Researcher Hacks Smartphone Radio Chips

Smartphones are vulnerable to hacking from a new direction, according to a University of Luxembourg researcher, who is to demonstrate his new hacking technique at the Black Hat conference in Washington, D.C. on Tuesday.

Research associate Ralf-Philipp Weinmann is to show how malicious mobile phone towers can be used to hack directly into a handset’s baseband processor, the chip used to send and receive radio signals.

Baseband vulnerabilities

Weinmann’s research has already resulted in smartphone security patches. Last November, for instance, Apple patched a bug affecting the iPhone 3G and later models that could have allowed malicious code to be executed on the baseband processor, crediting Weinmann for reporting the issue.

The bugs to be used in Tuesday’s demonstration affect the firmware used in Qualcomm and Infineon chips to process GSM signals, Weinmann has told the press. He said he will demonstrate the use of the auto-answer feature to turn a handset into a covert listening tool.

In the abstract published on the Black Hat website, Weinmann said the key to baseband hacking has been the introduction of relatively low-cost open-source packages for running GSM base stations, such as OpenBTS.

“Attack scenarios against smartphones have concentrated on vulnerable software executed on the application processor,” Weinmann wrote. “The operating systems running on these processors are getting hardened by vendors as can best be seen in the case of Apple’s iOS, which both uses data execution prevention and code signing to make exploitation of memory corruptions and running malicious software harder. In contrast, the GSM/3GPP stack running on the baseband processor has been neglected.”

He said the possibility of setting up a relatively cheap, malicious base station has not been taken into account in existing security models.

New type of attack

“Malicious base stations are not considered in the attack model assumed by the GSMA and the ETSI; similarly vendors of baseband stacks seem to not have taken malicious input from the network side into account,” he wrote.

He said his demonstration will show the first over-the-air exploitations of memory corruption in GSM/3GPP stacks that result in malicious code being executed on the baseband processors.

Recent iPhone hacks include a demonstration in April of last year showing Google’s Android operating system running on a first-generation iPhone.

In March of last year, at the Pwn2Own contest at CanSecWest Applied Security conference in Vancouver, Weinmann demonstrated an iPhone hacking technique that bypassed the code signing and data execution prevention features that normally prevent arbitrary code from running.

Working with security firm Zynamics, he “chained existing code bits” (TXT file) in a technique known as return-into-libc or return-oriented-programming.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

5 hours ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

7 hours ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

8 hours ago

VW, Rivian Launch Joint Venture, As Investment Rises To $5.8 Billion

Volkswagen and Rivian officially launch their joint venture, as German car giant ups investment to…

9 hours ago

AMD Axes 4 Percent Of Staff, Amid AI Chip Focus

Merry Christmas staff. AMD hands marching orders to 1,000 employees in the led up to…

12 hours ago

Tesla Recalls 2,431 Cybertrucks Over Propulsion Issue

Recall number six in 2024 for Tesla Cybertruck, and this time the fault cannot be…

13 hours ago