Mobile Network Is Vulnerable, Hacker Can Easily Track Your Location

Mobile Network Is Vulnerable, Hacker Can Easily Track Your Location 
Researchers of University of Minnesota have found that phone towers are leaking location information that can be used to track a mobile phone's exact location. The most interesting thing is to exploit this vulnerability you need not to purchase any kind of hardware gadget only a laptop and a mobile phone is more than sufficient to do that. "Anybody can set up this particular apparatus to be able to listen to broadcast messages from the towers," Kune said. "They don't need any special cooperation from the service provider, don't need to grab any information from the service provider, don't need to connect to the network, they just have to listen to what the cell towers are broadcasting." 
Researchers plugged a mobile phone into a laptop to listen in on transmissions from phone towers. They then dialed the number of the mobile phone they hoped to locate, triggering signals from the tower to the phone that gives away its location within a dozen blocks. The process takes about 10 to 15 minutes. The same techniques could be used to track phones at greater distances if hackers have access to nearby phone towers. 
Video Demonstration :-

Shellene Johnson, program manager at the Minnesota Coalition for Battered Women, said many victims of domestic violence or stalking rely on mobile phones to find help or call police. "If victims are unaware this is happening — they may be going into a safe location or into a shelter — it gives very easy access to information of her whereabouts," Johnson said. "The tool she's using to hopefully protect herself could be used to harm or possibly kill her."
Carol Arthur, executive director of the Domestic Abuse Project, said knowledge of a person's location is another way that some abusers can maintain control over their victims. "If you have changed your address and you're trying to get away from this person... but all of a sudden they found you, it's like you feel trapped, like you'd never be able to get away from this person," Arthur said.
The university report also speculated that the vulnerability could be exploited by oppressive governments or burglars. The researchers found that they could tap into the locations of phones on T-Mobile and AT&T networks. Kune said it also likely worked on Verizon and Sprint phones, although the tests weren't run on those networks.
The research team proposed fixes to the information leakage to AT&T and phone manufacturer Nokia. Kune said that Nokia has given the researchers feedback on the viability of their fixes. AT&T has not yet responded to the research team, but AT&T spokesman Alex Carey said the company takes all reports of network vulnerabilities seriously.
"If it's something that's identified as a valid threat, we would act on it right away, devote whatever resources we need to combat the threat," Carey said. The research was presented in early February at the Annual Network & Distributed System Security Symposium in San Diego, Calif.


-Source (MPR News)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LINK TO OUR HOME PAGE :
Voice Of GREYHAT is a non-profit Organization propagating news specifically related with Cyber security threats, Hacking threads and issues from all over the spectrum. The news provided by us on this site is gathered from various Re-Sources. if any person have some FAQ's in their mind they can Contact Us. Also you can read our Privacy Policy for more info. Thank You ! -Team VOGH
If you enjoyed VOGH News, Articles Then Do Make sure you to Subscribe Our RSS feed. Stay Tuned with VOGH and get Updated about Cyber Security News, Hacking Threads and Lots More. All our Articles and Updates will directly be sent to Your Inbox. Thank You! -Team VOGH

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...