Mobile // Mobile Devices
News
9/25/2012
10:12 AM
Connect Directly
Twitter
Facebook
Google+
LinkedIn
RSS
E-Mail
50%
50%

Samsung Phone Flaw Lets Attackers Remotely Reset Device

A researcher at a security conference in Berlin has shown how USSD codes can be used in cyber attacks against Samsung phones. The Galaxy S3, for instance, could have its SIM card wiped merely by browsing a malicious website.

A researcher at a security conference in Berlin has shown how Unstructured Supplementary Service Data (USSD) codes could be used in cyber attacks against mobile phones. The Samsung Galaxy S3, for instance, can be reset to factory default merely by browsing a malicious website.

Ravi Borgaonkar, a researcher at the Technical University of Berlin, gave a presentation entitled, Dirty use of USSD Codes in Cellular Network. Below is a video of part of the presentation:

The codes are commands to the phone to perform diagnostic and management features as listed on the xda-developers wiki:

  • testing mode
  • view IMEI number
  • service mode signal status
  • display phone's current firmware
  • battery and other general settings like GSM/CDMA
  • change the "Power" button action in your phone
  • Factory data soft reset
  • Gtalk service monitor
  • Opens a File copy screen where you can back up your media files
  • GPS test
  • service mode main menu
  • Factory Hard Reset to ROM firmware default settings
  • leave Factory

These codes can be invoked, without any user intervention, through a variety of mechanisms. Borgaonkar demonstrated the attack using an SMS message sent to the phone, holding the phone in proximity to an NFC tag, and discussed others such as a QR code.

All these vectors result in pushing the code to the phone, possibly by instructing it to visit a website that contains a "tel:" URL with the code. For example, a Samsung phone, when visiting a Web page containing <frame src="tel:*2767*3855#" />" would reset the phone to factory default. Other codes can wipe the SD and SIM cards.

Borgaonkar says that the attacks only work so far on Samsung devices. Many of the attack vectors can be disabled by the user. It's not clear that these vectors are present with all carriers.

Hat tip to Softpedia.

Comment  | 
Print  | 
More Insights
Building A Mobile Business Mindset
Building A Mobile Business Mindset
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps and it's past time for those with no plans to get cracking.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Nov. 10, 2014
Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 16, 2014.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.