Researchers Find A Way To Listen In On Calls Made From Samsung Phones

Megalith

24-bit/48kHz
Staff member
Joined
Aug 20, 2006
Messages
13,000
It seems that Samsung has inadvertently allowed a select few to play NSA.

Once the handset is connected, the base station pushes firmware to its baseband processor, a chip that handles voice calls, and that firmware routes the calls through the malicious base station from where they are directed to a proxy that records calls and sends them to the attacker. All of this happens without the user ever knowing about it, they can continue to make and receive calls while they’re recorded in the background as if the line had a wiretap on it.
 
Now everyone can get in on the fun! NSA's "Nosey Smurf" Home Edition.
 
Base station?

I found another article that states more clearly that the attack "requires an OpenBTS base station to be established and located near target handsets."

The wikipedia article for OpenBTS notes that this sort of attack has been a problem since 2010.

What makes this different, then?
 
Base station?

I found another article that states more clearly that the attack "requires an OpenBTS base station to be established and located near target handsets."

The wikipedia article for OpenBTS notes that this sort of attack has been a problem since 2010.

What makes this different, then?
Good detective work. Sounded like it required something more difficult than the headline sounds.
 
Back
Top