'Ghost Telephonist' lets hackers take over phone numbers

Image
IANS Las Vegas
Last Updated : Jul 31 2017 | 8:57 AM IST

A group of Chinese researchers have demonstrated an "evil attack" called the "Ghost Telephonist" which allows hackers to take over phone numbers and gather call and message content.

The demonstration was made on Sunday by the UnicornTeam researchers from 360 Technology, China's leading security company, at the ongoing hacker summit Black Hat USA 2017 here, reports Xinhua news agency.

In the team's presentation, security researchers introduced one vulnerability in CSFB (Circuit Switched Fallback) in 4G LTE network.

In the CSFB procedure, the researchers found the authentication step is missing.

"Several exploitations can be made based on this vulnerability," Unicorn Team wireless security researcher Huang Lin, told Xinhua.

"We have reported this vulnerability to the Global System for Mobile Communications Alliance(GSMA)".

The team presented a scenario where one could reset a Google account password using a stolen mobile number.

After hijacking a user's communication, researcher signed in the user's Google Email and clicked "forget the password". Since Google sends verification code to the victim's mobile, attackers can intercept the SMS text, thereby resetting the account's password.

The victim keeps online in 4G network unaware of the attack.

A lot of internet application accounts use verification SMS to reset the login password, which means an attacker can use a phone number to start password reset procedure then hijack the verification SMS.

According to the researchers, the attacker can also initiate a call or an SMS by impersonating the victim.

Furthermore, Telephonist Attack can obtain the victim's phone number and then use the phone number to make an advanced attack.

The victim will not sense being attacked since no 4G or 2G fake base station is used and no cell re-selection. These attacks can randomly choose victims or target a given victim.

The research team proposed many countermeasures to operators and Internet service provider as well. Researchers say now they are collaborating with operators and terminal manufactures to fix this vulnerability.

--IANS

ksk

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Jul 31 2017 | 8:50 AM IST

Next Story