当前位置:首页 > 资讯

Chinese hackers infect carriers to steal SMS messages

Malware tied to Chinese hackers has been found infecting telecommunication networks to steal SMS messages from thousands of phone numbers.

The spying effort comes from a Chinese state-sponsored hacking group called APT 41, according to the cybersecurity firm FireEye. On Thursday, the company published a report on a malware strain from the group that's designed to infect Linux-based servers used by telecommunication carriers to route SMS messages.

Some time this year, FireEye uncovered the malicious computer code on a cluster of servers belonging to an unnamed telecommunication network provider. "During this intrusion, thousands of phone numbers were targeted, to include several high-ranking foreign individuals likely of interest to China," the company told PCMag.

Interestingly, the malware is selective of which SMS messages it will try to collect. The APT 41 hackers pre-programmed it using two lists. The first one searches outs the target, based on the person's phone number and International Mobile Subscriber Identity (IMSI) number. The second list contains certain keywords that the malware will seek to find within the SMS messages. If one of the keywords is found in an SMS message, the malware will then save it in a .CSV file, which the hacker can later extract.

"The keyword list contained items of geopolitical interest for Chinese intelligence collection. Sanitized examples include the names of political leaders, military and intelligence organizations and political movements at odds with the Chinese government," FireEye researchers said in the report.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!
Mashable ImageHow the system worksCredit: Fireeye

The suspected Chinese hackers behind the malware also clearly knew who they were targeting, since they had access to both the victims' phone numbers and the IMSI numbers, which is harder to come by. On some Android phones, you can access the IMSI number in the settings function. But the information is primarily used by telecommunication carriers to uniquely identity each subscriber on a cellular network, which suggests the hackers had some serious intel-collecting abilities.

In the same intrusion, the hackers were also found interacting with databases that contained voice call record details, including the time of the call, the duration and the phone numbers involved.

"In 2019, FireEye observed four telecommunication organizations targeted by APT41 actors," the company added in today's report, which refrained from naming the organizations hit. "Further, four additional telecommunications entities were targeted in 2019 by separate threat groups with suspected Chinese state-sponsored associations."

SEE ALSO:Facebook sues WhatsApp developer that allegedly put spyware on phones of journalists and political dissidents

Other security researchers have also noticed suspected Chinese cyberspies infiltrating cellular networks. In June, security firm Cybereason uncovered evidence that Chinese hackers had broken into telecommunication carriers to steal call log and location data from "high-value" individuals across the globe.

The attacks underscore the risk of sending unencrypted information over cellular networks; the content is readable to whoever controls the SMS routing server. For especially sensitive messages, it's a good idea to use a mobile messaging app, such as WhatsApp or Signal, which offer end-to-end encryption.

分享到: