search
HomeComputer TutorialsTroubleshootingA Hacked Mobile Antenna In A Backpack Could Spy On Cell Phone Conversations

A Hacked Mobile Antenna In A Backpack Could Spy On Cell Phone Conversations

Two security experts at iSEC told Reuters that they have developed a system that costs only $250 for devices, and that almost anyone can build a mobile spy station that can illegally access any Verizon device. Want to experience the NSA feeling?

The hacking relies on small cellular base stations, a small mobile antenna sold by wireless carriers such as Verizon and AT&T, which acts similar to very small cellular towers. You usually use a small cellular base station where there is no cellular service; plug it into a broadband connection and it will provide a powerful signal in a range of about 40 feet. Verizon calls its model a "network extender" and costs $250, but it's even cheaper. This particular attack is the first attack against CDMA networks like Verizon (CDMA is a network protocol used by Sprint and Verizon. T-Mobile, AT&T, and almost all European and Asian networks use the GSM protocol), but there is no reason to think that small cellular base stations on other networks will not be hacked in a similar way.

The two security experts have found a way (they did not disclose) to hack Verizon's small cellular base station, which, according to Reuters, "eavesdropping on text messages, photos and phones sent using Android phones and iPhones." But the most worrying thing is that these small cellular base stations are quite portable; using extra antennas to enhance the 40-foot range and power bank, you can put the hacked small cellular base station in a backpack, put it in a crowded place, and then hack anyone who mistakenly uses the network.

This is especially insidious because unlike Wi-Fi connections, users cannot tell whether they are connected to a small cellular base station or a regular tower. Cellular services do not require login or confirmation; assuming you want to connect to your network within the scope of any device that can connect to you. There are no alerts for the same reason that you won't get an alert when you switch from connecting to one tower to another: this happens too often and is unlikely to be hacked.

However, small cellular base stations can obviously be hacked. Security experts have not explained how to do it, and they will disclose it in a few weeks at two hacker conferences in Las Vegas (Black Hat and Def Con conferences).

Verizon said that once they realized the security breach, they patched their small cellular base station to plug it. iSEC people say the small cellular base station they were hacked was still valid because they hacked it before the patch was released in March. This means that the hack is no longer of much use for the perpetrators, but it may suggest that hacking small cellular base stations is not as difficult as Verizon hopes.

Reuters

The above is the detailed content of A Hacked Mobile Antenna In A Backpack Could Spy On Cell Phone Conversations. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Clair Obscur: Expedition 33 Fatal Error? Fix with 4 WaysClair Obscur: Expedition 33 Fatal Error? Fix with 4 WaysApr 28, 2025 pm 08:02 PM

Encountering a "Clair Obscur: Expedition 33" fatal error can be frustrating, preventing the game from launching. This guide offers four solutions to resolve this issue. Clair Obscur: Expedition 33 Fatal Error Solutions Many players experien

Guide to Find the Dead: Our Darkest Days Save File LocationGuide to Find the Dead: Our Darkest Days Save File LocationApr 28, 2025 pm 08:01 PM

This guide reveals the location of your Into the Dead: Our Darkest Days save files on your Windows PC and explains how to back them up. Into the Dead: Our Darkest Days, a single-player survival horror game, autosaves your progress at the end of each

How to fix Windows update error 0xc1900403?How to fix Windows update error 0xc1900403?Apr 28, 2025 pm 08:00 PM

Windows updates keep Windows up to date and secure by bringing vital security patches, bug fixes, and new features with constant releases. But the Windows updat

Clair Obscur Expedition 33 Stuck on Syncing Data Screen: FixedClair Obscur Expedition 33 Stuck on Syncing Data Screen: FixedApr 28, 2025 pm 06:02 PM

Clair Obscur: Expedition 33 Stuck on "Syncing Data"? Here's the Fix! Many players are encountering a frustrating issue with Clair Obscur: Expedition 33 – getting stuck on the "Syncing Data" screen. This prevents gameplay before i

Oblivion Remastered Disk Full Save Failed, Best Tips to FollowOblivion Remastered Disk Full Save Failed, Best Tips to FollowApr 27, 2025 pm 08:02 PM

Frustrated by "Disk Full – Save Failed" errors in Oblivion Remastered? This guide provides solutions to get your game saving again. Oblivion Remastered's stunning visuals and gameplay can be ruined by save errors. This post focuses on fix

Quick Guide to Finding Post Trauma Save File Location on PCQuick Guide to Finding Post Trauma Save File Location on PCApr 27, 2025 pm 08:01 PM

This MiniTool guide explains the Post Trauma save file location and how to back up and restore your game data, safeguarding your progress against loss. Quick Navigation: Post Trauma Save File Location (PC) Backing Up Post Trauma Game Data Recovering

3 Ways to Troubleshoot SSD Recognized as HDD on Windows3 Ways to Troubleshoot SSD Recognized as HDD on WindowsApr 27, 2025 pm 06:13 PM

SSD displays as HDD? Don’t panic! MiniTool teaches you how to solve it easily! Is the SSD displayed as HDD in your disk management? Don't worry, this is common and will not affect the computer or data. This article will introduce several effective ways to solve this problem. Quick navigation: Why is an SSD recognized as an HDD? How to fix an SSD recognized as an HDD? Summarize Displaying an SSD as an HDD is often considered a minor problem, mainly manifested as visual errors in the operating system interface. This error indication does not usually affect the performance or functionality of the SSD, because the drive still operates at its expected speed and capacity. However, it may make it possible to rely on precise drive recognition to perform

How to manage Siri Suggestions on your iPhoneHow to manage Siri Suggestions on your iPhoneApr 27, 2025 am 09:46 AM

Recent news highlights the potential pitfalls of Siri Suggestions, an iPhone feature that offers contextual assistance, even inadvertently adding unauthorized individuals to private group chats. This incident, dubbed "Signalgate," undersco

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.