posed no immediate threat.

"We understand the vulnerability and are working on it," said CTIA Vice President John Marinho. "This is not what hackers are focused on. This does not seem to be something they are exploiting."

You May Like

Multimedia Anti-Keystone XL Protests Continue

Demonstrators are worried about pipeline's effect on climate change, their traditional way of life, health and safety More

Thailand's Political Power Struggle Continues

Court gave Prime Minister Yingluck Shinawatra until May 2 to prepare her defense over abuse of power charges but uncertainty remains over election timing More

Malaysia Plane Search Tests Limits of Ocean Mapping Technology

Expert tells VOA existing equipment’s maximum operating depth is around 6 kilometers as operation continues on ocean bed for any trace of MH370 More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Pet Kangaroo Helps Spread Environmental Messagei
X
Penelope Poulou
April 22, 2014 5:53 PM
Children’s author Julia Heckathorn travels the world to learn about different ecosystems and endangered animals. She pours her knowledge into children’s books, hoping the next generation will right the environmental wrongs of our times. As in many children's books, the main character in Heckathorn's stories is an animal. Unlike those other characters, though, this one is real - a kangaroo, that lives in the author’s backyard. VOA’s Penelope Poulou has more.
Video

Video Pet Kangaroo Helps Spread Environmental Message

Children’s author Julia Heckathorn travels the world to learn about different ecosystems and endangered animals. She pours her knowledge into children’s books, hoping the next generation will right the environmental wrongs of our times. As in many children's books, the main character in Heckathorn's stories is an animal. Unlike those other characters, though, this one is real - a kangaroo, that lives in the author’s backyard. VOA’s Penelope Poulou has more.
Video

Video Pro-Russian Separatists Plan 'Federalization Referendum' in Eastern Ukraine

Pro-Russian separatists in eastern Ukraine say they plan to move forward next month with a referendum vote for greater autonomy, despite the Geneva agreement reached with Russia, the U.S. and Ukraine to end the political conflict. VOA's Brian Padden reports from the city of Donetsk in Eastern Ukraine.
Video

Video Pope Francis Hopes Dual Canonizations Will Reconcile Church

On April 27, two popes - John the XXIII and John Paul II - will be made saints in a ceremony at St. Peter’s Square. VOA religion correspondent Jerome Socolovsky says the dual canonization is part of the current pope’s program to reconcile liberals and conservatives in the Roman Catholic Church.
Video

Video In Capturing Nature's Majesty, Film Makes Case for Its Survival

French filmmaker Luc Jacquet won worldwide acclaim for his 2005 Academy Award-winning documentary "March of the Penguins". Now Jacquet is back with a new film that takes movie-goers deep into the heart of a tropical rainforest - not only to celebrate its grandeur, but to make the case for its survival. VOA's Rosanne Skirble reports.
Video

Video Boston Marathon Bittersweet for Many Runners

Monday's running of the Boston Marathon was bittersweet for many of the 36,000 participants as they finished the run that was interrupted by a double bombing last year. Many gathered along the route paid respect to the four people killed as a result of two bombings near the finish line. VOA's Carolyn Presutti returned to Boston this year to follow two runners, forever changed because of the crimes.
Video

Video International Students Learn Film Production in World's Movie Capital

Hollywood - which is part of Los Angeles - is the movie capital of the world, and many aspiring filmmakers go there in hopes of breaking into the movie business. Mike O'Sullivan reports that regional universities are also a magnet for students who hope to become producers or directors.
Video

Video Pacific Rim Trade Deal Proves Elusive

With the U.S.-led war in Iraq ended and American military involvement in Afghanistan winding down, President Barack Obama has sought to pivot the country's foreign policy focus towards Asia. One aspect of that pivot is the negotiation of a free-trade agreement among 12 Pacific Rim nations. But as Obama leaves this week on a trip to four Asian countries he has found it very difficult to complete the trade pact. VOA's Ken Bredemeier has more from Washington.
Video

Video Autistic Adults Face Housing, Job Challenges

Many parents of children with disabilities fear for the future of their adult child. It can be difficult to find services to help adults with disabilities - physical, mental or emotional - find work or live on their own. The mother of an autistic boy set up a foundation to advocate for the estimated 1.2 million American adults with autism, a developmental disorder that causes communication difficulties and often social difficulties. VOA's Faiza Elmasry reports.
AppleAndroid