iPhone Security Issue Opens Door to SMS Spoofing
|iPhone Security Issue Opens Door to SMS Spoofing|
Jailbreak hacker and security researcher pod2g today revealed a newly-discovered security issue in all versions of iOS that could allow malicious parties to spoof SMS messages, making a recipient think that a message came from a trusted sender when it in fact came from the malicious party.
The issue is related to iOS's handling of User Data Header (UDH) information, an optional section of a text payload that allows users to specify certain information such as changing the reply-to number on a message to something other than the sending number. The iPhone's handling of this optional information could leave recipients open to targeted SMS spoofing attacks.
In the text payload, a section called UDH (User Data Header) is optional but defines lot of advanced features not all mobiles are compatible with. One of these options enables the user to change the reply address of the text. If the destination mobile is compatible with it, and if the receiver tries to answer to the text, he will not respond to the original number, but to the specified one.
Most carriers don't check this part of the message, which means one can write whatever he wants in this section : a special number like 911, or the number of somebody else.
In a good implementation of this feature, the receiver would see the original phone number and the reply-to one. On iPhone, when you see the message, it seems to come from the reply-to number, and you [lose] track of the origin.
pod2g highlights several ways in which malicious parties could take advantage of this flaw, including phishing attempts linking users to sites collecting personal information or spoofing messages for the purposes of creating false evidence or gaining a recipient's trust to enable further nefarious action.
In many cases the malicious party would need to know the name and number of a trusted contact of the recipient in order for their efforts to be effective, but the phishing example shows how malicious parties could cast broad nets hoping to snare users by pretending to be a common bank or other institution. But with the issue resulting in recipients being shown the reply-to address, an attack could be discovered or thwarted simply by replying to the message, as the return message would go to the familiar contact rather than the malicious one.
Source: iPhone Security Issue Opens Door to SMS Spoofing - Mac Rumors
|08-18-2012, 04:16 PM||away - #2|
|08-18-2012, 08:04 PM||away - #3|
they need to fix that immediately, cause somebody is gonna get caught up
|08-18-2012, 08:05 PM||away - #4|
spoofcard has been around years allowing you to do this..
|08-18-2012, 11:28 PM||away - #5|
Teach me how to do this and link me the program to exploit!
|08-19-2012, 09:59 AM||away - #6|
| Meek Mill – Levels (to This Sh*t) |
New reply 6 minutes ago - 79 comments - by Joe DC
| Sony Just Slapped Microsoft In The Face! |
New reply 42 minutes ago - 58 comments - by Nest
| The Green Ranger Returns |
New reply 10 minutes ago - 58 comments - by Jesszman
| No Limit Vs. Wu-tang Clan Vs. Death Row |
New reply 51 minutes ago - 52 comments - by yonatan15
| 50 Cent Attends Daja Robinsons Funeral & Pays For ... |
New reply 28 minutes ago - 79 comments - by KingP1n
| Will & Jaden Smith, Dj Jazzy Jeff And Alfonso Ribe... |
New reply 52 minutes ago - 82 comments - by KingP1n
| Ebro Grills Riff Raff On Being A Serious Rapper On Hot... |
New reply 32 minutes ago - 98 comments - by DR JAYY
| Possible Yeezus Tracklisting? |
New reply 1 hour ago - 58 comments - by Sir Bangz
|Join us on Facebook. Check out the BX fan page and hit the Like button.||Follow BX on Twitter to get instant hot topic alerts.||Enter your email address below and receive a daily hot topic newsletter.|
|5,319 fans of BX | none new today||4,300 following | none new today|