• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 15th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Android

Security Flaw in Samsung Galaxy Devices Lets Attackers Record Phone Calls

November 16th, 2015 Agan Uzunovic Android, Privacy, Security 0 comments
Security Flaw in Samsung Galaxy Devices Lets Attackers Record Phone Calls
Share on FacebookShare on Twitter

A telephone tower-like device (IMSI-catcher) can be used for recording phone calls from the latest versions of Samsung Galaxy, demonstrated by two German researchers.

IMSI-catchers are mostly used in laboratories for testing purposes, but they can be bought by anyone who wishes to have one.

So, what happens is anyone having these catchers can mimic the original mobile phone towers and can make mobile phones connect to their fake network.

Researchers demonstrated this at PacSec security conference in Tokyo, where they used OpenBTS stations and attacked latest smartphones from Galaxy family like S6 edge, Note 5 and S6.

What they found in common that all the devices had “Shannon” baseband chips, which were used for controlling the phone’s features.

Daniel Komaromy and Nico Golde at PacSec security conference in Tokyo

Daniel Komaromy and Nico Golde at PacSec security conference in Tokyo

So, if hackers use Openbase stations to push baseband chip to update the firmware with a malicious firmware they can make the device reroute all the calls through the proxy. At the moment, the person in charge of a proxy can record all the phone calls made from victim’s phone, without him being notified.

Researchers have provided technical details of their demonstration to Samsung and work on fixing the issue has already been started, so we can have an update in the form a patch from Samsung any time soon.

Using IMSI catchers for recording phone call is nothing new; previously Chinese airlines have been accused of using these catchers on some of their planes.

[fullsquaread][/fullsquaread]

The PacSec security conference has always unleashed major security bugs as each successful bug disclosure wins $425,000 to the team of presenters. Though, this year the prize has been reduced due to several different programs launched by companies themselves for disclosure of bugs, but still 2 major bugs has already been unleashed in the conference.

If you are concerned about your privacy there are two programs that can help you to identify fake cellphone towers and bust them. One is a SnoopSnitch app for Android devices that can detect Stingray Mobile Trackers used by the US security and law enforcement agencies. 

Another program that helps to pinpoint every fake cell tower spying on you is Overwatch service capable of systematically locating the interceptors.

  • Tags
  • Flaw
  • hack
  • Privacy
  • Samsung
  • security
  • Smartphone
  • Stingray
  • Surveillance
  • Vulnerability
Facebook Twitter LinkedIn Pinterest
Previous article Facebook blocked anti-ISIS group setup by Anonymous hours before Paris attacks.
Next article Anonymous Waging War on ISIS, Vows to Hunt Down Terrorists After Paris Attacks
Agan Uzunovic

Agan Uzunovic

Agan Uzunovic is a Bosnian journalist who is working for the country's largest newspaper. He has a keen interest in reporting on activism and hacktivism. He is also a contributor at U.S based Revolution News media. Agan reports and writes for HackRead on IT security related topics.

Related Posts
Unpatched MS Exchange servers hit by cryptojacking malware

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells

FBI accessing computers across US to remove malicious web shells

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
ParkMobile parking app data breach - 21M user records stolen, sold
Hacking News

ParkMobile parking app data breach - 21M user records stolen, sold

Unpatched MS Exchange servers hit by cryptojacking malware
Security

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data
Leaks

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us