Connect with us

Technology

Chinese hackers infect carriers to steal SMS messages

Published

on

China is stepping up their hacker ways
China is stepping up their hacker ways

Image: Getty


PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.

Malware tied to Chinese hackers has been found infecting telecommunication networks to steal SMS messages from thousands of phone numbers.

The spying effort comes from a Chinese state-sponsored hacking group called APT 41, according to the cybersecurity firm FireEye. On Thursday, the company published a report on a malware strain from the group that’s designed to infect Linux-based servers used by telecommunication carriers to route SMS messages.

Some time this year, FireEye uncovered the malicious computer code on a cluster of servers belonging to an unnamed telecommunication network provider. “During this intrusion, thousands of phone numbers were targeted, to include several high-ranking foreign individuals likely of interest to China,” the company told PCMag.

Interestingly, the malware is selective of which SMS messages it will try to collect. The APT 41 hackers pre-programmed it using two lists. The first one searches outs the target, based on the person’s phone number and International Mobile Subscriber Identity (IMSI) number. The second list contains certain keywords that the malware will seek to find within the SMS messages. If one of the keywords is found in an SMS message, the malware will then save it in a .CSV file, which the hacker can later extract.

“The keyword list contained items of geopolitical interest for Chinese intelligence collection. Sanitized examples include the names of political leaders, military and intelligence organizations and political movements at odds with the Chinese government,” FireEye researchers said in the report.

How the system works

How the system works

The suspected Chinese hackers behind the malware also clearly knew who they were targeting, since they had access to both the victims’ phone numbers and the IMSI numbers, which is harder to come by. On some Android phones, you can access the IMSI number in the settings function. But the information is primarily used by telecommunication carriers to uniquely identity each subscriber on a cellular network, which suggests the hackers had some serious intel-collecting abilities.

In the same intrusion, the hackers were also found interacting with databases that contained voice call record details, including the time of the call, the duration and the phone numbers involved.

“In 2019, FireEye observed four telecommunication organizations targeted by APT41 actors,” the company added in today’s report, which refrained from naming the organizations hit. “Further, four additional telecommunications entities were targeted in 2019 by separate threat groups with suspected Chinese state-sponsored associations.”

Other security researchers have also noticed suspected Chinese cyberspies infiltrating cellular networks. In June, security firm Cybereason uncovered evidence that Chinese hackers had broken into telecommunication carriers to steal call log and location data from “high-value” individuals across the globe.

The attacks underscore the risk of sending unencrypted information over cellular networks; the content is readable to whoever controls the SMS routing server. For especially sensitive messages, it’s a good idea to use a mobile messaging app, such as WhatsApp or Signal, which offer end-to-end encryption.

This article originally published at PCMag
here

Continue Reading
Advertisement Find your dream job

Trending