obile network attack evolutionnnMobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shiel...
obile network attack evolutionnnMobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.nMany networks are still reluctant to implement appropriate protection measures in legacy systems.
But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.
This talks discusses mobile network and SIM card attacks that circumvent common protection techniques to illustrate the ongoing mobile attack evolution.
The evolution is exemplified by new advanced attack vectors against mobile communication and SIM cards: Mobile calls and identities are known to be weakly protected, but network progressively rolled out patches to defeat hacking tools.
We will discuss â and release â tools to measure whether these changes are effective.
SIM cards were identified as a remote exploitation risk this year: Unnoticed by the victim, an attacker can take control over a card by sending a few binary SMS.
Network operators started filtering binary SMS and patched some of their weak SIM card configurations in response to vulnerability research.
The talk looks at filtering evasion techniques and discloses new configuration vulnerabilities present in many cards world-wide.nnSpeaker: Karsten Nohl Luca MelettenEventID: 5449nEvent: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]nLocation: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; GermanynLanguage: englishnBegin: Fri, 12/27/2013 17:15:00 +01:00nLizenz: CC-by