Connect with us


Hackers Can Spoof ‘Presidential Alerts’ Using Off-The-Rack Hardware And An Open-Source Software

[bctt tweet=”With an off-the-rack hardware and an open source software, hackers can exploit LTE vulnerabilities to send fake presidential alerts.” username=”Z6Mag”]



A study concluded that by using an off-the-rack hardware and an open source software, hackers can exploit LTE vulnerabilities to send fake presidential alerts.
Hackers can exploit LTE vulnerabilities to send bogus presidential alerts. Photo: Bytemarks | CC BY 2.0

The newly acquired system by the U.S. government to send unblockable messages to U.S. citizens in times of an emergency from the President can be hacked by hackers using off-the-rack hardware and open-source software, a study revealed.

According to researchers from the University of Colorado Boulder in a study published this week, hackers can use the vulnerabilities in the LTE network in order to send bogus presidential alerts to Americans within the range of an entire 50,000-seat football stadium with little effort in order to incite panic and chaos among those who receive the fake message.

In the study conducted by the researchers, 90% of their tests have been successful in sending bogus presidential alerts to their targets using the only some commercially-available software defined radio, and our modifications to the open source NextEPC and srsLTE software libraries. They also concluded that their developed spoofing technique could succeed in all tested smartphones in the top four cellular carriers in the US.

“We find that with only four malicious portable base stations of a single Watt of transmit power each, almost all of a 50,000-seat stadium can be attacked with a 90% success rate,” reads the study’s abstract.

The vulnerability can cause “cascades of panic”

Researchers also said that the intensity of the effect a bogus presidential alert depends on the number of cellphones within the range of the fake alert. This means that the more populated the area is, the more significant the impact the fake messages can create and the more extensive the panic that will ensue from it.

“Fake alerts in crowded cities or stadiums could potentially result in cascades of panic,” they added.

Last year the Federal Emergency Management Agency sent out the first “presidential alert” test using the Wireless Emergency Alert (WEA) system as part of the mandate of Warning, Alert, and Response Act of 2006. It was part of the initiative to test the newly acquire state-of-the-art technology that would allow any president to send messages to Americans in bulk in times of disasters and other emergencies. It also runs in the same technology that powers Amber alerts and the system that sends messages to people for severe weather warnings.

But the system isn’t perfect. There are documented cases where a wrong message was sent to people during the test. Last year amid tensions between the U.S. and North Korea, an erroneous alert warned residents of Hawaii of an inbound ballistic missile threat. The message mistakenly said the alert was “not a drill.”

Problems with the current system and how to solve them

While there is already an acknowledgment that the system is vulnerable to human errors, the researchers of the study have revealed that malicious attacks can also be a problem for the system as hackers can exploit vulnerabilities in the LTE network to carry out a massive scare terrorism attack.

Another problem pointed out by the researchers is the absence of a system that validates the authenticity of the messages people receives. The researchers said fixing the vulnerabilities would “require a large collaborative effort between carriers, government stakeholders, and cell phone manufacturers.” They added that adding digital signatures to each broadcast alert is not a “magic solution” but would make it far more challenging to send spoofed messages.

Meanwhile, the researchers admit that there are still challenges that multi-sectoral problem solving is facing. For starters, updates to the CMAS architecture could require expensive changes by cell phone manufacturers, operating system developers, government bodies, and cellular carriers.

“Furthermore, updates must still support outdated devices, both on the user (UE) and infrastructure (eNodeB) side, as it could take years to replace or update old equipment already in use. Also, any comprehensive defense must tradeoff the protections provided with the availability of the system: if users cannot receive valid alerts due to complex protections, it may be more hazardous than if we continued to use the existing (but vulnerable) system,” they added.

To overcome these challenges, the researchers are proposing two solutions: (1) digitally signing message for people to authenticate the warning they receive; and (2) establishing network profiling technique which can be solely implemented on the UE without modifications to the network.

A consumer tech and cybersecurity journalist who does content marketing while daydreaming about having unlimited coffee for life and getting a pet llama.


Google Hits Back: ‘We Do Not Work With The Chinese Military’

Google denies all allegation made by Peter Thiel.



Photo: Travis Wise | Flickr | CC BY 2.0

When White House Adviser and Facebook Board Member Peter Thiel suggested that Google should be investigated for its “treasonous” behavior, and for working with the Chinese military, President Donald Trump agreed.

But now, Google hits back to the allegations that the San Francisco-based tech superpower is working with China and its army. “As we have said before, we do not work with the Chinese military,” Google said in a statement shared with The Independent.

Earlier today, President Trump affirmatively responded to Thiel’s suggestion that the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) should investigate Google for its refusal to work with the US Department of Defense, and over the accusation that the company has a relationship with its Asian counterpart.

In a Twitter storm, President Trump praised Peter Thiel, saying that he is a “great and brilliant guy who knows this subject better than anyone.” The American chief-of-staff also echoed the sentiments of Thiel and pronounced that the “Trump Administration will investigate.”

The allegations made by Thiel stems from a previous deal that Google backed out from. In 2018, Google decided to withdraw from a contract between the tech superpower and the U.S. Department of Defense for the development of artificial intelligence (AI) technology citing that the projects have specific ethical issues that they cannot be involved in.

Thiel questions “how many foreign intelligence agencies have infiltrated your Manhattan Project for AI.” Furthermore, he also asked whether or not Google’s senior executives consider the possibility that the company has been infiltrated by foreign intelligence.

The “billionaire and tech businessman,” Thiel further questions if Google chose to work with the Chinese military instead of the US Department of Defense since “they are making the sort of bad, short-term rationalistic [decision] that if the technology doesn’t go out the front door, it gets stolen out the backdoor anyway?”

According to Axios’ report, there are no public documents that stipulate any infiltration by foreign intelligence of Google. However, they said that Thiel owns a company called Palantir, which works with the Trump Administration, and has access to millions worth of government data, including American private information. Nonetheless, it is still unclear if Thiel’s assertions are motivated by any personal and classified knowledge he drew from his relationship with the White House.

Trump vs. Google

Google and the White House having a beef against each other is not new. In fact, only recently, an exposé by the independent investigative journalist group, Project Veritas, alleges that several Google executives and senior employees have a political bias against President Trump and his administration.

A video released by Project Veritas, which has since been removed from the platform by Youtube, shows a senior employee at the company appearing to admit that the company plans to interfere in the next presidential election to stop Donald Trump.

The video is still available in the Project Veritas website and featured undercover footage of a top Google employee, Jen Gennai, who preaches that the company, Google, should not be broken up since they still need to stop the re-election of the President and only them can prevent the “next Trump situation.”

“Elizabeth Warren is saying we should break up Google. And like, I love her but she’s very misguided, like that will not make it better it will make it worse, because all these smaller companies who don’t have the same resources that we do will be charged with preventing the next Trump situation, it’s like a small company cannot do that,” the video revealed appearing to be said by Gennai.

In the same video, Gennai also appears to declare that Trump’s victory in the 2016 elections “screwed us (Google).”

“We all got screwed over in 2016; again it wasn’t just us, it was, the people got screwed over, the news media got screwed over, like, everybody got screwed over, so we’re rapidly like, happened there and how do we prevent it from happening again,” she added.

“We’re also training our algorithms, like, if 2016 happened again, would we have, would the outcome be different?”

Continue Reading


FCC Comm Geoffrey Starks Is Disappointed With How Carriers Move To Block Robocall By Default



Photo: FCC Website

A month after the Federal Communication Commission voted to allow telecom carriers and service providers to block spam calls and other forms of robocalls by default, the regulating body seems to be very disappointed with how telecom companies responded to the regulation.

In June, FCC Commissioner Geoffrey Starks sent letters to major telecom providers in the US to expedite their implementation of the new ruling and to come up with policies and features that would, once and for all, address the growing problem of robocalls in the U.S.

Today, the disappointed Commission published the responses of major telecom carriers to his letter and his public reply to how slow the said companies are implementing necessary improvements in their system.

“I appreciate the timely responses to my letters. Transparency is critical to good policymaking, so I am publicly releasing the complete responses of the carriers – so that everyone can read their responses in their own words. Despite historically clamoring for new tools, it does not appear that all providers have acted with haste to deploy opt-out robocall blocking services,” said Commissioner Geoffrey Starks.

“The Commission spoke clearly: we expect opt-out call blocking services to be offered to consumers for free. Reviewing the substance of these responses, by and large, carriers’ plans for these services are far from clear,” he lamented.

In June 2019, Commissioner Starks voted on a Declaratory Ruling and Third Further Notice of Proposed Rulemaking that clarified that voice service providers could, without violating Commission rules, deploy call blocking offered to consumers by default on an informed opt-out basis. The action expressed the Commission’s expectation that these services would be offered to consumers for free and, at Commissioner Starks’ request, directed Commission staff to prepare reports on the state of deployment of robocall blocking tools, including whether fees are being charged for the services.

“The reports will be submitted to the Commission no later than 12 months, for the first report, and 24 months, for the second report, after the publication of the item in the Federal Register. Following the delivery of the first report, the Commission will assess whether consumers are being charged and if so, will seek comment on rules requiring providers that offer these services to do so for free,” says the statement from Commissioner Starks.

Furthermore, the Further Notice of Proposed Rulemaking would propose a safe harbor for providers that implement network-wide blocking of calls that fail caller authentication under the SHAKEN/STIR framework once it is implemented.

