Hackers turn Verizon signal booster into a mobile hacking machine
Sunday, July 14, 2013
call interception,
hacker conference,
Hacking News,
interception,
iSec,
linux,
message hack,
mobile hacking,
surveillance,
Verizon
Edit
A group of hackers from security firm iSEC found a way to tap right into verizon wireless cell phones using a signal-boosting devices made by Samsung for Verizon and cost about $250.
They hack Verizon's signal-boosting devices, known as femtocells or network extenders, which anyone can buy online, and turned it into a cell phone tower small enough to fit inside a backpack capable of capturing and intercepting all calls, text messages and data sent by mobile devices within range.
"This is not about how the NSA would attack ordinary people. This is about how ordinary people would attack ordinary people," said Tom Ritter, a senior consultant, iSEC.
They declined to disclose how they had modified the software on the device and but they plan to give more elaborate demonstrations in various hacking conferences this year.
Verizon Wireless already released a Linux software update in March to fix the flaw that prevents its network extenders from being compromised in the manner reported by Ritter and DePerry.
They claimed that, with a little more work, they could have weaponized it for stealth attacks by packaging all equipment needed for a surveillance operation into a backpack that could be dropped near a target they wanted to monitor.
This particular femtocell taps into Verizon phones. However, they believes it might be possible to find a similar problem with femtocells that work with other providers.
Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
0 Response to "Hackers turn Verizon signal booster into a mobile hacking machine"
Post a Comment