Yes and no. Now that the information is out there, though, hackers with the financial resources to put the IMSI catcher together could start intercepting calls. The range of the IMSI catcher is relatively small, so the odds of your phone connecting to a random IMSI catcher are almost negligible, and it would only be an issue as long as you stayed in close proximity to the IMSI catcher.
However, if a user is specifically targeted, the rogue GSM tower could be an effective means of intercepting calls. Armed with this, they were able to locate the unique ID for any phone using this base, breaking the encryption keys with a rainbow table lookup.
Although far from trivial as hacks go, the new break does lower the bar considerably compared to previous hacks shown by the same reasearchers. Another important detail is that Nohl was able to replace the firmware of the handsets with custom software. According to the BBC report on which most stories are being based, this was only possible because the Motorola handsets in question had been reverse engineered after an unspecified leak. How easy would it be to exploit the new hack?
You can post now and register later. If you have an account, sign in now to post with your account. Paste as plain text instead.
Only 75 emoji are allowed. Display as a link instead. Clear editor. Upload or insert images from URL. Share More sharing options Followers 1. Reply to this topic Start new topic. Recommended Posts. Joe Posted July 18,
0コメント