FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today โ€” May 14th 2024Your RSS feeds
Before yesterdayYour RSS feeds

7 Tips to Protect Your Smartphone from Getting Hacked

Thereโ€™s little rest for your hard-working smartphone. If youโ€™re like manyย professionals today, youย useย itย for work, play, and a mix of personal business in between.ย Now, what if something went wrong with that phone, like lossย orย theft? Worse yet, what if your smartphone gotย hacked?ย Letโ€™s try and keep that from happening to you.ย 

Globally, plenty of people pull double duty with their smartphones.ย In Spain,ย one surveyย found that 55% of people use the same phoneย for a mix ofย personal andย and workย activity.ย The same survey showed thatย up toย half of people interviewed inย Japan, Australia, and the U.S.ย do so as well, whileย nations like the UK and Germanyย trailedย at 31% and 23% respectively.ย 

Whether these figuresย trendย on theย low or highย end, the security implications remain constant. Aย smartphone loaded with business and personal data makes for a desirable target.ย Hackers targetย smartphonesย because theyโ€™re often unprotected, which gives hackers an easy โ€œinโ€ to your personal information and to any corporate networksย you may use.ย ย Itโ€™s like two hacks with one stone.ย ย 

Put simply, asย a working professional with a smartphone, youโ€™re a high-value target.ย ย 

Protect your smartphone from being hackedย 

As both aย parent and a professional,ย Iย put together aย few things you can do to protect your smartphone from hacksย so that you can keep your personal and work life safe:ย 

1. Add extra protection with your face, finger, pattern, or PIN.ย 

First up, the basics. Locking your phone with facial ID, a fingerprint,ย patternย or a pin is your most basic form of protection, particularly in the event of loss or theft.ย (Your options will vary depending on the device, operating system, and manufacturer.)ย Take it a step further for even more protection. Secure the accounts on yourย phoneย withย strong passwordsย andย useย two-factor authenticationย on the apps that offer it, whichย doubles your line of defense.ย ย ย ย 

2. Use a VPN.ย 

Or, put another way,ย donโ€™t hop onto public Wi-Fi networks without protection. Aย VPN masks your connection from hackers allowing you to connect privately when you are on unsecure public networks at airports, cafes, hotels, and the like.ย With a VPN connection, youโ€™ll know that your sensitive data, documents, and activitiesย you do are protected from snooping, which is definitely a great feeling given the amount of personal and professional business we manage with our smartphones.ย 

3. Stick to the official app stores for your apps.

Both Google Play and Appleโ€™s App Store have measures in place to help prevent potentially dangerousย appsย from makingย itย intoย their stores.ย Malicious appsย are often found outside of theย appย stores, whichย can run in the background and compromise your personal dataย like passwords, credit card numbers, and moreโ€”practically everything that you keep on your phone.ย Further,ย when you are in the app stores,ย look closely at the descriptions and reviews for appsย before you downloadย them. Malicious apps and counterfeits can still find their way into stores, andย here are a few ways you can keep those bad apps from getting onto your phone. ย ย ย 

4. Back up the data on your phone.ย 

Backing up your phoneย is always a good idea for two reasons:ย 

  • First, it makes the process of transitioning to a new phone easy by transferring that backed up data from your old phone to your new phone.ย 
  • Second, it ensures that your data stays with youย ifย your phone is lost or stolenโ€”allowing you to remotely wipe the data on your lost or stolen phone while still having a secure copy of that data stored in the cloud.ย ย 

Bothย iPhonesย andย Android phonesย have straightforward ways of backing up your phone regularly.ย 

5. Learn how to lock or wipe your phone remotely in case of emergency.ย 

Worst case scenarioโ€”your phone is gone. Really gone.ย Eitherย itโ€™sย hopelesslyย lost or gotย stolen.ย What now?ย Lock it remotely or even wipe its data entirely. While that last bit about wiping the phone seems like a drastic move, if you maintain regular backups as mentioned above, your data is secure in the cloudโ€”ready for youย toย restore.ย In all, this means that hackers wonโ€™t be able to access you, or your companyโ€™s, sensitive informationโ€”which can keep you out of trouble and your professional businessย safe.ย Apple provides iOS users with a step-by-step guide for remotely wiping devices, andย Google offers up a guide for Android users as well.ย 

6. Get rid of old appsโ€”and update the ones you keep.ย 

We all download apps, use them once, and then forget they are on our phone.ย Take a few moments to swipe through your screen and see which ones youโ€™re truly done with and delete themย along withย their data. Some apps have an account associated with them that may store data off your phone as well. Take the extra stepย and delete those accounts so any off-phone data is deleted.ย ย 

The reason for this is that every extra app is another app that needs updating or that may have a security issue associated with it. In a time of data breaches and vulnerabilities, deleting old apps is a smart move.ย As for the ones you keep, update them regularly and turn on auto-updates if thatโ€™s an option. Updates not only introduce new features to apps,ย but they also oftenย address security issues too.ย 

7. Protect your phone.ย 

With so much of your life on your phone, getting security software installedย onย it can protect you and the things you keep on your phone. Whether youโ€™re anย Androidย owner orย iOSย owner,ย mobile security software canย keepย yourย data, yourย shopping, andย paymentsย secure.ย 

The post 7 Tips to Protect Your Smartphone from Getting Hacked appeared first on McAfee Blog.

Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan

The iPhones belonging to nearly three dozen journalists, activists, human rights lawyers, and civil society members in Jordan have been targeted with NSO Group's Pegasus spyware, according to joint findings from Access Now and the Citizen Lab. Nine of the 35 individuals have been publicly confirmed as targeted, out of whom six had their devices compromised with the mercenary

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group's Pegasus, QuaDream's Reign, and Intellexa's Predator.  Kaspersky, which analyzed a set of iPhones that were compromised with Pegasus, said the infections left traces in a file

New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of the 14 flaws โ€“ collectively called 5Ghoul (a combination of "5G" and "Ghoul") โ€“ 10 affect 5G modems from the two companies, out of which three

Help! I Think My Phoneโ€™s Been Hacked

โ€œMy phoneโ€™s been hacked!โ€ Words you probably donโ€™t want to hear or say. Ever.โ€ฏย 

Yes, a smartphone can get hacked just like any other device. And they make prize targets as well. Loaded as they are with personal and financial information, access to payment apps, files, photos, and contacts, bad actors have plenty to gain by tapping into your smartphone.ย ย ย 

How do bad actors pull it off? They have several attack vectors they can choose from.ย ย 

  • They can hide malware in bogus apps that they post as free downloads in app stores. Spyware, ransomware, and adware are typical types of malware that get distributed this way.ย 
  • They can also install it themselves by getting physical access to your phone.ย ย 
  • Sometimes, bad actors along the smartphone supply chain have loaded malware onto entirely new smartphones so that they come with malware preinstalled, right out of the box.ย ย 
  • And as always, phishing attacks by email, text, and other messaging apps remain popular as well.ย 

Todayโ€™s attackers have gotten cagier as well. It used to be that a hacked phone would run sluggishly or hot after it got infected by malware. The battery might have drained quickly as well. That was because the malware ate up system resources, created conflicts with other apps, and used your data or internet connection to pass along your personal informationโ€”all of which could make your smartphone feel a little off.โ€ฏThat still might be the case with some mobile malware today, yet much of it works far more efficiently. The old telltale physical signs of a hacked phone might not present themselves at all.ย 

However, you can spot several indications that might indicate your phone has been hacked.ย 

How do I know if my phone has been hacked?โ€ฏย 

Aโ€ฏfew examples follow.โ€ฏNote that theseโ€ฏmightโ€ฏbe signsโ€ฏof a hacked phone, yet not always.โ€ฏย 

