News / Science & Technology

UN Warns on Mobile Cybersecurity Bugs to Prevent Attacks

A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013. A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
x
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
A woman holds up a SIM card, which she won in a June lottery, in Rangoon, Burma, June 24, 2013.
Reuters
A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cybersecurity risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES. The technology is still used on at least one out of eight SIMs, or a minimum of 500 million phones, according to Nohl.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview. "If you have a MasterCard number or PayPal data on the phone, we get that too."

IPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement.

Apple and Google declined comment.

CTIA, a U.S. mobile industry trade group based in Washington, D.C., said the new research likely posed no immediate threat.

"We understand the vulnerability and are working on it," said CTIA Vice President John Marinho. "This is not what hackers are focused on. This does not seem to be something they are exploiting."

You May Like

Ebola Death Toll Nears 5,000 as Virus Advances

West Africa bears heaviest burden; Mali toddler’s death raises new fears More

Jordan’s Battle With Islamic State Militants Carries Domestic Risks

Despite Western concerns that IS militants are preparing a Jordanian offensive, analysts call the kingdom's solid intel a strong deterrent More

Asian-Americans Assume Office in Record Numbers

Steadily deepening engagement in local politics pays off for politicians like Chinese-American Judy Chu More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Talks to Resume on Winter Gas for Ukrainei
X
Al Pessin
October 25, 2014 4:21 PM
Ukrainian and Russian officials will meet again next week in an effort to settle their dispute over natural gas supplies that threatens to leave Ukraine short of heating fuel for the coming winter. VOA’s Al Pessin reports from London the dispute is complex, and has both economic and geopolitical dimensions.
Video

Video Talks to Resume on Winter Gas for Ukraine

Ukrainian and Russian officials will meet again next week in an effort to settle their dispute over natural gas supplies that threatens to leave Ukraine short of heating fuel for the coming winter. VOA’s Al Pessin reports from London the dispute is complex, and has both economic and geopolitical dimensions.
Video

Video Smugglers Offer Cheap Passage From Turkey to Syria

Smugglers in Turkey offer a relatively cheap passage across the border into Syria. Ankara has stepped up efforts to stem the flow of foreign fighters who want to join Islamic State militants fighting for control of the Syrian border city of Kobani. But porous borders and border guards who can be bribed make illegal border crossings quite easy. Zlatica Hoke has more.
Video

Video Comanche Chief Quanah Parker’s Century-Old House Falling Apart

One of the most fascinating people in U.S. history was Quanah Parker, the last chief of the American Indian tribe, the Comanche. He was the son of a Comanche warrior and a white woman who had been captured by the Indians. Parker was a fierce warrior until 1875 when he led his people to Fort Sill, Oklahoma, and took on a new, peaceful life. As VOA’s Greg Flakus reports from Cache, Oklahoma, Quanah’s image remains strong among his people, but part of his heritage is in danger of disappearing.
Video

Video China Political Meeting Seeks to Improve Rule of Law

China’s communist leaders will host a top level political meeting this week, called the Fourth Plenum, and for the first time in the party’s history, rule of law will be a key item on the agenda. Analysts and Chinese media reports say the meetings could see the approval of long-awaited measures aimed at giving courts more independence and include steps to enhance an already aggressive and high-reaching anti-corruption drive. VOA’s Bill Ide has more from Beijing.
Video

Video After Decades of Pressure, Luxembourg Drops Bank Secrecy Rules

European Union finance ministers have reached a breakthrough agreement that will make it more difficult for tax cheats to hide their money. The new legislation, which had been blocked for years by countries with a reputation as tax havens, was approved last week after Luxembourg and Austria agreed to lift their vetoes. But as Mil Arcega reports, it doesn’t mean tax cheats have run out of places to keep their money hidden.
Video

Video Kobani Refugees Welcome, Turkey Criticizes, US Airdrop

Residents of Kobani in northern Syria have welcomed the airdrop of weapons, ammunition and medicine to Kurdish militia who are resisting the seizure of their city by Islamic State militants. The Turkish government, however, has criticized the operation. VOA’s Scott Bobb reports from southeastern Turkey, across the border from Kobani.
Video

Video US ‘Death Cafes’ Put Focus on the Finale

In contemporary America, death usually is a topic to be avoided. But the growing “death café” movement encourages people to discuss their fears and desires about their final moments. VOA’s Jerome Socolovsky reports.
Video

Video Ebola Orphanage Opens in Sierra Leone

Sierra Leone's first Ebola orphanage has opened in the Kailahun district. Hundreds of children orphaned since the beginning of the Ebola outbreak face stigma and rejection with nobody to care for them. Adam Bailes reports for VOA about a new interim care center that's aimed at helping the growing number of children affected by Ebola.

All About America

AppleAndroid