Android cell phones from Defcon-participants may cracked

0
322

On the Defcon-hackersconferentie are Android phones of participants in a refined way attacked. This would be data connections are monitored via cdma and 4g networks run. The attacker is not yet known.

In a message on the Full-Disclosure mailing list for reports of a person under the alias Coderman that last weekend in the hotel in Las Vegas man-in-the-middle attacks are carried out. This would be a rootkit to kernelniveau – also known as ring0 – on Androidmobieltjes have managed to penetrate. In this case, the data traffic via cdma and wimax networks went are bugged. This was probably a vulnerability used in Sprints wimax network operated by Clearwire.

Coderman claims that the rootkit is probably clogged is a upgrade for Android mobiles or a Java application. Users that have been infected, according to Coderman can have problems with the data throughput over 4g, and cdma connections. Also would Android applications regularly crash and reboots take a lot longer. On Hackernews the hack by another Defcon attendee confirmed.