  • Popups suddenly appear on your phone: If youโ€™re seeing more popup ads than usual or seeing them for the first time, it might beโ€ฏaโ€ฏsign that your phone has been hit with adwareโ€”a type of malicious app that hackers use to generate revenue by distributing adsโ€ฏwithout the consent of the user. Furthermore, those ads might beโ€ฏmaliciousโ€ฏin nature as well. They might take you to pages designed to steal personal information (which is a good reminder to never tap or click on them).โ€ฏย ย 
  • Mysterious apps, calls, or texts appear: A potential telltale sign that your phoneโ€ฏhas beenโ€ฏhacked isโ€ฏthe appearance ofโ€ฏnew apps that you didnโ€™t download, along with spikes in data usage that you canโ€™t account for. Likewise, if you see calls in yourโ€ฏphoneโ€™s call logโ€ฏthat you didnโ€™t make, thatโ€™s a warning as well.โ€ฏย 
  • You run out of data or see unknown charges pop up: Big red flag here. This is aโ€ฏpossibleโ€ฏsign that a hacker has hijacked your phone and is using it to transfer data, make purchases, send messages, or make calls via your phone.โ€ฏย 
  • You have issues with your online accounts: Phones infected with spyware can skim account credentials and then transmit them to the hacker behind the attack. This could lead to credit and debit fraud. In some cases, hackers will hijack an account altogether by changing the password and locking out the original owner. If you spot unusual charges or can no longer log into your accounts with your password, a hacked phone might be the causeโ€”among others.โ€ฏย 

What do I do if my phone is hacked?โ€ฏย 

Install and runโ€ฏonline protection software on your smartphoneโ€ฏif you havenโ€™t already. From there, delete any apps you didnโ€™t download, delete risky texts, and then run your mobile security software again.โ€ฏย 

If you still have issues,โ€ฏwipingโ€ฏand restoringโ€ฏyour phoneโ€ฏis an option. Provided you have your photos, contacts, and other vital info backed up in the cloud,โ€ฏitโ€™s a relatively straightforward process. A quick search onlineโ€ฏcan showโ€ฏhow to wipe and restore your model of phone.โ€ฏย 

Lastly, check your accounts and your creditโ€ฏcard statementsโ€ฏto see if any unauthorized purchases have been made. If so, you can go through the process of freezing those accounts and getting new cards and credentials issued.โ€ฏFurther, update yourโ€ฏpasswords for your accountsโ€ฏwithโ€ฏa password that is strong and uniqueโ€ฏto prevent furtherโ€ฏtheft.โ€ฏโ€ฏย 

Tips to keep your phone from getting hackedโ€ฏโ€ฏย 

Toโ€ฏhelpโ€ฏkeepโ€ฏyour phone from getting hacked inโ€ฏthe first place,โ€ฏthere are a few relatively easy steps you can take. Insideโ€ฏofโ€ฏa few minutes, you can find yourself much safer than you were before.โ€ฏโ€ฏย 

  1. Use comprehensive security software on your phone.โ€ฏOver the years, weโ€™ve gotten into the good habit of using this on our computers and laptops. Our phones? Not so much. Installingโ€ฏonline protection software gives you the first line of defense against attacks, plus several of the additional security features mentioned below.โ€ฏ
  2. Stay safer on the go with a VPN.โ€ฏOne wayโ€ฏthatโ€ฏcrooks can hack their way into your phone is via public Wi-Fi, such as at airports, hotels, and even libraries. These networks are public, meaning that your activities are exposed to others on the networkโ€”your banking, your password usage, all of it.โ€ฏOne way to make a public network private is with a VPN, which can keep you and all you do protected from others on that Wi-Fi hotspot.โ€ฏโ€ฏ
  3. Use a password manager.โ€ฏStrong, unique passwordsโ€ฏoffer anotherโ€ฏprimary line of defense. Yet with all the accounts we have floating around,โ€ฏjuggling dozens of strongโ€ฏandโ€ฏunique passwords can feel like a taskโ€”thus the temptation to use (and re-use) simpler passwords. Hackers love thisโ€ฏbecause one password can be the key to several accounts. Instead, try a password manager that can create those passwords for you and safely store them as well. Comprehensiveโ€ฏonline protection software like ours will include one.
  4. Avoid public charging stations.โ€ฏCharging upโ€ฏat a public stationโ€ฏseems so simple and safe. However, some hackers have been known to โ€œjuice jackโ€โ€ฏby installingโ€ฏmalware into the charging station.โ€ฏWhile you โ€œjuice up,โ€ they โ€œjackโ€ your passwords and personal info.โ€ฏSoโ€ฏwhat to do about power on the road? You canโ€ฏlook intoโ€ฏa portable power pack that you can charge up ahead of time orโ€ฏrun onโ€ฏAA batteries. Theyโ€™reโ€ฏpretty inexpensiveโ€ฏandโ€ฏcan prevent malware from a public charging station.โ€ฏโ€ฏ
  5. Keep your eyes on your phone.โ€ฏPreventing the actual theftโ€ฏof yourโ€ฏphone is important too, asโ€ฏsome hacks happen because a phone falls into the wrong hands. This is a good case for password or PIN protecting your phone, as well as turning on device tracking so that you can locate your phone or wipe it remotely if you need to.โ€ฏApple provides iOS users with a step-by-step guide for remotely wiping devices,โ€ฏandโ€ฏGoogle offers up a guide for Android users as well.โ€ฏโ€ฏ
  6. Stick with trusted app stores. Stick with legitimate apps stores like Google Play and Appleโ€™s App Store, which have measures in place to review and vet apps to help ensure that they are safe and secure. And for the malicious apps that sneak past these processes, Google and Apple are quick to remove malicious apps when discovered, making their stores that much safer.
  7. Keep an eye on app permissions. Another way hackers weasel their way into your device is by getting permissions to access things like your location, contacts, and photosโ€”and theyโ€™ll use sketchy apps to do it. So check and see what permissions the app is asking for. If itโ€™s asking for way more than you bargained for, like a simple game wanting access to your camera or microphone, it might be a scam. Delete the app and find a legitimate one that doesnโ€™t ask for invasive permissions like that. If youโ€™re curious about permissions for apps that are already on your phone, iPhone users can learn how to allow or revoke app permission here, and Android can do the same here.
  8. Update your phoneโ€™s operating system. Together with installing security software is keeping your phoneโ€™s operating system up to date. Updates can fix vulnerabilities that hackers rely on to pull off their malware-based attacksโ€”itโ€™s another tried and true method of keeping yourself safe and your phone running great too.

The post Help! I Think My Phoneโ€™s Been Hacked appeared first on McAfee Blog.

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud. โ€œThe rules will help protect consumers from scammers who target data and personal information by covertly swapping SIM cards to a new device or porting phone numbers to

LTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper

By: Zion3R


LTESniffer is An Open-source LTE Downlink/Uplink Eavesdropper

It first decodes the Physical Downlink Control Channel (PDCCH) to obtain the Downlink Control Informations (DCIs) and Radio Network Temporary Identifiers (RNTIs) of all active users. Using decoded DCIs and RNTIs, LTESniffer further decodes the Physical Downlink Shared Channel (PDSCH) and Physical Uplink Shared Channel (PUSCH) to retrieve uplink and downlink data traffic.

LTESniffer supports an API with three functions for security applications and research. Many LTE security research assumes a passive sniffer that can capture privacy-related packets on the air. However, non of the current open-source sniffers satisfy their requirements as they cannot decode protocol packets in PDSCH and PUSCH. We developed a proof-of-concept security API that supports three tasks that were proposed by previous works: 1) Identity mapping, 2) IMSI collecting, and 3) Capability profiling.

Please refer to our paper for more details.


LTESniffer in layman's terms

LTESniffer is a tool that can capture the LTE wireless messages that are sent between a cell tower and smartphones connected to it. LTESniffer supports capturing the messages in both directions, from the tower to the smartphones, and from the smartphones back to the cell tower.

LTESniffer CANNOT DECRYPT encrypted messages between the cell tower and smartphones. It can be used for analyzing unencrypted parts of the communication between the cell tower and smartphones. For example, for encrypted messages, it can allow the user to analyze unencrypted parts, such as headers in MAC and physical layers. However, those messages sent in plaintext can be completely analyzable. For example, the broadcast messages sent by the cell tower, or the messages at the beginning of the connection are completely visible.

Ethical Consideration

The main purpose of LTESniffer is to support security and analysis research on the cellular network. Due to the collection of uplink-downlink user data, any use of LTESniffer must follow the local regulations on sniffing the LTE traffic. We are not responsible for any illegal purposes such as intentionally collecting user privacy-related information.

Features

New Update

  • Supports two USRP B-series for uplink sniffing mode. Please refer to LTESniffer-multi-usrp branch and its README for more details.
  • Improved the DCI 0 detected in uplink.
  • Fixed some bugs.

LTESniffer is implemented on top of FALCON with the help of srsRAN library. LTESniffer supports:

  • Real-time decoding LTE uplink-downlink control-data channels: PDCCH, PDSCH, PUSCH
  • LTE Advanced and LTE Advanced Pro, up to 256QAM in both uplink and downlink
  • DCI formats: 0, 1A, 1, 1B, 1C, 2, 2A, 2B
  • Transmission modes: 1, 2, 3, 4
  • FDD only
  • Maximum 20 MHz base station.
  • Automatically detect maximum UL/DL modulation schemes of smartphones (64QAM/256QAM on DL and 16QAM/64QAM/256QAM on UL)
  • Automatically detect physical layer configuration per UE.
  • LTE Security API: RNTI-TMSI mapping, IMSI collecting, UECapability Profiling.

Hardware and Software Requirement

OS Requirement

Currently, LTESniffer works stably on Ubuntu 18.04/20.04/22.04.

Hardware Requirement

Achieving real-time decoding of LTE traffic requires a high-performance CPU with multiple physical cores. Especially when the base station has many active users during the peak hour. LTESniffer was able to achieve real-time decoding when running on an Intel i7-9700K PC to decode traffic on a base station with 150 active users.

The following hardware is recommended

  • Intel i7 CPU with at least 8 physical cores
  • At least 16Gb RAM
  • 256 Gb SSD storage

SDR

LTESniffer requires different SDR for its uplink and downlink sniffing modes.

To sniff only downlink traffic from the base station, LTESniffer is compatible with most SDRs that are supported by the srsRAN library (for example, USRP or BladeRF). The SDR should be connected to the PC via a USB 3.0 port. Also, it should be equipped with GPSDO and two RX antennas to decode downlink messages in transmission modes 3 and 4.

On the other hand, to sniff uplink traffic from smartphones to base stations, LTESniffer needs to listen to two different frequencies (Uplink and Downlink) concurrently. To solve this problem, LTESniffer supports two options:

  • Using a single USRP X310. USRP X310 has two Local Oscillators (LOs) for 2 RX channels, which can turn each RX channel to a distinct Uplink/Downlink frequency. To use this option, please refer to the main branch of LTESniffer.
  • Using 2 USRP B-Series. LTESniffer utilizes 2 USRP B-series (B210/B200) for uplink and downlink separately. It achieves synchronization between 2 USRPs by using GPSDO for clock source and time reference. To use this option, please refer to the LTESniffer-multi-usrp branch of LTESniffer and its README.

Installation

Important note: To avoid unexpected errors, please follow the following steps on Ubuntu 18.04/20.04/22.04.

Dependencies

  • Important dependency: UHD library version >= 4.0 must be installed in advance (recommend building from source). The following steps can be used on Ubuntu 18.04. Refer to UHD Manual for full installation guidance.

UHD dependencies:

sudo apt update
sudo apt-get install autoconf automake build-essential ccache cmake cpufrequtils doxygen ethtool \
g++ git inetutils-tools libboost-all-dev libncurses5 libncurses5-dev libusb-1.0-0 libusb-1.0-0-dev \
libusb-dev python3-dev python3-mako python3-numpy python3-requests python3-scipy python3-setuptools \
python3-ruamel.yaml

Clone and build UHD from source (make sure that the current branch is higher than 4.0)

git clone https://github.com/EttusResearch/uhd.git
cd <uhd-repo-path>/host
mkdir build
cd build
cmake ../
make -j 4
make test
sudo make install
sudo ldconfig

Download firmwares for USRPs:

sudo uhd_images_downloader

We use a 10Gb card to connect USRP X310 to PC, refer to UHD Manual [1], [2] to configure USRP X310 and 10Gb card interface. For USRP B210, it should be connected to PC via a USB 3.0 port.

Test the connection and firmware (for USRP X310 only):

sudo sysctl -w net.core.rmem_max=33554432
sudo sysctl -w net.core.wmem_max=33554432
sudo ifconfig <10Gb card interface> mtu 9000
sudo uhd_usrp_probe
  • srsRAN dependencies:
sudo apt-get install build-essential git cmake libfftw3-dev libmbedtls-dev libboost-program-options-dev libconfig++-dev libsctp-dev
  • LTESniffer dependencies:
sudo apt-get install libglib2.0-dev libudev-dev libcurl4-gnutls-dev libboost-all-dev qtdeclarative5-dev libqt5charts5-dev

Build LTESniffer from source:

git clone https://github.com/SysSec-KAIST/LTESniffer.git
cd LTESniffer
mkdir build
cd build
cmake ../
make -j 4 (use 4 threads)

Usage

LTESniffer has 3 main functions:

  • Sniffing LTE downlink traffic from the base station
  • Sniffing LTE uplink traffic from smartphones
  • Security API

After building from source, LTESniffer is located in <build-dir>/src/LTESniffer

Note that before using LTESniffer on the commercial, one should have to check the local regulations on sniffing LTE traffic, as we explained in the Ethical Consideration.

To figure out the base station and Uplink-Downlink band the test smartphone is connected to, install Cellular-Z app on the test smartphone (the app only supports Android). It will show the cell ID and Uplink-Downlink band/frequency to which the test smartphone is connected. Make sure that LTESniffer also connects to the same cell and frequency.

General downlink sniffing

sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -C -m 0
example: sudo ./src/LTESniffer -A 2 -W 4 -f 1840e6 -C -m 0
-A: number of antennas
-W: number of threads
-f: downlink frequency
-C: turn on cell search
-m: sniffer mode, 0 for downlink sniffing and 1 for uplink sniffing

Note: to run LTESniffer with USRP B210 in the downlink mode, add option -a "num_recv_frames=512" to the command line. This option extends the receiving buffer for USRP B210 to achieve better synchronization.

sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -C -m 0 -a "num_recv_frames=512"
example: sudo ./src/LTESniffer -A 2 -W 4 -f 1840e6 -C -m 0 -a "num_recv_frames=512"

General uplink sniffing

Note: In the uplink sniffing mode, the test smartphones should be located nearby the sniffer, because the uplink signal power from UE is significantly weaker compared to the downlink signal from the base station.

sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -u <UL Freq> -C -m 1
example: sudo ./src/LTESniffer -A 2 -W 4 -f 1840e6 -u 1745e6 -C -m 1
-u: uplink frequency

Security API

sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -u <UL Freq> -C -m 1 -z 3
example: sudo ./src/LTESniffer -A 2 -W 4 -f 1840e6 -u 1745e6 -C -m 1 -z 3
-z: 3 for turnning on 3 functions of sniffer, which are identity mapping, IMSI collecting, and UECapability profiling.
2 for UECapability profiling
1 for IMSI collecting
0 for identity mapping

Specify a base station

LTESniffer can sniff on a specific base station by using options -I <Phycial Cell ID (PCI)> -p <number of Physical Resource Block (PRB)>. In this case, LTESniffer does not do the cell search but connects directly to the specified cell.

sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -I <PCI> -p <PRB> -m 0
sudo ./<build-dir>/src/LTESniffer -A 2 -W <number of threads> -f <DL Freq> -u <UL Freq> -I <PCI> -p <PRB> -m 1
example: sudo ./src/LTESniffer -A 2 -W 4 -f 1840e6 -u 1745e6 -I 379 -p 100 -m 1

The debug mode can be enabled by using option -d. In this case, the debug messages will be printed on the terminal.

Output of LTESniffer

LTESniffer provides pcap files in the output. The pcap file can be opened by WireShark for further analysis and packet trace. The name of downlink pcap file: sniffer_dl_mode.pcap, uplink pcap file: sniffer_ul_mode.pcap, and API pcap file: api_collector.pcap. The pcap files are located in the same directory LTESniffer has been executed. To enable the WireShark to analyze the decoded packets correctly, please refer to the WireShark configuration guide here. There are also some examples of pcap files in the link.
Note: The uplink pcap file contains both uplink and downlink messages. On the WireShark, use this filter to monitor only uplink messages: mac-lte.direction == 0; or this filter to monitor only downlink messages: mac-lte.direction == 1.

