<p>The French security researcher Elliot Alderson, aka @fs0c131y, has some new information to share about flaws in Samsung devices. He claims to have found a new vulnerability in all Samsung phones, which enables an attacker to capture the victim’s network traffic without their consent, given the hacker can gain physical access to their victim’s device. Additionally, the exploit enables the hacker to record the victim’s screen for up to an hour. Alderson disclosed the vulnerability to Samsung three weeks ago. The researcher has tweetstormed the exploit with a proof of concept and it all starts by booting up the Calculator app that is pre-installed on all Samsung phones. </p> <p>Typing (+30012012732+ in the calculator app will bring up DRParser Mode app. Typing *#9900# on the DO Parser Mode app boots up the Service Mode app, which has several critical options like logging network packet data and more. Three options on the Service Mode app menu are greyed out and out of them, Elliot used the "tcp dump start" command-line packet analyzer to capture network traffic. However, tapping the button asks for an OTP, which the researcher bypassed since it is a locally implemented mechanism and doesn’t require an active net connection. Reversing the Service Mode app, the researcher was able to create a proof of concept via the CheckOTP method. This enabled him to enter the OTP key created in the prompt and enable capturing of network traffic. The network traffic capture log is saved on local storage. </p> <p dir="ltr" lang="en">THREAD: If you have a @SamsungMobile phones, whatever your phone model, an attacker with a physical access to your phone can capture your network traffic without your consent. Let me show you pic.twitter.com/2e66MglPxE</p> — Elliot Alderson (@fs0c131y) April 10, 2019 <p>The flaw not only enables one to snoop on network traffic, but also allows an attacker to record their victim’s screen for up to an hour. This is apparently done via the IMS LOGGER option, which is one of the three greyed-out options on the Service Mode app. Enabling the “Record Screen" option from Filter Options when tapping on IMS LOGGER is said to do the trick, and the recording is saved on the local storage. </p> <p>Related Reads:</p> <p>Asus software update utility was hacked to install malware on thousands of computers, company issues fix</p> <p>Twitter aims to combat spammers by limiting daily follows to 400</p> Tech Nuggets with Technology: This Blog provides you the content regarding the latest technology which includes gadjets,softwares,laptops,mobiles etc
Thursday, April 11, 2019
All Samsung phones vulnerable to network traffic snooping, unwarranted screen recording: Security Researcher Elliot Alderson
<p>The French security researcher Elliot Alderson, aka @fs0c131y, has some new information to share about flaws in Samsung devices. He claims to have found a new vulnerability in all Samsung phones, which enables an attacker to capture the victim’s network traffic without their consent, given the hacker can gain physical access to their victim’s device. Additionally, the exploit enables the hacker to record the victim’s screen for up to an hour. Alderson disclosed the vulnerability to Samsung three weeks ago. The researcher has tweetstormed the exploit with a proof of concept and it all starts by booting up the Calculator app that is pre-installed on all Samsung phones. </p> <p>Typing (+30012012732+ in the calculator app will bring up DRParser Mode app. Typing *#9900# on the DO Parser Mode app boots up the Service Mode app, which has several critical options like logging network packet data and more. Three options on the Service Mode app menu are greyed out and out of them, Elliot used the "tcp dump start" command-line packet analyzer to capture network traffic. However, tapping the button asks for an OTP, which the researcher bypassed since it is a locally implemented mechanism and doesn’t require an active net connection. Reversing the Service Mode app, the researcher was able to create a proof of concept via the CheckOTP method. This enabled him to enter the OTP key created in the prompt and enable capturing of network traffic. The network traffic capture log is saved on local storage. </p> <p dir="ltr" lang="en">THREAD: If you have a @SamsungMobile phones, whatever your phone model, an attacker with a physical access to your phone can capture your network traffic without your consent. Let me show you pic.twitter.com/2e66MglPxE</p> — Elliot Alderson (@fs0c131y) April 10, 2019 <p>The flaw not only enables one to snoop on network traffic, but also allows an attacker to record their victim’s screen for up to an hour. This is apparently done via the IMS LOGGER option, which is one of the three greyed-out options on the Service Mode app. Enabling the “Record Screen" option from Filter Options when tapping on IMS LOGGER is said to do the trick, and the recording is saved on the local storage. </p> <p>Related Reads:</p> <p>Asus software update utility was hacked to install malware on thousands of computers, company issues fix</p> <p>Twitter aims to combat spammers by limiting daily follows to 400</p>
Subscribe to:
Post Comments (Atom)
Docs: Israeli AI chip startup Hailo is pursuing an urgent IPO via a SPAC merger at a valuation of less than $500M; it was last valued at $1.2B in 2024 (Meir Orbach/CTech)
Meir Orbach / CTech : Docs: Israeli AI chip startup Hailo is pursuing an urgent IPO via a SPAC merger at a valuation of less than $500M; ...
-
The first project we remember working on together was drawing scenes from the picture books that our mom brought with her when she immigrate...
-
Sohee Kim / Bloomberg : South Korean authorities are investigating a data leak at e-commerce giant Coupang that exposed ~33.7M accounts; ...
No comments:
Post a Comment