background preloader

Des SMS furtifs sur vos portables

Des SMS furtifs sur vos portables
Les services de sécurité envoient des milliers de SMS furtifs pour localiser des personnes et réactiver leur téléphone à distance. Une technologie jusque-là méconnue, et pas vraiment encadrée par le droit. L'affaire fait grand bruit chez les experts allemands, avec lesquels nous nous sommes entretenus. En France, plusieurs acteurs nous ont concédé, du bout des lèvres, que ce procédé était également utilisé. C’est une question au gouvernement qui nous a mis la puce à l’oreille. Plusieurs services de police judiciaire et de renseignement étrangers utilisent des SMS furtifs pour localiser des suspects ou des personnes disparues : cette méthode consiste à envoyer vers le téléphone portable de ce suspect un SMS qui passe inaperçu et renvoie un signal à l’émetteur du message. Sept mois plus tard, toujours pas de réponse du gouvernement. Le SMS furtif obéit au principe du signal aller-retour que l’on ne voit pas, ou du “ping” dans le jargon des informaticiens. Souriez, vous êtes pistés

Camp 2011: Applied Research on security of TETRA radio Camp 2011 - Version 1.4 Chaos Communication Camp 2011 Project Flow Control digital radio technology beyond GSM The digital professional mobile radio system TETRA is used by a wide range of users in almost all continents of the world. The OsmocomTETRA project has created a software radio receiver for the TETRA air interface, similar to what airprobe has done for GSM. The digital professional mobile radio system TETRA is used by a wide range of users in almost all continents of the world. While government users typically use most or all of those security features, many commercial users of TETRA chose to not use them - most likely driven by budget constraints. We are also working on something similar to OpenBTS or OpenBSC, i.e. software to run our own minimalistic TETRA network for further research.

Researchers Find LinkedIn Spam Downloads Trojan Researchers from Barracuda Labs have discovered a spam email operation with spoofed headers making the messages appear to be from the professional social network LinkedIn. The threat is unique in that the operation is utilizing an exploit toolkit which circumvents HTTPS protection and allows the downloading of a password sniffing Trojan. "Early on the morning of August 23 the spam monitors at Barracuda Labs started detecting a large number of emails claiming to be from LinkedIn. The quantities were significant, tens of thousands an hour, and these were pretty convincing messages," Barracuda reports. A sample of the suspected spam emails appears as the following: Barracuda reports that the header URL in the "From" section is spoofed, and that the URL in the body of the text exposes the target to malicious code: What makes this attack more insidious is the use of an exploit kit which may prevent users from knowing that the malicious code is being executed.

What you'd hear if my Android calls were recorded I'm reading about a Trojan that records Android phone conversations, wondering what I might have to worry about. Security researcher Dinesh Venkatesan wrote about the Trojan in his CA blog, saying it builds upon the data logging capabilities of recent Trojans. "This Trojan is more advanced as it records the conversation itself in AMR format," he wrote. "Also, it has got many other malicious activities that we have seen in many of the earlier malware incidents targeting the Android platform." The damage this littler sucker can do is obvious when you think of all the private phone conversations regarding a company's product development, HR dealings and legal matters. A bit on how it works, from Venkatesan's report: --Once the malware is installed in the victim device, it drops a “configuration” file that contains key information about the remote server and the parameters. --As the converstation goes on, the Trojan stores the recorded call in a directory shangzhou/callrecord in the SDCard.

Related: