Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN
Cloud security is often the weakest link in modern 5G networks according to our red team hacking assessments. Telcos have an opportunity now to embrace cloud security best practices and make 5G networks much more hacking resilient.
Extended Android security check: SnoopSnitch tests for Java vulnerabilities
SRLabs research found a significant patch gap in the Android patch ecosystem, which has since been shrunk. In our hunt for more missing patches, our SnoopSnitch app now detects significantly more potential vulnerabilities by analyzing Java bytecode.
Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution
This blog post covers how three zero-days in one software product were chained together to access a company network through an Internet-accessible web application and then fully compromise it.
When your phone gets sick: FluBot abuses Accessibility features to steal data
By abusing Accessibility features the FluBot malware circumvents Android's permission system to steal banking credentials. We explain how FluBot does this and what app developers can do to protect their users.
New RCS technology exposes most mobile users to hacking
In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS). RCS is poised to replace calling and text messaging for billions of people.
The Android patch ecosystem β Still fragmented, but improving
Since 2018, SRLabs has refined Android patch analysis through the app SnoopSnitch. Recent SnoopSnitch data paints an improved picture of the Android ecosystem over what we saw in 2018.
Mobile networks differ widely in security, none protect well in all dimensions
The base technology of most cell phone networks in the world β GSM β has been known to be weak for years.Β To publicly track the (currently slow) progress of security upgrading is publicly tracked by us to allow users to choose the highest protection.
The Android ecosystem contains a hidden patch gap
Android is the most successful operating system to date, with two billion devices in active use.Β Our large study of Android phones finds that some Android vendors regularly miss patches, leaving parts of the ecosystem exposed to the underlying risks.
Payment terminals allow for remote PIN capture and card cloning
Plastic cards are an increasingly popular means of payment all over the world. An analysis of the most widely deployed payment terminal in Germany found serious weaknesses.
Outdated payment protocols expose customers and merchants
Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical payment infrastructure, however, rely on proprietary protocolsΒ from the 90βs with large security deficiencies.
The Cloud exposes your private IP cameras
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera botnet.
Your Blockchain is only as secureΒ asΒ theΒ application on top of itΒ
Applications interacting with blockchain networks can be an attack surface to malicious actors and therefore need to be reviewed thoroughly.
USB peripherals can turn against their users
USB devices are connected to β and in many cases even built into β virtually all computers.Β The interface standard conquered the world over the past two decades thanks to its versatility.Β This versatility is also USBβs Achilles heel.
Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny
The Legic Prime system uses proprietary RFIDs for access control to buildings throughout Europe.Β Despite its use in high security installations, access cards can be cloned from a distance or newly created using a spoofed master token.
Cryptographic problems are reduced to their true hardness by SAT solvers
Many industrial ciphersβincluding those in todayβs access control and NFC applicationsβuse algebraically insecure cryptographic functions that can be broken using SAT solvers in an automated process.
The physical access control market is ripe for an upgrade to modern technology
Physical access control systems today predominantly use access badges with weak cryptography or no cryptography at all despite better building blocks being available.
Decrypting GSM phone calls
GSM telephony is the worldβs most popular communication technology spanning most countries and connecting over four billion devices. The security standards for voice and text messaging date back to 1990 and have never been overhauled.
Blockchain security β Six common mistakes found in Substrate chains
There is relatively little guidance on security mistakes to expect when working on blockchain projects. This post lists six mistakes we regularly find when auditing Substrate-based chains along with hands-on advice on how to mitigate the issues.
Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices
Responsible disclosure is the best practice to handle and fix unknown vulnerabilities. This blog includes real-world experience and advice from over a decade of SRLabs disclosing vulnerabilities responsibly.