United States Cell Phone Network Vulnerable To Attack - InformationWeek
02:45 PM
7 Key Cloud Security Trends Shaping 2017 & Beyond
Dec 15, 2016
Cloud computing is enabling business transformation as organizations accelerate time to market and ...Read More>>

United States Cell Phone Network Vulnerable To Attack

Attackers could exploit weaknesses in text messaging to crash voice and data service on an entire cell phone network, resarchers say.

Cell phone networks are so vulnerable to denial-of-service-style attacks that an assault carried out by a mid-sized bot network could bring down the United States' entire mobile infrastructure, a group of academic researchers said in a paper made public Wednesday.

The paper, which will be presented by four Pennsylvania State University researchers at the ACM Conference on Computer and Communications Security in November, outlined how an attack exploiting weaknesses in SMS (Short Message Service) could overload a cell network, and bring both voice and text messaging to a screeching stop.

The key to an attack, said the four in their paper, is that both voice and text messaging share the same small slice of the radio network -- which they called "control channels" -- to set up calls and SMS delivery, and assign the much broader "traffic channels" to voice calls. If the control channels are overloaded with, say, a large number of text messages, those channels are exhausted, making it impossible for voice calls to be connected.

The result: no cell communication at all.

The researchers, lead by Patrick McDaniel, a Penn State professor of computer science and engineering, noted that such an attack would require text messaging a large number of cell phones; sending massive numbers to only one phone, or even a few, doesn't do the trick.

But thanks to the Internet, it's not tough to compile a big list of numbers.

Using a combination of Google and public databases, an attacker could easily assemble a large pool of numbers to text message in a denial of service attack. With Google, the researchers "were able to collect 865 unique numbers from the greater State College, Penn., region, 7,308 from New York City, and 6,184 from Washington D.C. with minimal time and effort," they wrote in the paper.

The most successful attacks, said McDaniel and his colleagues, Thomas La Porta, another professor and the director of the school's the Networking and Security Research Center; PhD student Patrick Traynor; and graduate student William Enck, would be those directed against cell phone numbers in a defined geographic area, such as a metropolis.

Bringing down a city's cell system wouldn't require anything more than a cable or high-speed DSL modem, the four estimated, and access to the numerous Web sites which let people send text messages to mobile users.

Saturating the Washington D.C. cell network would take just 2.8Mbps of bandwidth; to bring down Manhattan's, no more than 1.3Mbps. Consumer-grade cable and DSL lines offer that much, and more.

To hack the whole U.S., about 370Mbps of bandwidth would be needed. "Such bandwidth could be harnessed from a moderately sized 'zombie' network," the paper went on. "Much larger distributed denial of service (DoS) attacks have already been seen, making this attack plausible."

While DoS attacks are relatively common against Web sites and servers, they've not been launched -- not purposefully, anyway -- against cellular networks. That could change at any time.

"An adversary injecting text messages from the Internet can cause almost twice the yearly expected network down-time in a metropolitan area using hit-lists containing as few as 2,500 targets," the Penn State researchers said. "With additional resources, attacks capable of denying voice and SMS service to an entire continent are also feasible."

The Penn State paper is available in PDF format from the university's Web site.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll