<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security</title>
	<atom:link href="http://blog.m-sec.net/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.m-sec.net</link>
	<description>When security is not enough</description>
	<lastBuildDate>Tue, 13 Nov 2012 20:58:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Android 4.2 still vulnerable to SIM Toolkit attack</title>
		<link>http://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/</link>
		<comments>http://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/#comments</comments>
		<pubDate>Tue, 13 Nov 2012 20:58:39 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[premium]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=146</guid>
		<description><![CDATA[A couple of hours ago the update to Android 4.2 has been made available. One of the new security features is that it also protects from the premium SMS when an app tries to send them. How Android knows about premium messages is that it reads an XML list where each country has it&#8217;s own [...]]]></description>
			<content:encoded><![CDATA[<p>A couple of hours ago the update to Android 4.2 has been made available. One of the new security features is that it also protects from the premium SMS when an app tries to send them.</p>
<p>How Android knows about premium messages is that it reads an XML list where each country has it&#8217;s own defined premium rate numbers and how many digits those numbers need to have. Below you will find such protection example. I have used a malware app which was sending a message to a 6 digit number. Since in Romania we have 4 digits for premium numbers, the operating system allows it to send the text. As soon as it&#8217;s sent, I get a reply from the network informing me that the destination is not allowed (in Romanian). Then I modified the app to send to 1263 number. This time I got prompted by a dialog saying that I&#8217;m going to be charged for this operation. I even allowed it once and the reply from the mobile network is that I do not have enough credit &#8211; since my balance is zero &#8211; so this time it really was a premium rate number.</p>
<p><iframe src="https://www.youtube.com/embed/nkND9edVszQ?rel=0" frameborder="0" width="560" height="315"></iframe></p>
<p>Another thing I wanted to check was if with this update I am going to be protected against premium SMS SIM Toolkit attack. However, the STK.apk icon was not visible after this update. If you are also in this situation after the Android 4.2 update, you will need to re-enable SIM PIN protection and the issue is solved &#8211; you can see the SIM Toolkit app in the menu.</p>
<p>Now, since the Android 4.2 protects also against the basic regular SMS app when you want to send a text to a premium number by yourself, I could not see any reason for not protecting also against SIM Toolkit attack since the STK.apk is involved. The result?</p>
<p><iframe src="https://www.youtube.com/embed/ky5br8yQ5QQ?rel=0" frameborder="0" width="560" height="315"></iframe></p>
<p>As you can see, the phone sends by itself a text message to a premium rate number, no protection involved from Android. Again I get the same reply from the network saying that I don&#8217;t have enough funds.</p>
<p>So, there it is: you are still vulnerable against SIM Toolkit attack with the new Android 4.2</p>
<div id="tweetbutton146" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fandroid-4-2-stk-attack-vulnerable%2F&amp;via=msecnet&amp;text=Android%204.2%20still%20vulnerable%20to%20SIM%20Toolkit%20attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fandroid-4-2-stk-attack-vulnerable%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>avast Mobile Security is sending SMS without user knowledge</title>
		<link>http://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/</link>
		<comments>http://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/#comments</comments>
		<pubDate>Sat, 15 Sep 2012 17:54:45 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[avast]]></category>
		<category><![CDATA[premium rate]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sms]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=132</guid>
		<description><![CDATA[UPDATE: I have been contacted by Avast to clarify this SMS issue and I&#8217;m working with them to fix this. I think I found the bug and, if proven, it&#8217;s something really funny. I hope I&#8217;ll be able to update you soon as I am leaving to EUSecWest conference. UPDATE2: It was not the bug [...]]]></description>
			<content:encoded><![CDATA[<p>UPDATE: I have been contacted by Avast to clarify this SMS issue and I&#8217;m working with them to fix this. I think I found the bug and, if proven, it&#8217;s something really funny. I hope I&#8217;ll be able to update you soon as I am leaving to EUSecWest conference.</p>