Application Note

Distance for uplink sniffing

The effective range for sniffing uplink is limited in LTESniffer due to the capability of the RF front-end of the hardware (i.e. SDR). The uplink signal power from UE is significantly weaker compared to the downlink signal because UE is a handheld device that optimizes battery usage, while the eNB uses sufficient power to cover a large area. To successfully capture the uplink traffic, LTESniffer can increase the strength of the signal power by i) being physically close to the UE, or ii) improving the signal reception capability with specialized hardware, such as a directional antenna, dedicated RF front-end, and signal amplifier.

The information displayed on the terminal

Downlink Sniffing Mode

Processed 1000/1000 subframes: Number of subframes was processed by LTESniffer last 1 second. There are 1000 LTE subframes per second by design.
RNTI: Radio Network Temporary Identifier of UEs.
Table: The maximum modulation scheme that is used by smartphones in downlink. LTESniffer supports up to 256QAM in the downlink. Refer to our paper for more details.
Active: Number of detected messages of RNTIs.
Success: Number of successfully decoded messages over number of detected messages (Active).
New TX, ReTX, HARQ, Normal: Statistic of new messages and retransmitted messages. This function is in development.
W_MIMO, W_pinfor, Other: Number of messages with wrong radio configuration, only for debugging.

Uplink Sniffing Mode

Max Mod: The maximum modulation scheme that is used by smartphones in uplink. It can be 16/64/256QAM depending on the support of smartphones and the configuration of the network. Refer to our paper for more details.
SNR: Signal-to-noise ratio (dB). Low SNR means the uplink signal quality from the smartphone is bad. One possible reason is the smartphone is far from the sniffer.
DL-UL_delay: The average of time delay between downlink signal from the base station and uplink signal from the smartphone.
Other Info: Information only for debugging.

API Mode

Detected Identity: The name of detected identity.
Value: The value of detected identity.
From Message: The name of the message that contains the detected identity.

Credits

We sincerely appreciate the FALCON and SRS team for making their great softwares available.

BibTex

Please refer to our paper for more details.

@inproceedings{hoang:ltesniffer,
title = {{LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper}},
author = {Hoang, Dinh Tuan and Park, CheolJun and Son, Mincheol and Oh, Taekkyung and Bae, Sangwook and Ahn, Junho and Oh, BeomSeok and Kim, Yongdae},
booktitle = {16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)},
year = {2023}
}

FAQ

Q: Is it mandatory to use GPSDO with the USRP in order to run LTESniffer?
A: GPSDO is useful for more stable synchronization. However, for downlink sniffing mode, LTESniffer still can synchronize with the LTE signal to decode the packets without GPSDO. For uplink sniffing mode, GPSDO is only required when using 2 USRP B-series, as it is the time and clock reference sources for synchrozation between uplink and downlink channels. Another uplink SDR option, using a single USRP X310, does not require GPSDO.

Q: For downlink traffic, can I use a cheaper SDR?
A: Technically, any SDRs supported by srsRAN library such as Blade RF can be used to run LTESniffer in the downlink sniffing mode. However, we only tested the downlink sniffing function of LTESniffer with USRP B210 and X310.

Q: Is it illegal to use LTESniffer to sniff the LTE traffic?
A: You should have to check the local regulations on sniffing (unencrypted) LTE traffic. Another way to test LTESniffer is setting up a personal LTE network by using srsRAN - an open-source LTE implementation in a Faraday cage.

Q: Can LTESniffer be used to view the content of messages between two users?
A: One can see only the "unencrypted" part of the messages. Note that the air traffic between the base station and users is mostly encrypted.

Q: Is there any device identity exposed in plaintext in the LTE network?
A: Yes, literature shows that there are multiple identities exposed, such as TMSI, GUTI, IMSI, and RNTI. Please refer to the academic literature for more details. e.g. Watching the Watchers: Practical Video Identification Attack in LTE Networks



Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw

Apple on Wednesday rolled out security patches to address a new zero-day flaw in iOS and iPadOS that it said has come under active exploitation in the wild. Tracked asย CVE-2023-42824, the kernel vulnerability could be abused by a local attacker to elevate their privileges. The iPhone maker said it addressed the problem with improved checks. "Apple is aware of a report that this issue may have
โŒ