Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • India vs Australia
Trending Donald Trump Narendra Modi Elon Musk United States Joe Biden

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Trump in Asia
  • Shreyas Iyer injury
  • Louvre heist
  • Hurricane Melissa
  • Nuclear-powered Russian missile
  • Justin Trudeau dating Katy Perry
fp-logo
Chinese researchers demonstrate "Ghost Telephonist" attack for hijacking a user's communication
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit

Chinese researchers demonstrate "Ghost Telephonist" attack for hijacking a user's communication

Indo Asian News Service • July 31, 2017, 10:39:50 IST
Whatsapp Facebook Twitter

The demonstration was made on Sunday by the UnicornTeam researchers from 360 Technology, at the ongoing hacker summit Black Hat USA 2017.

Advertisement
Subscribe Join Us
Choose
Firstpost on Google
Choose
Firstpost on Google
Chinese researchers demonstrate "Ghost Telephonist" attack for hijacking a user's communication

A group of Chinese researchers have demonstrated an “evil attack” called the “Ghost Telephonist” which allows hackers to take over phone numbers and gather call and message content. [caption id=“attachment_3865461” align=“alignleft” width=“380”]Black Hat Conference. Reuters. Black Hat Conference. Reuters.[/caption] The demonstration was made on Sunday by the UnicornTeam researchers from 360 Technology, China’s leading security company, at the ongoing hacker summit **Black Hat** USA 2017 here, reports Xinhua news agency. In the team’s presentation, **security** researchers introduced one vulnerability in CSFB (Circuit Switched Fallback) in 4G LTE network. In the CSFB procedure, the researchers found the authentication step is missing. “Several exploitations can be made based on this vulnerability,” Unicorn Team wireless security researcher Huang Lin, told Xinhua.  “We have reported this vulnerability to the Global System for Mobile Communications Alliance(GSMA)”. The team presented a scenario where one could reset a Google account password using a stolen mobile number. After hijacking a user’s communication, researcher signed in the user’s Google Email and clicked “forget the password”. Since Google sends verification code to the victim’s mobile, attackers can intercept the SMS text, thereby resetting the account’s password. The victim keeps online in 4G network unaware of the attack. A lot of internet application accounts use verification SMS to reset the login password, which means an attacker can use a phone number to start password reset procedure then hijack the verification SMS. According to the researchers, the attacker can also initiate a call or an SMS by impersonating the victim. Furthermore, Telephonist Attack can obtain the victim’s phone number and then use the phone number to make an advanced attack. The victim will not sense being attacked since no 4G or 2G fake base station is used and no cell re-selection. These attacks can randomly choose victims or target a given victim. The research team proposed many counter-measures to operators and Internet service provider as well. Researchers say now they are collaborating with operators and terminal manufactures to fix this vulnerability.

Tags
China Hacker 4G network 2G network Telephonist Attack UnicornTeam
  • Home
  • Tech
  • News & Analysis
  • Chinese researchers demonstrate "Ghost Telephonist" attack for hijacking a user's communication
End of Article
Latest News
Find us on YouTube
Subscribe
  • Home
  • Tech
  • News & Analysis
  • Chinese researchers demonstrate "Ghost Telephonist" attack for hijacking a user's communication
End of Article

Top Stories

‘I’d love to do it’: Trump refuses to rule out third term — despite constitutional limit

‘I’d love to do it’: Trump refuses to rule out third term — despite constitutional limit

What is the ‘Golden Fleet’ of navy ships that Trump wants to counter China with?

What is the ‘Golden Fleet’ of navy ships that Trump wants to counter China with?

‘Ramayan country’: Why Trinidad and Tobago wants to build a large Ram temple

‘Ramayan country’: Why Trinidad and Tobago wants to build a large Ram temple

How China's rare earths choke changed America's trade deals

How China's rare earths choke changed America's trade deals

‘I’d love to do it’: Trump refuses to rule out third term — despite constitutional limit

‘I’d love to do it’: Trump refuses to rule out third term — despite constitutional limit

What is the ‘Golden Fleet’ of navy ships that Trump wants to counter China with?

What is the ‘Golden Fleet’ of navy ships that Trump wants to counter China with?

‘Ramayan country’: Why Trinidad and Tobago wants to build a large Ram temple

‘Ramayan country’: Why Trinidad and Tobago wants to build a large Ram temple

How China's rare earths choke changed America's trade deals

How China's rare earths choke changed America's trade deals

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Enjoying the news?

Get the latest stories delivered straight to your inbox.

Subscribe
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV