Join Our Community!Join Our WhiteHat Group On facebook & Stay Updated.

This bug Allows Hackers to Make Calls from Your Phone Number

Ghost Telephonist vulnerability Allows Hackers to Make call from any number –


This bug Allows Hackers to Make Calls & Texts from your Phone Number
This bug Allows Hackers to Make Calls & Texts from your Phone Number

Chinese researcher uncovered another cell phone hacking system they have made amid a discussion at the current year’s Black Hat hacker conference in Las Vegas, Nevada. The researchers are from Qihoo 360’s Unicorn Team.

 

The Unicorn Team represents considerable authority in hacking radio and cell innovation. On Thursday, July 27th, the Unicorn Team conveyed an introduction at Black Hat on their new research into wireless hacking.

 

The introduction was titled “Ghost Telephonist” Link Hijack Exploitations in 4G LTE CS Fallback. The bug found by the Unicorn Team includes an issue with the Circuit Switched Fallback on 4G LTE cell systems. With 4G LTE the cell organize a confirmation check is performed to guarantee a gadget and number is right.

 

Be that as it may, when going between various cell towers with more established systems like 2G, the confirmation check is not performed. This is done to keep the connections more steady or stable.

 

“The weakness found by the Unicorn Team is especially difficult to recognize. In the event that an attacker takes control of a victim phone number, the victim may never know.”

 

In the event that a hacker were to utilize the procedure found by the Unicorn Team, they could utilize it to take control of the victim’s online networking accounts. The weakness with 4G can cause huge issues for victims who are attacked through this system. Since web-based social networking locales like Facebook both take into account looking of client profiles by their telephone number, and enable a client to reset their secret key with a PDA.

 

An attacker that has picked up control of a victim’s number could then discover the victim’s web-based social networking record and afterward reset the password and pick up control of their online networking account.

 

The specialists with the Unicorn Team say they have reached the associations which make the measures for portable systems and have unveiled the weakness to them. As per the Unicorn Team, some cell specialist co-ops have effectively settled the issue and that others are at present taking a shot at actualizing answers for settle the issue.

 

The analysts have prescribed that cell specialist organizations change their confirmation procedure or to change to more secure advancements. One of the conceivable ways mobile phone clients could ensure themselves is by changing to quite mode. “On the off chance that you are in off-line mode, that implies your telephone as of now told the system, ‘I’m disconnected‘,” Lin Huang, an analyst with the Unicorn Team, told CNET.

 

Click hereΒ to join our Hacker Community and learn hacking free of costΒ 

READ MORE ON HACKER NEWS & ETHICAL HACKING –

CHINESE GOVERNMENT REQUIRING MUSLIMS TO INSTALL SPYWARE ON THEIR ELECTRONIC DEVICES

FANCY BEAR – LEAKED NSA EXPLOITS TO TARGET EUROPEAN HOTELS

TOP 10 OPERATING SYSTEM FOR HACKERS

WIFI HACKING – WIRELESS VULNERABILITIES & WEAKNESS

BEST HACKING TOOLS OR SOFTWARE WITH EXPLANATION

Comments

comments