AOH :: ISNQ6581.HTM

Hacker Spoofs Cell Phone Tower to Intercept Calls




Hacker Spoofs Cell Phone Tower to Intercept Calls
Hacker Spoofs Cell Phone Tower to Intercept Calls



http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/ 

By Kim Zetter  
Threat Level
Wired.com
July 31, 2010

LAS VEGAS -- A security researcher created a cell phone base station 
that tricks cell phones into routing their outbound calls through his 
device, allowing someone to intercept even encrypted calls in the clear.

The device tricks the phones into disabling encryption and records call 
details and content before they.re routed on their proper way through 
voice-over-IP.

The low-cost, home-brewed device, developed by researcher Chris Paget, 
mimics more expensive devices already used by intelligence and law 
enforcement agencies -- called IMSI catchers -- that can capture phone 
ID data and content. The devices essentially spoof a legitimate GSM 
tower and entice cell phones to send them data by emitting a signal 
that's stronger than legitimate towers in the area.

"If you have the ability to deliver a reasonably strong signal, then 
those around are owned," Paget said.

Paget's system costs only about $1,500, as opposed to several hundreds 
of thousands for professional products. Most of the price is for the 
laptop he used to operate the system.

[...]


--
Visit InfoSec News!
http://www.infosecnews.org/ 


Site design & layout copyright © 1986-2014 CodeGods