Weakness in the gsm protocol makes hijacking of telephone numbers possible

On the CCC-hackersconferentie in Berlin, a method is presented that allows hackers phone numbers, can hijack. Through a weakness in the gsm protocol allows attackers via the number of someone else to call.

The hack of the gsm protocol was revealed by Karsten Nohl of the German Security Research Labs. Nohl has in recent years repeatedly weaknesses in the gsm protocol, however. The latest hack makes several things possible; eavesdropping of mobile phone traffic, voice over someone else’s number, and the tracking of a device.

If a phone number has been hijacked, this is not to notice by the provider, and may be the rightful owner of the number on the high cost of hunting. It would also some networks possible to voicemails to listen to because the service only the telephone number checker for verification.

According to Nohl, the hack is possible because many of the gsm networks of weak encryptievormen use. It should be relatively easy to determine the extent of encryption on the screws, but not all providers would do this.

Nohl has set up a web site which is mapped in the extent to which European carriers are susceptible to the different types of hacks. He has also tools released that allow users to own their local network to test. The results can then be added to the website. There is still no information about the providers available. Of Belgian networks are already data available, and earlier this week came out that the network of Belgacom to be very susceptible for the eavesdropping of conversations.

Nohl gave no specific details about the hack but he assumes that visitors of the hackersconferentie in the next few weeks will try the techniques to duplicate.


Posted

in

by

Tags: