Feeds

The SMS of DEATH - Can it crash your phone?

Bog standard mobes menaced by evil txt

The Essential Guide to IT Transformation

Many mainstream mobiles can be crashed after opening a maliciously constructed SMS message.

The so-called 'SMS of death' attacks affects mobiles from Samsung, Sony Ericsson, Motorola and LG, among others. Details of the attack, a variant of earlier attacks along the same lines, were outlined by security researchers Collin Mulliner and Nico Golde during a presentation at the Chaos Communication Congress (27C3) in Berlin.

Mulliner and Golde tested a range of feature phone for bugs in supported Java apps used to display business cards, support longer texts sent in one than one part or other features. Crashing any particular application on a phone tends to crash the phone or force its disconnection from a mobile network. The researchers set up a test bed before sending thousands of malformed messages to each device and recording the effects, if any.

Golde said that Samsung mobiles were particularly vulnerable to multi-part text messages, for example. LG phones were often bowled over by maliciously constructed MMS messages. Nokia and Sony Ericsson phones often crashed before confirming the receipt of a rogue text. This means that the network attempts to resend a killer text after a user reboots a crashed mobile. Restoring normality involves transferring a SIM card onto a non-vulnerable phone and deleting the poison pill text message.

The range of flaws ought to concern network operators as well as handset manufacturers. Mulliner said that by sending a range of attacks a miscreant might create a situation where thousands of users attempt to reconnect with the network at around the same time, straining network infrastructure and possibly causing secondary (possibly cascading) problems. Targeting attacks against a particular individual - providing it was known which model of phone he was using - might also be possible.

A lot of effort in security circles over recent months has gone into discovering flaws in Android, iPhone and other smartphones by 84 per cent of phone in use are less advanced feature phones. The two security researchers hope their research will help address this knowledge imbalance.

Both researchers called for suppliers to increase the frequency of security updates as well as making updates easier to apply. ®

Build a business case: developing custom apps

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
LIVE TODAY: Speak your brains on SIGNAL-FREE mobile comms
Is goTenna tech a goer? Time to grill CEO, CTO
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.