‘fake’ cellphone towers found in U.S.

Status
Not open for further replies.

Prorootect

Level 69
Thread author
Verified
Nov 5, 2011
5,855
‘fake’ cellphone towers found in U.S. : http://www.welivesecurity.com/2014/08/28/android-security-2/

cell-phone-towers-623x410.jpg

Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security – but have a much more malicious purpose, according to Popular Science.
The fake ‘towers’ – computers which wirelessly attack cellphones via the “baseband” chips built to allow them to communicate with their networks, can eavesdrop and even install spyware, ESD claims. They are a known technology - but the surprise is that they are in active use.
The towers were found by users of the CryptoPhone 500, one of several ultra-secure handsets that have come to market in the last couple of years, after an executive noticed his handset was “leaking” data regularly.
Its American manufacturer boasts that the handset has a “hardened” version of Android which removes 468 vulnerabilities from the OS.
Android Security: Towers in casinos
Despite its secure OS, Les Goldsmith of the handset’s US manufacturer ESD found that his personal Android security handset’s firewall showed signs of attack “80 to 90” times per hour.
The leaks were traced to the mysterious towers. Despite having some of the functions of normal cellphone towers, Goldsmith says their function is rather different. He describes them as “interceptors” and says that various models can eavesdrop and even push spyware to devices. Normal cellphones cannot detect them – only specialized hardware such as ESD’s Android security handsets.
Who created the towers and maintains them is unknown, Goldsmith says.
Origin of towers ‘unknown’
“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”
Their existence can only be seen on specialized devices, such as the custom Android security OS used by Cryptophone, which includes various security features – including “baseband attack detection.”
The handset, based on a Samsung Galaxy SIII, is described as offering, a “Hardened Android operating system” offering extra security. “Baseband firewall protects against over-the-air attacks with constant monitoring of baseband processor activity, baseband attack detection, and automated initiation of countermeasures”, claims the site.
“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases.” says Goldsmith. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? The point is: we don’t really know whose they are.” ..

- read more on the website, please ..
 

Exterminator

Community Manager
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
shutterstock_196839467_story.jpg


If you're taking a late-summer roadtrip, chances are your phone will be intercepted by a fake cell phone tower.

At least that's what Les Goldsmith, CEO of ESD America and developer of the CryptoPhone 500, claims.

According to Goldsmith, his team -- using the custom-developed CryptoPhone, which provides a hardened version of Android with a wealth of unique security features and patches a number of flaws present in the stock Android OS -- discovered dozens of fake cell phone 'towers' not belonging to any carriers which intercepted the device's signal, allowing the tower's owner to intercept any calls or communications and even 'remotely push spyware to the device.'

On a road trip taken from Florida to North Carolina by one of ESD America's customers, Goldsmith says, the device encountered 8 different interceptors. This may not be shocking, except for the fact that baseband interceptors are very costly to produce and difficult to create, meaning that only the truly committed or those with many resources have the ability to make them. The team discovered one such interceptor at a casino in Las Vegas, but many were found on top of military bases and government facilities.

navy-radome-1_story.jpg


An ECHELON facility, part of an NSA program which functions similarly to the fake towers

On one such excursion by ESD America's mobile security team, their phone was intercepted by a fake tower, and forced down from 4G to 2G -- a protocol which is much easier to exploit. Many higher-end interceptors, however, have the ability to "spoof" the signal so that the phone still displays a 4G connection despite being forced to 2G and exploited.

The fake towers may very well be operated by the government, Goldsmith says, but he also entertains the possibility that they could've been planted by a foreign government such as China to snoop on military communications. Regardless of the source or the intent, regular citizens are falling victim to the interceptors and running the risk of having their phone calls and even text messages intercepted by unknown parties.

Source: PopSci via ESET Blog |Top image via Shutterstock - SIM card on smartphone, bottom image via HAL Archives
 
  • Like
Reactions: Prorootect

Holysmoke

Level 2
Verified
Jul 31, 2014
82
can we do anything to secure our phones better?

AV wont help. Can we put a firewall on them?
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top