πŸ”’
❌
There are new articles available, click to refresh the page.
βœ‡Research Blog by Security Research Labs

Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN

β€”
Cloud security is often the weakest link in modern 5G networks according to our red team hacking assessments. Telcos have an opportunity now to embrace cloud security best practices and make 5G networks much more hacking resilient.

βœ‡Research Blog by Security Research Labs

Extended Android security check: SnoopSnitch tests for Java vulnerabilities

β€”
SRLabs research found a significant patch gap in the Android patch ecosystem, which has since been shrunk. In our hunt for more missing patches, our SnoopSnitch app now detects significantly more potential vulnerabilities by analyzing Java bytecode.

βœ‡Research Blog by Security Research Labs

Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution

β€”
This blog post covers how three zero-days in one software product were chained together to access a company network through an Internet-accessible web application and then fully compromise it.

βœ‡Research Blog by Security Research Labs

When your phone gets sick: FluBot abuses Accessibility features to steal data

β€”
By abusing Accessibility features the FluBot malware circumvents Android's permission system to steal banking credentials. We explain how FluBot does this and what app developers can do to protect their users.

βœ‡Research Blog by Security Research Labs

New RCS technology exposes most mobile users to hacking

β€”
In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS). RCS is poised to replace calling and text messaging for billions of people.

βœ‡Research Blog by Security Research Labs

The Android patch ecosystem – Still fragmented, but improving

β€”
Since 2018, SRLabs has refined Android patch analysis through the app SnoopSnitch. Recent SnoopSnitch data paints an improved picture of the Android ecosystem over what we saw in 2018.

βœ‡Research Blog by Security Research Labs

Mobile networks differ widely in security, none protect well in all dimensions

β€”
The base technology of most cell phone networks in the world – GSM – has been known to be weak for years.Β To publicly track the (currently slow) progress of security upgrading is publicly tracked by us to allow users to choose the highest protection.

βœ‡Research Blog by Security Research Labs

The Android ecosystem contains a hidden patch gap

β€”
Android is the most successful operating system to date, with two billion devices in active use.Β Our large study of Android phones finds that some Android vendors regularly miss patches, leaving parts of the ecosystem exposed to the underlying risks.

βœ‡Research Blog by Security Research Labs

Payment terminals allow for remote PIN capture and card cloning

β€”
Plastic cards are an increasingly popular means of payment all over the world. An analysis of the most widely deployed payment terminal in Germany found serious weaknesses.

βœ‡Research Blog by Security Research Labs

Outdated payment protocols expose customers and merchants

β€”
Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical payment infrastructure, however, rely on proprietary protocolsΒ from the 90’s with large security deficiencies.

βœ‡Research Blog by Security Research Labs

The Cloud exposes your private IP cameras

β€”
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera botnet.

βœ‡Research Blog by Security Research Labs

Your Blockchain is only as secureΒ asΒ theΒ application on top of itΒ 

β€”
Applications interacting with blockchain networks can be an attack surface to malicious actors and therefore need to be reviewed thoroughly.

βœ‡Research Blog by Security Research Labs

USB peripherals can turn against their users

β€”
USB devices are connected to – and in many cases even built into – virtually all computers.Β The interface standard conquered the world over the past two decades thanks to its versatility.Β This versatility is also USB’s Achilles heel.

βœ‡Research Blog by Security Research Labs

Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny

β€”
The Legic Prime system uses proprietary RFIDs for access control to buildings throughout Europe.Β Despite its use in high security installations, access cards can be cloned from a distance or newly created using a spoofed master token.

βœ‡Research Blog by Security Research Labs

Cryptographic problems are reduced to their true hardness by SAT solvers

β€”
Many industrial ciphersβ€”including those in today’s access control and NFC applicationsβ€”use algebraically insecure cryptographic functions that can be broken using SAT solvers in an automated process.

βœ‡Research Blog by Security Research Labs

The physical access control market is ripe for an upgrade to modern technology

β€”
Physical access control systems today predominantly use access badges with weak cryptography or no cryptography at all despite better building blocks being available.

βœ‡Research Blog by Security Research Labs

Decrypting GSM phone calls

β€”
GSM telephony is the world’s most popular communication technology spanning most countries and connecting over four billion devices. The security standards for voice and text messaging date back to 1990 and have never been overhauled.

βœ‡Research Blog by Security Research Labs

Blockchain security – Six common mistakes found in Substrate chains

β€”
There is relatively little guidance on security mistakes to expect when working on blockchain projects. This post lists six mistakes we regularly find when auditing Substrate-based chains along with hands-on advice on how to mitigate the issues.

βœ‡Research Blog by Security Research Labs

Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices

β€”
Responsible disclosure is the best practice to handle and fix unknown vulnerabilities. This blog includes real-world experience and advice from over a decade of SRLabs disclosing vulnerabilities responsibly.

❌