Find a Question:
Hacker Nohl shows eavesdrop conversations over the leak in telecom infrastructure
The well-known German hacker Karsten Nohl demonstrated how vulnerabilities in the network routing controls calls and SMS messages, outside off. With just a phone number he could overhear conversations of a politician and figure out his location.
Karsten Nohl demonstrated to intercept a broadcast of 60 Minutes interviews a member of the US Congress and to identify its location in Washington. Nohl had previously only need the phone number of the politician. He could keep track of who the politician all called. According to Nohl is automating its method for large-scale interception.
As an employee of Security Research Labs Nohl exploring with Tobias Engel of Sternraute vulnerabilities or SS7 Signalling System No. 7. The basis of this set of protocols dating back to the seventies, but providers still use for network servers worldwide. These systems give as phone calls and text messages by providers and use them for settling roaming charges and the exchange of information on subscribers between servers.
That includes SS7 lack of security has been known. German hackers made their 2014 are already known . Nohl and his team investigate since the network providers worldwide. “Mobile networks are the only places where these leaks can be closed. There is no global overview on SS7. Each mobile network must take action to protect its customers. And that’s difficult.”
Specifically know the Germans to exploit two vulnerabilities. The first involves the hijacking of the forwarding feature, whereby an attacker at the network indicates that calls to a particular number must be routed through its own device. The second method requires the introduction of antennas in order to monitor all calls and messages in a particular area. The hackers would hereby give the carrier command to issue a temporary encryption key to be able to intercept the encryption of 3G traffic.
According to Nohl vulnerabilities are especially at risk for political leaders and business leaders, from whom information from private conversations can be of value. According to him, the vulnerabilities known to intelligence services and worldwide who are not plugged benefits if the leak.
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!