Feeds

The SMS of DEATH - Can it crash your phone?

Bog standard mobes menaced by evil txt

Secure remote control for conventional and virtual desktops

Many mainstream mobiles can be crashed after opening a maliciously constructed SMS message.

The so-called 'SMS of death' attacks affects mobiles from Samsung, Sony Ericsson, Motorola and LG, among others. Details of the attack, a variant of earlier attacks along the same lines, were outlined by security researchers Collin Mulliner and Nico Golde during a presentation at the Chaos Communication Congress (27C3) in Berlin.

Mulliner and Golde tested a range of feature phone for bugs in supported Java apps used to display business cards, support longer texts sent in one than one part or other features. Crashing any particular application on a phone tends to crash the phone or force its disconnection from a mobile network. The researchers set up a test bed before sending thousands of malformed messages to each device and recording the effects, if any.

Golde said that Samsung mobiles were particularly vulnerable to multi-part text messages, for example. LG phones were often bowled over by maliciously constructed MMS messages. Nokia and Sony Ericsson phones often crashed before confirming the receipt of a rogue text. This means that the network attempts to resend a killer text after a user reboots a crashed mobile. Restoring normality involves transferring a SIM card onto a non-vulnerable phone and deleting the poison pill text message.

The range of flaws ought to concern network operators as well as handset manufacturers. Mulliner said that by sending a range of attacks a miscreant might create a situation where thousands of users attempt to reconnect with the network at around the same time, straining network infrastructure and possibly causing secondary (possibly cascading) problems. Targeting attacks against a particular individual - providing it was known which model of phone he was using - might also be possible.

A lot of effort in security circles over recent months has gone into discovering flaws in Android, iPhone and other smartphones by 84 per cent of phone in use are less advanced feature phones. The two security researchers hope their research will help address this knowledge imbalance.

Both researchers called for suppliers to increase the frequency of security updates as well as making updates easier to apply. ®

Internet Security Threat Report 2014

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.