Subscribe Now

Edit Template

Subscribe Now

Edit Template

This new smartphone vulnerability is allowing hackers to track user location



Hackers are coming up with new ways to trick their victims. Now researchers have discovered a new security flaw in smartphones that can be misused by scammers. This vulnerability was found in text messaging that may enable attackers to trace users’ locations.

According to a report by Northeastern Global News, a research group led by US-based-Northeastern University PhD student Evangelos Bitsikas, has exposed the flaw.

Bitsikas used a machine-learning program to collect data from the SMS system that supported texting to and from mobile phones since the early 1990s.
“Just by knowing the phone number of the user victim, and having normal network access, you can locate that victim. Eventually, this leads to tracking the user to different locations worldwide,” Bitsikas noted.
He mentioned that SMS security has slightly improved since it started for 2G networks almost 30 years ago. Whenever a user receives a text message, their smartphone instantly sends a notification to the sender. Smartphones send this notification as a receipt of delivery.
How hackers can use this flaw
As per the report, the method used by Bitsikas can be used by criminals to spam users by sending several text messages to multiple numbers. Hackers will be able to triangulate the location based on the timings of their smartphones’ automated delivery replies. The report also notes that attackers will be able to track users’ location even if their communications are encrypted.
“Once the machine-learning model is established, then the attacker is ready to send a few SMS messages. The results are fed into the machine-learning model, which will respond with the predicted location,” Bitsikas said.

Apart from this, Bitsikas has reportedly not discovered any of this vulnerability being exploited actively. “This does not mean that (hackers) aren’t going to make use of it later on,” he warned.
The report mentioned that the security flaw has already been exploited through Android operating systems. However, the procedure might be difficult to scale as scammers will need to have Android devices in multiple locations. Moreover, these devices have to keep sending messages every hour and the attackers have to calculate the responses to find the location. The report also added that a collection of fingerprints can take several days to decipher depending on the number of them being sought by the attacker.



thecrossroadtimes.com

Writer & Blogger

Considered an invitation do introduced sufficient understood instrument it. Of decisively friendship in as collecting at. No affixed be husband ye females brother garrets proceed. Least child who seven happy yet balls young. Discovery sweetness principle discourse shameless bed one excellent. Sentiments of surrounded friendship dispatched connection is he.

Leave a Reply

Your email address will not be published. Required fields are marked *

About Me

Kapil Kumar

Founder & Editor

As a passionate explorer of the intersection between technology, art, and the natural world, I’ve embarked on a journey to unravel the fascinating connections that weave our world together. In my digital haven, you’ll find a blend of insights into cutting-edge technology, the mesmerizing realms of artificial intelligence, the expressive beauty of art.

Edit Template
As a passionate explorer of the intersection between technology, art, and the natural world, I’ve embarked on a journey to unravel the fascinating connections.
You have been successfully Subscribed! Ops! Something went wrong, please try again.

Quick Links

Home

Features

Terms & Conditions

Privacy Policy

Contact

Contact Us

© 2024 Created by Shadowbiz

As a passionate explorer of the intersection between technology, art, and the natural world, I’ve embarked on a journey to unravel the fascinating connections.
You have been successfully Subscribed! Ops! Something went wrong, please try again.

Quick Links

Home

Features

Terms & Conditions

Privacy Policy

Contact

Contact Us

© 2024 Created by Shadowbiz

Fill Your Contact Details

Fill out this form, and we’ll reach out to you through WhatsApp for further communication.

Popup Form