“Allowing call blocking by default could be a big benefit for consumers who are sick and tired of robocalls. By making it clear that such call blocking is allowed, the FCC will give voice service providers the legal certainty they need to block unwanted calls from the outset so that consumers never have to get them,” said Chairman Pai. “And, if this decision is adopted, I strongly encourage carriers to begin providing these services by default—for free—to their current and future customers. I hope my colleagues will join me in supporting this latest attack on unwanted robocalls and spoofing.”

In response to that order, Commissioner Starks asked 14 telecoms to inform the Commission of their plans to offer free robocall-blocking services by default.

Unwanted calls, including illegal robocalls, are the top consumer complaint at the FCC, with more than 200,000 received annually. Some private analyses estimate that U.S. consumers received approximately 2.4 billion robocalls per month in 2016. Advancements in technology make it cheap and easy to make robocalls and to “spoof” Caller ID information to hide the caller’s true identity.

Last week, telecom giant AT&T announced that they are blocking fraud robocalls by default with no extra charge. However, succeeding and more accurate blocking features comes with a $4 monthly price tag.

The new anti-robocalling feature is an expansion of the already existing AT&T program called Call Protect and will start rolling out for new AT&T Mobility consumer lines will come with the anti-robocall service. Millions of existing AT&T customers also will have it automatically added to their accounts over the coming months.

Other telecom companies also said they have made progress in relation to the FCC order but Commissioner Sparks’ message tells us that they are not doing the best that they can.

Continue Reading


Meet ‘Agent Smith’: The New Wave Of Android Malware

It has already affected 25 million Android users globally.



Photo: rick | Flickr | CC BY 2.0

Android OS is known to be one of the most vulnerable. With its customization feature and its wide array of compatible apps, malware and other malicious codes can run through Android devices with relative ease. And this is highlighted by reports claiming that a new wave of Android malware is creeping through Android devices through malicious apps.

The malware, known as Agent Smith, has already affected more than 25 million Android users around the world. The sneaky malware, as explained by IT security company Check Point, “disguised as a Google-related application, and exploits known Android vulnerabilities and automatically replaces installed apps with malicious versions without users’ knowledge or interaction.”

While the researchers said that there is no evidence found that Agent Smith collects unauthorized data, the persistence of malware in a device is enough for some threat actors to exploit the Android vulnerability it creates.

According to the researchers, Android users will go unaware that Agent Smith malware has already infected their devices because there is no direct download for it. Instead, the malware code comes after downloading games and other apps from a third-party marketplace.

The comprehensive research on Agent Smith Malware was conducted by Aviran Hazum, Feixiang He, Inbal Marom, Bogdan Melnykov, and Andrey Polkovnichenko from CheckPoint. According to the researchers, the malware strain works in three different phases.

Agent Smith attack flow. Photo: Check Point

The first phase involves a dropper app that lures victims to install itself voluntarily. The initial dropper has a weaponized Feng Shui Bundle as encrypted asset files. Dropper variants are usually barely functioning photo utility, games, or sex-related apps. “The dropper automatically decrypts and installs its core malware APK, which later conducts malicious patching and app updates. The core malware is usually disguised as Google Updater, Google Update for U, or “” The core malware’s icon is hidden,” they said.

“The core malware extracts the device’s installed app list. If it finds apps on its prey list (hard-coded or sent from C&C server), it will extract the base APK of the target innocent app on the device, patch the APK with malicious ads modules, install the APK back and replace the original one as if it is an update,” they added.

The “core” module contacts the C&C server, trying to get a fresh list of applications to search for, or if that fails, use a default app list:

  • WhatsApp
  • lenovo.anyshare.gps
  • jiochat.jiochatapp
  • jio.join
  • good.gamecollection
  • startv.hotstar
  • meitu.beautyplusme
  • domobile.applock
  • touchtype.swiftkey
  • cn.xender
  • eterno
  • truecaller

According to researchers, the dropper app can be downloaded and is proliferated by a third-party app marketplace called 9Apps”, a UC team backed store, targeted mostly at Indian (Hindi), Arabic, and Indonesian users.

They also revealed that the malware seems to target mainly Indian users. However, reports from the US, Australia, and other regions show that the persistence of the malware is rather global.

“Agent Smith” droppers show a very greedy infection tactic. It’s not enough for this malware family to swap just one innocent application with an infected double. It does so for every app on the device as long as the package names are on its prey list,” the researchers explained.

“Over time, this campaign will also infect the same device, repeatedly, with the latest malicious patches. This leads us to estimate there to be over 2.8 billion infections in total, on around 25 Million unique devices, meaning that on average, each victim would have suffered roughly 112 swaps of innocent applications.”

The researchers said that while Agent Smith primarily exploits users by using financial ads, it has a plethora of implications, especially on how users are not usually aware that their devices are already infected. In the end, they said that fighting malicious actors in the Android ecosystem is a community effort.

“The “Agent Smith” campaign serves as a sharp reminder that effort from system developers alone is not enough to build a secure Android eco-system. It requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time,” the researchers concluded.

Continue Reading