• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • Hacking phone firmware allows paging response attack on GSM

Hacking phone firmware allows paging response attack on GSM

Pierluigi Paganini August 28, 2013

Researchers at last USENIX Security Symposium demonstrated that hacking phone firmware it is possible to violate the security of mobile under the same area

Hacking phone firmware it is possible to interfere with other handsets  in the same area, the attack technique has been presented recently at USENIX Security Symposium by telecommunications researcher Kévin Redon.

Redon conducted a research with other two colleagues, Jean-Pierre Siefert and Nico Golde, they demonstrated that a hacker simply implementing their own baseband firmware based on OsmocomBB could violate the security of mobile telecommunication under the same area exploiting paging procedure in cellular networks.

With this attack technique based on the hacking phone firmware the researchers, at least for GSM, could hijack phone calls and SMS or perform a targeted denial of service attacks against single subscribers and as well against users belonging to a larger geographical area (e.g. Metropolitan area).

Despite numerous security vulnerabilities already exist on GSM, only few of them involve active adversaries. The hack is based on the capacity of modified mobile devices to respond before the phones that were initially intended to receive the calls and messages do. The researchers defined the process as “the race for the fastest paging response time.”

The paging mechanism is used by the network to notify an incoming service, once a phone is registered to a cell, it listens to only the Paging Channel  (PCH) broadcast downlink channel on the CCCH to save energy.

Mobile phones update their location only when they changes Location Area (LA), but can listen to any PCH from any BTS within this LA. The paging message carries Mobile Identity (IMSI/TMSI), each phone compares its IMSI and reply to the broadcasted information.

Hacking phone firmware Paging process

The team of researchers realized the hacking phone firmware modifying the baseband processor for some Motorola handsets and tricking some older 2G GSM networks into not delivering calls and messages. In particular they mounted the OsmocomBB baseband processor (which ran a simple version of the GSM stack) on two different Motorola phones (model C123 and C118),  after the hack both devices are in fact able to respond to specific paging requests, or calls.

The concept is simple, modified devices are able to interfere with those networks catching messages sent from base stations and not delivering them to legitimate recipients, in this way hackers could shut down communications within the area. It must be also considered that the paging mechanism implemented in GSM standard is also used in UMTS and LTE standards.

It’s clear that the hacking phone firmware success depends on numerous factors such as response time on the attacker’s mobile, response time of the victim’s device and network. Response time is related to various manufacturers, Redon’s team for example provide a timely response of around 180 milliseconds. Following the measures conducted on various phone:

Hacking phone firmware Paging response time

The three researchers revealed to have conducted the sperimentation in and around Berlin, the hacking phone firmware allows attackers to “perform targeted denial of service attacks against single subscribers and as well against large geographical regions within a metropolitan area,”, they also added that the technique is effective against numerous German mobile phone operators including O2, Vodaphone, T-Mobile and E-Plus.

A concerning attack scenario could be represented by a group of attackers equipped with modified handsets that coordinate their movements to shut down the communication within a localized network belonging to one of the above operators, for example just 11 phones could be sufficient to knock down calls and messaging for the third largest mobile operator in Germany, E-Plus.

“The results indicate the required resources for a large-scale attack do not extensively exhaust the resources provided by a cell,”  “is no technical limitation” when it comes to combining cell phones for an attack.

If you believe that the problem is limited to small number of users that access to 2G networks you are wrong, in many countries of the globe Global System for Mobile Communications (GSM) represent an essential component of the communication infrastructure.

I have already written o GSM flaw and limits, the discovery of the researchers is another demonstration that it is possible to interfere and manipulate these type of communication.

GSM still implements weak encryption, which enables hackers to pass the authentication and impersonate a victim, consider that some GMS networks use A5/0 that hasn’t encryption, others use A5/2 (broken in 1999) or use A5/1 (also broken).

Following the countermeasures proposed by the researchers in the slides of the presentation:

  • 100% MT authentication: prevents hijacking
  • Use A5/3: prevents hijacking
  • Refresh TMSI: prevents targeted DoS
  • Wait for authentication before assigning MT service: removes race condition
  • Use authenticated paging: removes race condition

GSM system is practically unchanged since the 1980s … an eternity for a communication standard.

Pierluigi Paganini

(Security Affairs – GSM, DoS, Hacking phone firmware)


facebook linkedin twitter

Denial of Service GSM Hacking Hacking phone firmware mobile paging USENIX

you might also like

Pierluigi Paganini July 12, 2025
McDonald’s job app exposes data of 64 Million applicants
Read more
Pierluigi Paganini July 11, 2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    McDonald’s job app exposes data of 64 Million applicants

    Hacking / July 12, 2025

    Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

    Uncategorized / July 11, 2025

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT