Новости компьютерной безопасности:

  Latest News

NSO Group’s Mysterious MOBILE & WIRELESS ‘MMS Fingerprint’ Hack Revealed

С сайта: Vulnerability(cybersecuritynews.com)

NSO Group’s Mysterious MOBILE & WIRELESS ‘MMS Fingerprint’ Hack Revealed

Author: Guru Baran

The “MMS Fingerprint” attack, a previously unidentified mobile network attack purportedly employed by spyware company NSO Group, is referenced in a single sentence in an agreement between NSO and Ghana’s telecom regulator.

Because the hack is claimed to work on all three major smartphone operating systems (Blackberry, Android, and iOS), it was believed to be independent of the operating system and, hence, related to the MMS flow itself.

WhatsApp’s popular encrypted messaging service found a flaw in its system that let hackers install Pegasus spyware on customers’ smartphones in May 2019.

A WhatsApp voice call exploited the vulnerability, which might compromise a device without the owner’s knowledge.

WhatsApp sued NSO Group in October 2019. Since then, the US Supreme Court and US appeals court have rejected the NSO group’s requests to stop the case.

Most of this content was studied and talked about in open spaces. However, certain specifics found in a copy of a contract between the Ghanaian telecom regulator and an NSO Group reseller were not discussed.

📁🄳🄾🄲🅄🄼🄴🄽🅃

Agreement In The Records Of The Current Legal Dispute Between NSO And WhatsApp
“Within that contract, in Exhibit A-1, was a list of “Features and Capabilities” offered by NSO Group.

To telecom security specialists like us, these features were largely known; however, a feature title was (at first sight) unknown.

This was the ” MMS Fingerprint entry,” said Cathal McDaid, VP of technology at Swedish telecoms security firm ENEA.

cyber security newsAgreement describing MMS Fingerprint Feature

There is one sentence labeled under ‘Infection Assisting Tools,’ an “MMS Fingerprint” feature in that document’s list of “Features and Capabilities” that the NSO Group provides.

An MMS Fingerprint might function via,

  • Reveal the target device and OS version by sending an MMS to the device. 
  • No user interaction, engagement, or message opening is required to receive the device fingerprint.

Since not all phones were MMS-capable at the time, a part of the procedure uses the SMS flow to initiate the process, which then performs an HTTP GET to determine the exact location of the MMS payload.

According to reports, this HTTP GET contains user device information. It was believed that this might be when the MMS Fingerprint might be lifted, and information about specific devices could be disclosed.

cyber security news(HTTP GET) received from the targeted handset
With a few random sim cards, ENEA demonstrated that it was feasible, and it appears that the NSO Group’s claims are most likely accurate.

Researchers recovered the UserAgent and x-wap-profile fields of the device using this method.

The OS and device are identified with the first. The second one links to a User Agent Profile file that lists a mobile device’s capabilities.

The researchers could hide the process by altering the binary SMS element to a silent SMS and modifying the TP-PID value to 0x40. As a result, the targeted person’s phone is empty, and no MMS contentis visible on the targeted device.

“Attackers could use this information to exploit specific vulnerabilities or tailor malicious payloads (such as the Pegasus exploit) to the recipient device type Or it could be used to help craft phishing campaigns against the human using the device more effectively.”

According to their examination over the past few months, the company reported that it had not seen any usage of this vulnerability in the wild.

Recommendation
  • Mobile users can turn off MMS auto-retrieval on their cell phones to stop the device from connecting automatically.
  • Mobile operators might consider blocking internet access from devices via the MMS ports; even if the message was received, it would not connect to the IP address controlled by the attacker.



#Cyber_Security_News #Information_Security #Vulnerability #cyber_attack #cyber_security #cyber_security_news #MMS_Fingerprint

Оригинальная версия на сайте: NSO Group’s Mysterious MOBILE & WIRELESS ‘MMS Fingerprint’ Hack Revealed
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.