Monday, July 15, 2013

Hackers turn Verizon signal booster into a mobile hacking machine




A group of hackers from security firm iSEC found a way to tap right into verizon wireless cell phones using a signal-boosting devices made by Samsung for Verizon and cost about $250.


They hack Verizon's signal-boosting devices, nows as femtocells or network extenders, which anyone can buy online, and turned it into a cell phone answer tower small enough to fit inside a backpack capable of capturing and interceptingn all calls, text messages and data sent by mobile devices within range.


"This is not about how the NSA would attack ordinary people. This is about how ordinary people would attack ordinary people," said Tom Ritter, a senior consultant, iSEC.


They declined to disclose how they had modified the softwqre on the device and but they plan to give more elaborate demonstrations in various hacking conference this year.


Verizon Wireless already released a Linux software update in March to fix the flaw that prevents its network extenders from being compromised in the manner reported by ritter and DePerry.


They claimed that, with a little more work, tey could ahve weaponized it for stealth attacks by packaging all equipment needed for a surveillance operation into a backpack that could be dropped near a target they wanted to monitor.


This particular femtocell taps int o Verizon phones. However, they believe i tmight be possible to find a similar problem with femtocells that work with other providers.


- Hackers Manual

2 comments: