TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SIM Cards Have Finally Been Hacked, and the Flaw Could Affect Millions of Phones

262 pointsby mdewinteralmost 12 years ago

11 comments

tptacekalmost 12 years ago
Karsten Nohl: also the real deal.<p>Here, for us, are the nut grafs:<p><i>In early 2011, Nohl’s team started toying with the OTA protocol and noticed that when they used it to send commands to several SIM cards, some would refuse the command due to an incorrect cryptographic signature, while a few of those would also put a cryptographic signature on this error message.</i><p><i>With that signature and using a well known cryptographic method called rainbow tables, Nohl was able to crack the encryption key on the SIM card in about one minute. Carriers use this key to remotely program a SIM, and it is unique to each card.</i><p>This is a little vague and I don&#x27;t understand the OTA protocol like, at all, but what it sounds like is that there is a case in some implementations of SIM OTA where (a) errors for improperly signed messages are noisy, (b) those errors include some of the plaintext of the improperly signed message, and (c) the error message itself has a signature that is intended to be valid only for the error.<p>Possible next steps: (i) you can table-solve for the signature (presumably this is a MAC, not a signature) for your intended message due to the way plaintext hits the error message, or (ii) you can table-solve for the plaintext of a previously unknown ciphertext by taking that ciphertext, flipping a bit to invalidate the signature, and collecting the error signature.
评论 #6080356 未加载
评论 #6079594 未加载
评论 #6080478 未加载
评论 #6083600 未加载
nicolas314almost 12 years ago
I have been working on OTA platforms for years with Mobile Network Operators worldwide, and I have yet to meet one that is only using DES for OTA keys. All the ones I know are using 3DES. Not sure where Nohl is getting his estimations from. Half a billion SIMs? Show me the data.<p>For this attack to work remotely you need to send a binary SMS and be able to read the SIM answer, which probably requires some privileged access to an operator&#x27;s SS7 network. Far from obvious. Since Network Operators are in complete control of SMS traffic, blocking anything that has not been issued by their own OTA platform is just a matter of configuring a filter on an SMS-C -- if not already done.
评论 #6080391 未加载
评论 #6089311 未加载
评论 #6081643 未加载
jingoalmost 12 years ago
Hurray for Java applets.<p>But seriously, there is a sunny side to this story: a user could load her own programs onto her SIM. She could gretaly extend the functionality of her phone... with programs that she trusts. Maybe even ones she wrote herself.<p>Imagine... an open platform. Oh gosh, that would be terrible, wouldn&#x27;t it?<p>Otherwise this story highlights the concept of &quot;minimum viable product&quot; not in the startup world, but as it exists among major industry manufacturers. For example, if SIM manufacturers can get away with using DES, then why invest their time and money in using stronger crypto? There are so many examples of this type of thinking... it&#x27;s certainly not limited to imlementations of cryptography or SIM cards. No doubt, some would say this is simply Business 101... ask any used car salesman. But it&#x27;s particularly acute in hardware and software.<p>Do hardware and software worlds makers need higher standards and more serious &quot;quality control&quot;? Beyond the cosmetic appearance of their work, no. Because users are generally indifferent to all else. What they don&#x27;t know won&#x27;t hurt them.<p>Did you know you can type encrypted messages directly with a text editor called ed(1)? How cool is that? It&#x27;s so easy. Who needs PGP?<p>It uses DES, but hey, DES is good enough for SIM cards, so...
评论 #6080378 未加载
评论 #6079647 未加载
sentenzaalmost 12 years ago
It&#x27;s a &quot;known plaintext&quot; attack on DES. Via google translate, here is an article from Heise with more details:<p><a href="http://translate.google.com/translate?sl=auto&amp;tl=en&amp;js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;u=http%3A%2F%2Fwww.heise.de%2Fsecurity%2Fartikel%2FDES-Hack-exponiert-Millionen-SIM-Karten-1920898.html" rel="nofollow">http:&#x2F;&#x2F;translate.google.com&#x2F;translate?sl=auto&amp;tl=en&amp;js=n&amp;pre...</a>
评论 #6079509 未加载
Zoepflialmost 12 years ago
Article mentions &quot;credit card java applets on SIM cards&quot;. I&#x27;ve never used one of those, and I know nobody in the western world who does.<p>I always presumed that these sim java applets are crapware that is mercifully hidden on todays smartphones.<p>It&#x27;s also my impression that Mastercard and Visa paid a hefty stupidity tax by thinking in the 2000s that it would be important to have their software on SIM cards, not foreseeing that smartphone apps would just bypass that whole layer.<p>Anybody know of an application in the western world, on smart phones, where these java applets are really used?
评论 #6079698 未加载
评论 #6079658 未加载
nqzeroalmost 12 years ago
vaguely related question ... is it safe to insert an arbitrary sim card in a phone ?<p>i want to try out some of the gsm mvnos in the states (eg airvoice, ptel and h2o). an at&amp;t or comcast or microsoft has a reputation that&#x27;s worth billions, so i &quot;trust&quot; them to only be semi-evil and at least semi-responsible. i don&#x27;t know much of these mvno companies, but assume they&#x27;re living on the margins and don&#x27;t have too much to risk. could they, or an enterprising engineer working for them, mess with the sim card to take something of value from me ?
评论 #6081746 未加载
评论 #6083306 未加载
评论 #6083025 未加载
aromanalmost 12 years ago
What I&#x27;m curious about is what Nohl meant when he said that it would take six months from the time of his presentation at Black Hat for crackers to develop working exploits based on his findings. And if he is (as the article suggests) working with the phone companies, why not simply wait until they&#x27;ve implemented their patches (if they in fact need them)?<p>If indeed it is as simple to force a sim to run these malicious applets as using some sort of rainbow-table-powered replay attack, what would be the challenge? Or perhaps he was referring to the more lucrative aspect of breaking out of the sim sandbox...
评论 #6080235 未加载
D9ualmost 12 years ago
<p><pre><code> *Verizon did not specify why its SIMs were not vulnerable* </code></pre> I was under the impression that Verizon phones don&#x27;t use SIM cards because their network is CDMA instead of GSM.
评论 #6079556 未加载
评论 #6079770 未加载
评论 #6079559 未加载
bclalmost 12 years ago
I don&#x27;t understand the article&#x27;s description of the sandbox vulnerability. On the iPhone app sandboxing is done by iOS, not in the SIM. Does the reporter just not understand, or is there another layer I&#x27;m not aware of?
评论 #6080313 未加载
评论 #6079635 未加载
评论 #6079616 未加载
gioelealmost 12 years ago
A beautiful, although not really accurate, explanation of a buffer overflow:<p>&gt; The way this works is somewhat complex, but Nohl’s virus essentially gave the infected Java software a command it could not understand or complete – eg. asking for the 12th item in a 10-item list, leading the software to forgo basic security checks and granting the virus full memory access, or “root,” in cyber security parlance.
muyuualmost 12 years ago
What are the implications?<p>Can&#x27;t stand Forbes and their over the top ads, tldr would be appreciated.
评论 #6079844 未加载
评论 #6079667 未加载