<p>UPDATE2: It was not the bug I was thinking of. After having a few communication messages with Avast, who actually were very helpful, I have to agree with them that <span style="text-decoration: underline;"><strong>this was NOT something they did on purpose</strong></span> &#8211; and I didn&#8217;t think so at all -  and also &#8220;<span style="text-decoration: underline;"><strong>it does not affect a lot of users as it requires special order of tasks to occur</strong></span>&#8220;. Indeed I was able to reproduce the bug by recording my steps and performing them on different devices. Maybe it was bad luck for me to discover these steps, but I am happy that I discovered the bug so that Avast&#8217;s customers will feel safer. Another thing I want to note is that Avast has issued a test update (only available to few until it will go into production), I applied the fix and <span style="text-decoration: underline;">I can confirm the issue is fixed now</span>. Great work Avast! Really fast response and much interest showed in solving the problem.</p>
<p>&nbsp;</p>
<p>A couple of days ago, I have installed on a test Android based phone the <a title="Avast mobile security" href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5hdmFzdC5hbmRyb2lkLm1vYmlsZXNlY3VyaXR5Il0." target="_blank">avast Mobile Securit</a>y solution from Google Play &#8211; the free version. After a few days when this antivirus solution was turning on the WiFi or the mobile data plan by itself, during the night, I chose to uninstall it.</p>
<p>Now something new came to my attention: I was checking my balance on the phone and noticed that 0.12 EUR were missing. Hmm, maybe I have sent a message to some of my Roaming SIM cards. I logged on to my account to check why I have been billed. I noticed that indeed a message was sent to a number outside my country, but after checking the number I realized this number was not mine.</p>
<p>See the below screenshot from my account:</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_sms.png"><img class="alignnone  wp-image-133" title="avast_sms" src="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_sms.png" alt="Avast sends SMS" width="601" height="255" /></a></p>
<p>&nbsp;</p>
<p>So I looked for the country code: this number - <strong>420720001669</strong> &#8211; is from Czech Republic. Searching for this number on the web revealed that avast is actually sending this message. First occurrence from <a title="AVAST SMS" href="http://forum.universfreebox.com/viewtopic.php?t=37978" target="_blank">here</a>:</p>
<blockquote><p>Même problème, je viens de voir sur mon suivi un SMS vers le 420720001669 facturé à 19cts envoyé le 27 aout.</p>
<p>Il me semble que ça coïncide avec l&#8217;installation d&#8217;Avast Anti-Theft qui a l&#8217;autorisation d&#8217;envoyer des SMS. Et comme de par hasard AVAST software est une compagnie Tchèque &#8230;</p></blockquote>
<p>which translated would mean:</p>
<blockquote><p>Same problem, I just saw on my monitor SMS to 420720001669 charged 19cts sent on August 27.</p>
<p>It seems to me that it coincides with the installation of Avast Anti-Theft that has permission to send SMS messages. And as coincidence AVAST Software is a Czech company &#8230;</p></blockquote>
<p>Second result from <a title="Avast SMS" href="http://foros.orange.es/showthread.php?31265-SMS-que-aparece-en-mi-lista-de-llamadas" target="_blank">here</a></p>
<blockquote><p>Buenos días, esta mañana al consultar mi lista de llamadas me aparece lo siguiente:</p>
<p>24/08/2012 420720001669 ENVÍO SMS 08:12:02 1 MENSAJE</p>
<p>A esa hora no he enviado ningún SMS me pueden decir a q corresponde dicha numeración? El SMS tiene un coste de 60 cent.</p></blockquote>
<p>.. and translated:</p>
<blockquote><p>Good morning, this morning to check my call list I get the following:</p>
<p>08/24/2012 8:12:02 420 720 001 669 1 MESSAGE SENDING SMS</p>
<p>At this time I have not sent any SMS I can say that numbering corresponds aq? The SMS is charged at 60 cent.</p>
<p>Thank you.</p></blockquote>
<p>There was even a result from Google Play store, but couldn&#8217;t find in full so here is the screenshot along with the translation:</p>
<p>September 4, 2012 &#8211; &#8230; took a printout of the operator found to send an SMS to number 420720001669, struck on the forums that this number was Avast &#8230;</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_gplay_sms.png"><img class="alignnone size-full wp-image-136" title="avast_gplay_sms" src="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_gplay_sms.png" alt="" width="516" height="121" /></a></p>
<p>To me it&#8217;s pretty clear that it&#8217;s <strong>Avast</strong> fault for this. There was only one message sent from my number, but I haven&#8217;t used their software for more than 3 days so I can&#8217;t say for sure if the message is sent each week for example. I&#8217;ll try to contact them and see what they have to say about this.</p>
<p>However, this is something that it shouldn&#8217;t happen at all.</p>
<p>In case you have noticed this behavior also, please leave a comment here.</p>
<p>&nbsp;</p>
<div id="tweetbutton132" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2012%2Favast-mobile-security-is-sending-sms-without-user-knowledge%2F&amp;via=msecnet&amp;text=avast%20Mobile%20Security%20is%20sending%20SMS%20without%20user%20knowledge&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2012%2Favast-mobile-security-is-sending-sms-without-user-knowledge%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
		<item>
		<title>About SIM card tracker app</title>
		<link>http://blog.m-sec.net/2012/about-sim-card-tracker-app/</link>
		<comments>http://blog.m-sec.net/2012/about-sim-card-tracker-app/#comments</comments>
		<pubDate>Fri, 07 Sep 2012 13:14:22 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[orange]]></category>
		<category><![CDATA[proof]]></category>
		<category><![CDATA[sim tracker]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=115</guid>
		<description><![CDATA[Yesterday a tweet got my attention: &#8220;sim card tracker found on all orange sim cards. sends location, IMEI to operator, without your knowledge&#8220;.  As I am a little bit suspicious about this kind of things, I have asked to define &#8220;all&#8221; and &#8220;without your knowledge&#8221;. Immediately came the reply which confirmed my feeling: &#8220;the smart card [...]]]></description>
			<content:encoded><![CDATA[<p>Yesterday a tweet got my attention: &#8220;<em>sim card tracker found on all orange sim cards. sends location, IMEI to operator, without your knowledge</em>&#8220;.  As I am a little bit suspicious about this kind of things, I have asked to define &#8220;all&#8221; and &#8220;without your knowledge&#8221;. Immediately came the reply which confirmed my feeling: &#8220;the smart card sends it via SMS to the operator from the OS on the card&#8221;.</p>
<p>This tweet came during a great speech of Behrang Fouladi at 44con conference regarding .NET smart cards. His research is great and I want to make it clear from the beginning that I appreciate his work. The only thing that I don&#8217;t like is that generally people are trying to make a mountain out of a molehill from the fact that SIM sends a message to the operator.</p>
<p><strong>What is it about</strong>? SIM card has an app written on it and, when put into a different phone, it will automatically send a message to the operator informing it that now the customer uses another phone. Why this? Well the operator will automatically send you the MMS/Internet settings for this new phone so that you will not have to struggle with manual setup.</p>
<p><strong>Where is the tracking?</strong> Or how can we think about tracking when you are actually using the operator&#8217;s network and that at anytime the operator knows where you are, with a few meters precision, specially in a big city where they have more BTSs?</p>
<p>Some said this is the first time someone discovers such SIM app. I disagree &#8211; <a title="Bogdan Alecu - SIM Toolkit Attack" href="https://vimeo.com/37593949" target="_blank">I spoke about</a> this exactly behavior last year, at DeepSec 2011 conference. I haven&#8217;t given too much attention to it as I am inside the operator&#8217;s network and the SIM is sent to a number belonging to the operator. Here is the proof that people should&#8217;ve already knew about it:</p>
<p><iframe src="http://player.vimeo.com/video/49014603" frameborder="0" width="500" height="281"></iframe></p>
<p><a href="http://vimeo.com/49014603">Automatic SMS &#8211; Deepsec 2011</a> from <a href="http://vimeo.com/user7865508">Msec Net</a> on <a href="http://vimeo.com">Vimeo</a>.</p>
<p><strong>What about the message that is being sent? What does it contain?</strong><br />
Before answering this, I have to make a note: it might be possible that in another country Orange SIM cards to send some more details, so I can&#8217;t certainly say that the info is incorrect. Last time I checked, one year ago, SIM card was sending the IMEI only. This morning I performed another trace to find out if anything changed, but it didn&#8217;t. Even if it might request for the Cell ID also, that information is not sent in this message.</p>
<p>Here is the SMS SUBMIT captured data</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_1.png"><img class="alignnone size-medium wp-image-116" title="autosms_1" src="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_1-300x225.png" alt="Automatic SMS -1" width="300" height="225" /></a></p>
<p>Here is the destination number to where the message was sent &#8211; this case 5692</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_2.png"><img class="alignnone size-medium wp-image-117" title="Auto SMS sent - 2" src="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_2-300x225.png" alt="" width="300" height="225" /></a></p>
<p>Now here is the data inside it, containing the IMEI of my phone</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_3.png"><img class="alignnone size-medium wp-image-118" title="Auto SMS send - 3" src="http://blog.m-sec.net/wp-content/uploads/2012/09/autosms_3-300x225.png" alt="" width="300" height="225" /></a></p>
<p>In the worst case scenario we could think about this message as &#8220;tracker&#8221; if it was sent regularly, at specific time frames. But guess what -<strong> it isn&#8217;t</strong>! <strong>It is sent only when you turn on the phone and that&#8217;s it</strong>.  The good question is indeed why would the operator need this when they already know your phone&#8217;s IMEI, without making the SIM supply it in a message? I can only speculate on this, but I think the explanation is that a long time ago the operator asked for this as a convenience &#8211; maybe for law enforcements or not &#8211; in order to not search to deep in the log files.</p>
<p><strong>Is this thing new?</strong><br />
You will actually be surprised to find out that it&#8217;s started back in 2005 &#8211; at least in Romania. Searching for that 5692 number on the web, I found an <a title="Automatic message topic on Softpedia" href="http://forum.softpedia.com/lofiversion/index.php/t7860-8750.html" target="_blank">old topic</a> from a Romanian forum which was discussing about this automatic message:</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/Softpedia_5692_message.png"><img class="alignnone size-medium wp-image-119" title="Softpedia_5692_message" src="http://blog.m-sec.net/wp-content/uploads/2012/09/Softpedia_5692_message-300x141.png" alt="" width="300" height="141" /></a></p>
<p>As you can see, the topic date is <strong>26 December 2007</strong>!</p>
<p>Here are some excerpts from this topic, translated into English:</p>
<blockquote><p>six: Why on the Orange network, when I put my SIM card in a new or different phone I get on my Nokia display a message saying &#8220;Allow SIM card to send message&#8221;?</p>
<p>ionut.tabacaru: Starting 2 years ago, all these SIM cards automatically send a message to Orange, to a free of charge number 5692</p>
<p>kaytar: 3 days ago I&#8217;be put my SIM card into a different phone and I&#8217;ve received a message saying that in a few moments I will receive the WAP/MMS settings &#8230; and indeed I did get them</p>
<p>andreic: I am curious to find out what this SMS does</p>
<p>mailman: It communicates that the phone has changed and the network sends you the connection details for wap, mms</p></blockquote>
<p>If you don&#8217;t trust me, <a title="SMS topic" href="http://forum.softpedia.com/lofiversion/index.php/t7860-8750.html" target="_blank">open the topic</a> and use Google translate <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>Now about that &#8220;without your knowledge&#8221; thing. If you look closely on the above video you will notice that on Nokia phones you have the option to ask you about when the SIM cards wants to perform an action &#8211; you could allow it or not. Also during <a title="Bogdan Alecu - SIM Toolkit Attack" href="https://vimeo.com/37593949" target="_blank">my presentation</a> I said that these SIM toolkit messages generally inform the user by displaying &#8220;Sending message&#8221; info on the phone display. Not all phones can ask you if you allow the SIM to do that, but if you keep your eyes on the phone in the first few minutes after you turned it on, most probably you will notice this message being sent.</p>
<p>Finally I would like again to underline that I have nothing personal with Behrang, I appreciate all his findings, but this Orange SIM card tracker thing went a little bit too far.</p>
<p>Waiting for your comments <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<div id="tweetbutton115" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fabout-sim-card-tracker-app%2F&amp;via=msecnet&amp;text=About%20SIM%20card%20tracker%20app&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fabout-sim-card-tracker-app%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2012/about-sim-card-tracker-app/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>New GSM vulnerability</title>
		<link>http://blog.m-sec.net/2012/new-gsm-vulnerability/</link>
		<comments>http://blog.m-sec.net/2012/new-gsm-vulnerability/#comments</comments>
		<pubDate>Fri, 17 Aug 2012 16:42:37 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bogdan alecu]]></category>
		<category><![CDATA[http headers]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=108</guid>
		<description><![CDATA[I know I haven&#8217;t written on my blog for a long time (at least on the English version of it) so here comes an update. I have discovered a new vulnerability in the GSM network and I&#8217;m going to present it at EUSecWest which is held in Amsterdam, Netherlands on September 19/20. The presentation title is &#8220;Using HTTP [...]]]></description>
			<content:encoded><![CDATA[<p>I know I haven&#8217;t written on my blog for a long time (at least on the English version of it) so here comes an update.</p>
<p>I have discovered a new vulnerability in the GSM network and I&#8217;m going to present it at <a title="EUSecWest Bogdan Alecu" href="http://eusecwest.com/speakers.html" target="_blank">EUSecWest</a> which is held in Amsterdam, Netherlands on September 19/20. The presentation title is &#8220;<strong>Using HTTP headers pollution for mobile networks attacks</strong>&#8221; and basically I&#8217;m going to show how you could exploit the operator&#8217;s WAP homepage and perform attacks on a specific MSISDN.</p>
<p>There are also some other interesting talks, mostly on mobile security and let&#8217;s not forget about <a title="Mobile Pwn2Own" href="http://dvlabs.tippingpoint.com/blog/2012/07/20/mobile-pwn2own-2012" target="_blank">Mobile PWN2OWN</a>.</p>
<p>So, if you want to find some new interesting things about mobile security,  then please<a title="EUSecWest registration" href="https://eusecwest.com/register" target="_blank"> register for EUSecWest</a>!</p>
<p>See you in Amsterdam!</p>
<div id="tweetbutton108" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fnew-gsm-vulnerability%2F&amp;via=msecnet&amp;text=New%20GSM%20vulnerability&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fnew-gsm-vulnerability%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2012/new-gsm-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to protect from SIM Toolkit attack</title>
		<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/</link>
		<comments>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/#comments</comments>
		<pubDate>Thu, 22 Dec 2011 13:31:49 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bogdan alecu]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[STK]]></category>
		<category><![CDATA[text message]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=101</guid>
		<description><![CDATA[After all the media coverage of the subject (quite impressive) a lot of talks started, specially on Niebezpiecznik site from Poland, about how to protect from such attacks. Here are some good ideas: 1. On phones with Android you should remove the STK.apk application &#8211; right, but what if your phone is not rooted? Also [...]]]></description>
			<content:encoded><![CDATA[<p>After all the media coverage of <a title="SIM Toolkit attack Bogdan Alecu" href="http://blog.m-sec.net/2011/sim-toolkit-attack/" target="_blank">the subject</a> (quite impressive) a lot of talks started, specially on <a title="Niebezpiecznik Bogdan Alecu" href="http://niebezpiecznik.pl/post/odebranie-tego-sms-a-bedzie-cie-drogo-kosztowalo/" target="_blank">Niebezpiecznik</a> site from Poland, about how to protect from such attacks. Here are some good ideas:</p>
<p>1. On phones with Android you should remove the STK.apk application &#8211; right, but what if your phone is not rooted? Also since I&#8217;m not much into software / programming, I really doubt this would work because you will indeed not be able to access the SIM Toolkit application from your phone, but that doesn&#8217;t mean that your phone won&#8217;t be able to process STK commands issued by your SIM card</p>
<p>2. On phones with Windows Mobile, remove the HKEY_CLASSES_ROOT\SimToolkit.UI from the registry &#8211; this was something that I spoke of, but again, like the Android case, your SIM card still initiates commands, even though you can&#8217;t access the applications stored</p>
<p>3. Ask your mobile operator to disable premium rate charging &#8211; although somehow it&#8217;s true as your operator can disable calling to such number, it can&#8217;t disable texting <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  If you know such carrier, feel free to post a comment.</p>
<p>What else you should keep in mind is that the method used has to be convenient to everybody: people still want to use mobile banking, they still want to be able to check for the available credit from the Toolkit menu, they don&#8217;t want to jailbreak, root or cook their own ROM (this is for smartphones), not everyone holds a smartphone. Pretty tough to find a solution, right?</p>
<p>Well, not quite &#8211; I think the following solution is the most convenient as it takes care of most of the mentioned requirements.</p>
<p>So, in order to somehow<strong> protect from SIM Toolkit crafted SMS attack</strong>, just go to the settings of your messages, select the profile used for SMS and edit the message centre number by removing the last digit from it and save the settings (write down the full number first!). Pretty nice, right? So what have you just done? You have modified the number used by your phone in order to send messages. Yes, you still have access to the toolkit application, but you will not further be able to use any application that requires to send a message and also you will not be able to send any text messages anymore. However, receiving of SMS is not affected. Why to try the hard way &#8211; modify the entire software on your own &#8211; when there is a better and simpler solution? <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p><em>Disclamer: I am NOT responsible in any way for any wrong functionality of your phone, so if you have no idea what you&#8217;re doing, it&#8217;s better to leave it that way.</em></p>
<p>Even with this solution, be careful of one important thing: <span style="text-decoration: underline;">some carriers are charging you even if the message was not actually delivered</span> or you used a wrong message centre! Yes, you read that right: you could still be charged! The best way to test if your network operator does this is by using a prepay SIM with no credit on it, modify the message centre number and send a text message &#8211; your phone will inform you that it could not deliver the SMS. If you get back a message from the network saying that you don&#8217;t have enough funds, that&#8217;s bad: you will be charged anyway so you won&#8217;t be protected. Maybe you should switch to a different carrier?</p>
<p>I&#8217;m not saying that this method is the best, but it&#8217;s something it works in most of the cases. Let me know your findings.</p>
<div id="tweetbutton101" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fhow-to-protect-from-sim-toolkit-attack%2F&amp;via=msecnet&amp;text=How%20to%20protect%20from%20SIM%20Toolkit%20attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fhow-to-protect-from-sim-toolkit-attack%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack</title>
		<link>http://blog.m-sec.net/2011/sim-toolkit-attack/</link>
		<comments>http://blog.m-sec.net/2011/sim-toolkit-attack/#comments</comments>
		<pubDate>Thu, 17 Nov 2011 18:03:04 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[alecu]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[video]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=86</guid>
		<description><![CDATA[Hi all, I must say it was a real pleasure to attend the DeepSec 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I [...]]]></description>
			<content:encoded><![CDATA[<p>Hi all,</p>
<p>I must say it was a real pleasure to attend the <a title="DeepSec website" href="http://deepsec.net/" target="_blank">DeepSec</a> 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I still consider I did a pretty good job. By now I only got positive feedback <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>To answer some of the frequently asked questions:</p>
<p>1. The attack I showed has nothing to do with knowing the security keys as the response to the command is being sent even if there&#8217;s an error</p>
<p>2. The live demo worked &#8211; too bad I didn&#8217;t have a webcam to show you the target phone</p>
<p>3. There was no planning on who should volunteer for the live demo</p>
<p>4. The number you&#8217;ve seen during the demo is not the real number (only the first 3 digits were) and also wasn&#8217;t charged with 5 EUR &#8211; all it was just for the fun of it <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>5. The quickest way to protect is to change your phone to one that asks for your permission before allowing the SIM card to do something, or switch to another operator that doesn&#8217;t provide SIM cards with Toolkit Application on them &#8211; in Austria it&#8217;s at least one, as well in Romania <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>6. Pay attention to dual-SIM phones: some of them are not showing you the extra-menu belonging to the SIM application, so don&#8217;t get comfortable thinking that you&#8217;re protected</p>
<p>7. I&#8217;m not a hacker / cracker how the media likes to call the security specialists most of the times. My purpose was to make you aware of the danger of just using something like SMS</p>
<p>I was happy that right after the talk I&#8217;ve been contacted by <a title="Research In Motion" href="http://www.rim.com" target="_blank">RIM</a> in order to send them the details to fix this. It&#8217;s good to see that someone pays attention to these details. As long as they agree, I&#8217;ll keep you up to date with how the things are going.</p>
<p>Thank you Lynx, MiKa, Manuela for this opportunity! I&#8217;m pretty sure I&#8217;ll see you next year also <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  I also hope that next year there will be more people from Romania in the audience.</p>
<p>Below it&#8217;s a recording of my talk SMS fuzzing, SIM Toolkit Attack &#8211; I hope you&#8217;ll ignore my excitement <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /><br />
<iframe src="http://player.vimeo.com/video/32481186" frameborder="0" width="550" height="470"></iframe></p>
<p>The slides from the talk can be found here (<a title="SIM Toolkit Attack slides" href="http://prezi.com/lmmptb0qldfb/sim-toolkit-attack/" target="_blank">click me</a>).</p>
<p>I wait for your feedback!</p>
<div id="tweetbutton86" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/sim-toolkit-attack/feed/</wfw:commentRss>
		<slash:comments>18</slash:comments>
		</item>
		<item>
		<title>Communication cable in the world</title>
		<link>http://blog.m-sec.net/2011/communication-cable-in-the-world/</link>
		<comments>http://blog.m-sec.net/2011/communication-cable-in-the-world/#comments</comments>
		<pubDate>Sun, 16 Oct 2011 06:13:22 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=77</guid>
		<description><![CDATA[A few days ago I&#8217;ve discovered a website that provides a full map of the submarine cable that connects different countries. It has very good information: you can find the cable&#8217;s name, when it was fully operational, owner, landing points and sometimes a link. I was courious to see if there is some sea cable [...]]]></description>
			<content:encoded><![CDATA[<p>A few days ago I&#8217;ve discovered a website that provides a full map of the submarine cable that connects different countries. It has very good information: you can find the cable&#8217;s name, when it was fully operational, owner, landing points and sometimes a link. I was courious to see if there is some sea cable that connects Romania and it is:</p>

<a href="http://blog.m-sec.net/wp-content/gallery/other/seacable_ro.png" title="KAFOS - Sea cable Romania" class="shutterset_singlepic22" >
	<img class="ngg-singlepic" src="http://blog.m-sec.net/wp-content/gallery/cache/22__320x240_seacable_ro.png" alt="Sea cable Romania" title="Sea cable Romania" />
</a>

<blockquote><p>KAFOS (Karadeniz Fiber Optik Sistemi &#8211; Black Sea Fibre Optic System) is a submarine telecommunications cable system in the Black Sea.</p>
<p>Cable Length: 538 km<br />
Owners: Turk Telekom, Vivacom, <strong>Romtelecom</strong>, KPN, Telecom Italia Sparkle, Slovak Telekom, Rostelecom, BT</p>
<p>Landing Points</p>
<p>Igneada, Turkey<br />
Istanbul, Turkey<br />
Mangalia, Romania<br />
Varna, Bulgaria<br />
It has a transmission capacity of 622 Mbit/s, started operation on 13 June 1997.</p></blockquote>
<p>If you want to see how the countries are connected via sea/ocean access <a title="Submarine cable map" href="http://www.submarinecablemap.com/" target="_blank">http://www.submarinecablemap.com</a></p>
<p>Enjoy!</p>

<a href="http://blog.m-sec.net/wp-content/gallery/other/cable_tat14.png" title="Cable linking USA and Europe" class="shutterset_singlepic23" >
	<img class="ngg-singlepic" src="http://blog.m-sec.net/wp-content/gallery/cache/23__320x240_cable_tat14.png" alt="Cable TAT-14" title="Cable TAT-14" />
</a>

<h3>Landing Points</h3>
<ul class="features">
<li><a href="http://www.submarinecablemap.com/#">Igneada, Turkey</a></li>
<li><a href="http://www.submarinecablemap.com/#">Istanbul, Turkey</a></li>
<li><a href="http://www.submarinecablemap.com/#">Mangalia, Romania</a></li>
<li><a href="http://www.submarinecablemap.com/#">Varna, Bulgaria</a></li>
</ul>
<div id="tweetbutton77" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fcommunication-cable-in-the-world%2F&amp;via=msecnet&amp;text=Communication%20cable%20in%20the%20world&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fcommunication-cable-in-the-world%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/communication-cable-in-the-world/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The new aphonous</title>
		<link>http://blog.m-sec.net/2011/the-new-aphonous/</link>
		<comments>http://blog.m-sec.net/2011/the-new-aphonous/#comments</comments>
		<pubDate>Sun, 16 Oct 2011 03:28:41 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Phone]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=74</guid>
		<description><![CDATA[Personally I don&#8217;t like iPhone &#8211; paying a lot of money for something that&#8217;s supposed to be a phone &#8211; and watching the presentation of the new model has underlined my believes. I agree, it&#8217;s a phone with powerful hardware, but that&#8217;s it. I have a quote in my mind for this (I don&#8217;t know [...]]]></description>
			<content:encoded><![CDATA[<p>Personally I don&#8217;t like iPhone &#8211; paying a lot of money for something that&#8217;s supposed to be a phone &#8211; and watching the presentation of the new model has underlined my believes. I agree, it&#8217;s a phone with powerful hardware, but that&#8217;s it. I have a quote in my mind for this (I don&#8217;t know where I heard it):  &#8220;a computer is as powerful as the software it uses&#8221;. You could have the latest hardware equipped computer, if you install DOS on it then it&#8217;s worthless. The same thing goes with the &#8220;smart&#8221;-phones. So what iPhone has a function to control it by voice, called Siri &#8211; it&#8217;s just software! If tomorrow someone releases the same software for other types of phones, would it mean that I could possibly have an iPhone? <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>With no further comments, the new GlaDOSiri is here:<br />
<iframe src="http://www.youtube.com/embed/aTg00wIijNY?hd=1" frameborder="0" width="560" height="315"></iframe></p>
