πŸ”’
❌
There are new articles available, click to refresh the page.
Before yesterdayResearch Blog by Security Research Labs

Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN

Cloud security is often the weakest link in modern 5G networks according to our red team hacking assessments. Telcos have an opportunity now to embrace cloud security best practices and make 5G networks much more hacking resilient.

Extended Android security check: SnoopSnitch tests for Java vulnerabilities

SRLabs research found a significant patch gap in the Android patch ecosystem, which has since been shrunk. In our hunt for more missing patches, our SnoopSnitch app now detects significantly more potential vulnerabilities by analyzing Java bytecode.

Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution

This blog post covers how three zero-days in one software product were chained together to access a company network through an Internet-accessible web application and then fully compromise it.

When your phone gets sick: FluBot abuses Accessibility features to steal data

By abusing Accessibility features the FluBot malware circumvents Android's permission system to steal banking credentials. We explain how FluBot does this and what app developers can do to protect their users.

New RCS technology exposes most mobile users to hacking

In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS). RCS is poised to replace calling and text messaging for billions of people.

The Android patch ecosystem – Still fragmented, but improving

Since 2018, SRLabs has refined Android patch analysis through the app SnoopSnitch. Recent SnoopSnitch data paints an improved picture of the Android ecosystem over what we saw in 2018.

Mobile networks differ widely in security, none protect well in all dimensions

The base technology of most cell phone networks in the world – GSM – has been known to be weak for years.Β To publicly track the (currently slow) progress of security upgrading is publicly tracked by us to allow users to choose the highest protection.

The Android ecosystem contains a hidden patch gap

Android is the most successful operating system to date, with two billion devices in active use.Β Our large study of Android phones finds that some Android vendors regularly miss patches, leaving parts of the ecosystem exposed to the underlying risks.

Payment terminals allow for remote PIN capture and card cloning

Plastic cards are an increasingly popular means of payment all over the world. An analysis of the most widely deployed payment terminal in Germany found serious weaknesses.

Outdated payment protocols expose customers and merchants

Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical payment infrastructure, however, rely on proprietary protocolsΒ from the 90’s with large security deficiencies.

The Cloud exposes your private IP cameras

Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera botnet.

Your Blockchain is only as secureΒ asΒ theΒ application on top of itΒ 

Applications interacting with blockchain networks can be an attack surface to malicious actors and therefore need to be reviewed thoroughly.

USB peripherals can turn against their users

USB devices are connected to – and in many cases even built into – virtually all computers.Β The interface standard conquered the world over the past two decades thanks to its versatility.Β This versatility is also USB’s Achilles heel.

Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny

The Legic Prime system uses proprietary RFIDs for access control to buildings throughout Europe.Β Despite its use in high security installations, access cards can be cloned from a distance or newly created using a spoofed master token.

Cryptographic problems are reduced to their true hardness by SAT solvers

Many industrial ciphersβ€”including those in today’s access control and NFC applicationsβ€”use algebraically insecure cryptographic functions that can be broken using SAT solvers in an automated process.

The physical access control market is ripe for an upgrade to modern technology

Physical access control systems today predominantly use access badges with weak cryptography or no cryptography at all despite better building blocks being available.

Decrypting GSM phone calls

GSM telephony is the world’s most popular communication technology spanning most countries and connecting over four billion devices. The security standards for voice and text messaging date back to 1990 and have never been overhauled.

Blockchain security – Six common mistakes found in Substrate chains

There is relatively little guidance on security mistakes to expect when working on blockchain projects. This post lists six mistakes we regularly find when auditing Substrate-based chains along with hands-on advice on how to mitigate the issues.

Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices

21 December 2021 at 07:30
Responsible disclosure is the best practice to handle and fix unknown vulnerabilities. This blog includes real-world experience and advice from over a decade of SRLabs disclosing vulnerabilities responsibly.

❌