Feeds

Chinese cops cuff 1,500 in fake base station spam raid

Thousands of devices, hundreds of millions of unwanted texts

Protecting against web application threats using SSL

China’s police have arrested over 1,500 people on suspicion of using fake base stations to send out mobile SMS spam.

The current crackdown, began in February, according to Reuters. Citing a Ministry of Public Security missive, the newswire says a group operating in north-east Liaoning province, bordering North Korea, is suspected of pinging out more than 200 million spam texts.

China's fearsome law enforcers periodically embark on crackdowns of this kind which, given the sheer size and scale of the Middle Kingdom, often amount to little more than a symbolic gesture.

However, mobile spam is a massive problem in China.

Some 200 billion unwanted messages were sent in the country in the first half of 2013 alone, according to a Xinhua report from late last year

Fake base stations are becoming a particularly popular modus operandi. Often concealed in a van or car, they are driven through city streets to spread their messages.

This Beijing News story from November 2013 tells a typical tale.

The professional spammer in question charged 1,000 yuan (£100) to spam thousands of users in a radius of a few hundred metres.

The pseudo-base station used could send out around 6,000 messages in just half an hour, the report said. Often such spammers are hired by local businessmen to promote their wares.

Trend Micro highlighted the problem in a recent expose of the Mobile Cybercriminal Underground Market in China.

GSM modems, internet short message gateways and “SMS servers” were all listed as available on the dark web for local cyber criminals to buy.

The latter is effectively a “fake base station”, in that it apparently sends out a high power signal which forces all mobiles in the area to disconnect from their legitimate base station and connect to it.

SMS servers cost around 45,000 yuan (£4,400), according to the report. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.