<div id="tweetbutton74" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fthe-new-aphonous%2F&amp;via=msecnet&amp;text=The%20new%20aphonous&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fthe-new-aphonous%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/the-new-aphonous/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack on DeepSec 2011</title>
		<link>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/</link>
		<comments>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/#comments</comments>
		<pubDate>Thu, 08 Sep 2011 15:20:02 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[STK]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=69</guid>
		<description><![CDATA[This is going to be my talk on DeepSec 2011. You may read more about it in an article on the DeepSec blog. There are a lot of good talks so my suggestion for you is to register for the conference and attend the talks. Tweet]]></description>
			<content:encoded><![CDATA[<p>This is going to be my talk on <a title="DeepSec 2011" href="https://deepsec.net/" target="_blank">DeepSec </a>2011. You may read more about it in an article on the <a title="DeepSec  2011SMS attack" href="http://blog.deepsec.net/?p=435" target="_blank">DeepSec blog.</a> There are a lot of good talks so my suggestion for you is to <a title="DeepSec 2011 registration" href="https://deepsec.net/register.html" target="_blank">register for the conference</a> and attend the talks.</p>
<div id="tweetbutton69" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack%20on%20DeepSec%202011&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Welcome to DeepSec</title>
		<link>http://blog.m-sec.net/2011/welcome-to-deepsec/</link>
		<comments>http://blog.m-sec.net/2011/welcome-to-deepsec/#comments</comments>
		<pubDate>Thu, 18 Aug 2011 20:50:01 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[gsm]]></category>
		<category><![CDATA[speaker]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=59</guid>
		<description><![CDATA[Unlike other times when I have discovered different bugs in the security of a telephony system, this time I have decided to make it public. So I wrote a research paper, looked for any security conference held this year in Europe and submitted it. Today when I have checked my email, I got one with [...]]]></description>
			<content:encoded><![CDATA[<p>Unlike other times when I have discovered different bugs in the security of a telephony system, this time I have decided to make it public. So I wrote a research paper, looked for any security conference held this year in Europe and submitted it.</p>
<p>Today when I have checked my email, I got one with the following subject: Your Talk Has Been Accepted for DeepSec 2011.  I was (and still am) really happy to have such great news. I really can&#8217;t wait to go there and get the public reaction. You may see the <a title="DeepSec schedule" href="http://deepsec.net/schedule.html" target="_blank">preliminary schedule here</a> and <a title="DeepSec talks details" href="http://deepsec.net/speaker.html" target="_blank">details about the talks here</a>.</p>
<p>Of course, it wasn&#8217;t easy &#8211; it involved a lot of work and learning, but the most important secret is fun. The fun you have when you do something that you like, the fun you have when everyone else tells you that &#8220;this is not possible, you won&#8217;t get anywhere if you try it that way&#8221; but still you do it and find something wrong in the way that thing was built, the fun you have when you put passion.</p>
<p>I need to say a big THANK YOU to Tobias Engel from Chaos Computer Club who has pushed me into learning more about GSM security and gave me some tips&amp;tricks about, along with encouraging me to write a research paper.</p>

<a href="http://blog.m-sec.net/wp-content/gallery/gsm/tobias_engel_ccc08.png" title="Tobias Engel at CCC 2008" class="shutterset_singlepic21" >
	<img class="ngg-singlepic" src="http://blog.m-sec.net/wp-content/gallery/cache/21__320x240_tobias_engel_ccc08.png" alt="Tobias Engel at CCC 2008" title="Tobias Engel at CCC 2008" />
</a>

<p>I won&#8217;t disclose yet what I&#8217;m going to present at DeepSec (though people who know me will find out easy), but it is tight to what Tobias discovered regarding the <a title="Curse of Silence Tobias Engel" href="http://berlin.ccc.de/~tobias/cos/s60-curse-of-silence-advisory.txt" target="_blank">Curse of Silence</a></p>
<p><iframe src="http://www.youtube.com/embed/lp1p-svV6o8?rel=0" frameborder="0" width="480" height="390"></iframe></p>
<div id="tweetbutton59" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fwelcome-to-deepsec%2F&amp;via=msecnet&amp;text=Welcome%20to%20DeepSec&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fwelcome-to-deepsec%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/welcome-to-deepsec/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
