Hacking mobile phones by sending SMS can become a trend in the near future, researchers have warned about this at a conference on information security, Black Hat 2009 last week.
In recent times, people increasingly prefer to use their phones to share confidential data, such as when banking online, this is disturbing information. We can not preward off the delivery of SMS, even though we requested it or not, but had to be with him .To find distinction between malicious and normal spam message SMS is difficult because they are not obvious.
At the conference Black Hat, it was demonstrated that even a sane phones are not adventurous-minded users are subject to real danger. Smartphones unsuspecting people break into offline mode, started to go to sites with pornography or viruses, and even turned into a zombie-analogue computers, controlled by others for spam mailings.
Famous hacker Charlie Miller, who famous of him inspections on the strength of Apple products and other companies, along with the Berlin Technical University student Colin Mallinerom demonstrated a way to turn off the iPhone on your network by sending him one text message, which is the phone user could not even see. In the operating system the device to build malicious software, which allows to remotely control the iPhone, and forces him to send 500 messages to a number. The messages contain the necessary commands to attack and further subversion.
Miller noted that attacks via SMS so attractive, that certainly will have a large spread, since in this case is a key feature of mobile phones, which can not be turned off. «This is a very powerful attack vector. All that I know is your phone number. At any moment I can Send to a malicious SMS. Mobile is always turned on, from its holder does not depend - this is an excellent vector of attack », - cynically ironiziruet hacker.
Criminals can use not only defects in the software. Hackers can take hacking the phone, due to their factory settings are too open for incoming traffic.
The experts offered to help interested companies to save mobile communication of vulnerabilities, and thereby protect their clients from possible hacker attacks.
Source: ®