Wednesday, October 27, 2010

SMS Spoofing - A potential hacker attack

Other potential attack vector: a text message on the smartphone. Hackers can use spoof sms to contact employees of a company in a direct effort to get help easily to divulge sensitive information such as network log-in credentials and business intelligence. among others, they can also use text messages to install malware on a smartphone.
"In our proof-of-concept work, we show how to turn on the microphone, rootkits can phone without the owner knowing it happened," said Schwartau. "An attacker can send a text message will not be visible to the infected phone to make calls and talk about the microphone switch." That would be an effective tactic if, for example, the owner of the phone is close and the attacker would like to eavesdrop, he noted.
Schwartau said that there is no way to filter out SMS activity, but it is usually done through the operator, because SMS is not based on IP and is therefore usually not controlled by the admin. The best option to block the attack to work with suppliers to ensure that they are using software restriction malware, filter SMS, and divert those types of attacks.
And again, creating policies that encourage the use of smartphone or require the use of only a sentence or a company-company-provided phone and service plan to reduce that risk.
Of course, companies can not thwart any possible security attacks with current technology, and hackers continue to switch tactics. You should try to install six security breaches and to work to ensure that they are installed - but you should also go out to new forms of malicious activity.