Rogue tower hacked6/18/2023 These rogue cell sites have various capabilities, from being able to track an individual phone, gather metadata about who you have been calling and for how long, to much more invasive surveillance such as intercepting SMS messages and what websites you’re visiting on your phone. You should be scared, even though police departments everywhere and every government agency already has this capability. In less than a year, evil, bad hackers could be tapping into your cell phone or reading your text message from the comfort of a van parked across the street. From what we saw at HOPE in New York a few weeks ago, we’re just months away from being able to put a femtocell in a desktop computer for under $3,000. The balaclava-wearing hackers know it, too. The transceiver is the key hardware factor in the BTS station rig, which transmits and receives data between the BTS core software and the radio antenna.Software defined radios are getting better and better all the time. An attacker can perform commands on the BTS station’s transceiver module, if the attacker can send routine UDB traffic to the BTS station, as the control channel features no validation. This bug is as unsafe as the attacker’s skills. This is a classic remote code execution flaw (RCE) that allows the attacker run malicious code on the device. The second concern is a memory buffer overflow caused by enormous UDP packets. In this case, Zimperium suggests that companies bind the sockets used for control and data exchange only to the local interface (127.0.0.1), or install a firewall to stop external traffic. This allows the attacker to take remote control of the BTS station, remove information from the passing data, make changes to the GSM traffic, crash the BTS station, or worse. The cell towers are basically composed of software and radio equipment that allows mobile stations (cellular phones) to connect to the GSM, UMTS, and LTE networks.īTS stations for the gist of GSM telephony network and are used by service providers to pass on your SMS messages, transmit calls, and data packets from our phones to the mobile operator’s data center, which in turn relays the SMS messages to their destination, interconnect calls, and sends data packets over the Internet to the servers we are trying to reach.Īttackers can take advantage of the device’s built-in features by sending UDP packets to certain management ports (5700, 5701, 5702). The Zimperium researchers have said that the flaw is so critical that it allows hackers to abuse, hijack, and crash mobile cell towers.īTS (Base Transceiver Station) is the technical term used to define cellular phone towers we see plastered in our cities, towns, villages, and spread all over the fields, hills, and mountains. You and I are afraid of somebody hacking our smartphones and stealing critical information, but what happens when hackers hijack a whole cellular network by hacking into cellphone towers? No, this is not an empty threat because, security researchers from the mobile security firm, Zimperium have discovered three serious security flaws in BTS stations which can allow potential hacker remotely hijack the entire cell phone tower.
0 Comments
Leave a Reply. |