Iranian UICCs hacke...
 
Notifications
Clear all

Iranian UICCs hacked

44 Posts
6 Users
0 Reactions
5,733 Views
(@dalton-c)
Active Member
Joined: 7 years ago
Posts: 6
 

The MSI's subscribers were hacked through the 3G mobile network and their UICCs infected. I have one piece in-lab and proof of infection.

which kind of infection has compromised UICC? you talked about A5/3 while it use for ciphering and implemented inside mobile phone. also you talked about IR21 which is relating to network. could you please explain more about the infection and targeted technology?


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

The MSI's subscribers were hacked through the 3G mobile network and their UICCs infected. I have one piece in-lab and proof of infection.

which kind of infection has compromised UICC? you talked about A5/3 while it use for ciphering and implemented inside mobile phone. also you talked about IR21 which is relating to network. could you please explain more about the infection and targeted technology?

Dalton-C I entirely agree with you. More clarity and identification idea is needed please in order to raise observations….


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Bound.


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

Bound.

Nonsense


   
ReplyQuote
(@dalton-c)
Active Member
Joined: 7 years ago
Posts: 6
 

Bound.

this is like a machine that you want to produce without any input. how you are claiming without providing any PoC?


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Please see my very first post. These were my questions. Your questions are yours, not mines.


   
ReplyQuote
(@dalton-c)
Active Member
Joined: 7 years ago
Posts: 6
 

Please see my very first post. These were my questions. Your questions are yours, not mines.

You know better all simcards and teleco modules work based on standard and any vulnerability on each one will affect many MNOs.
as the subject of your first post is claim, not question and you are talking about things that are not relating to each other, we are worry about the next target of this attack. i couldn't understand yet why subject of topic is about infecting UICC but your posts are about IR21 process, A5/3 and other things which are relating to network layer?


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Right, we here want to understand how this happened. Lets name it InfectionPath, then InfectionEvent and InfectionResult. The InfectionResult he have. My colleague of networking told me that always you want to reach all hosts its called Broadcast. So InfectionBroadcast. MNOs can update the UICCs, this was EndInfectionPath. Which unit in 3G MNOs rolls out this?

What we immediately! were asked by our board members was, can this happen in LTE or is this a '3G problem'?

I understand that you are disappointed that I am bound. But I dont walk behind bars.


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

TinyBrain in your last post you said

Right, we here want to understand how this happened. Lets name it InfectionPath, then InfectionEvent and InfectionResult. The InfectionResult he have. My colleague of networking told me that always you want to reach all hosts its called Broadcast. So InfectionBroadcast. MNOs can update the UICCs, this was EndInfectionPath. Which unit in 3G MNOs rolls out this?

So when I posted my points to you below, you, in fact, could have responded given your comments above. Instead you came out with a single comment "bound", which as you NOW know was a nonsense comment by you given your comments in your last post.

The MSI's subscribers were hacked through the 3G mobile network and their UICCs infected. I have one piece in-lab and proof of infection.

1. Was the hack created by attachment to an SMS?
2. Was it thru use of USSDs?
3. Do you have an identity (name) of the infection you have found?
4. Did the handset used by UICC import the infection from infected files?

If you take time to re-visit the questions above and those that have been excellently put to you by Dalton-C you will come to realise combined they sought to help you. If you haven't, you could do some research by reading IR21. Also, perhaps define what you think 'Broadcast' means.


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Reverse engineering of the InfectionsResult to find out how it really was done is fine if you can. Our approach for future problems is over which pathes is this in general possible by tech, then we check with the vendors howt they implemented the tech and standards to see if they may failed by unknown, which is understandable. To only understand the case give does not be preparation for the future. Our approach is starting BIG to catch theoretically AllInfectionPossibilities.

Yes, I will do my homework about Broadcast in 3G.


   
ReplyQuote
Page 3 / 5
Share: