'Curse of Silence' Hack Kills SMS Text Message Delivery'Curse of Silence' Hack Kills SMS Text Message Delivery
Denial-of-service attack uses malicious text message to take down mobile phone in-boxes
January 2, 2009
Text-message junkies beware: A new exploit demonstrated this week shows how an attacker can silently crash the SMS text message in-boxes of several models of Nokia mobile phones.
The so-called "Curse of Silence" attack revealed by researcher Tobias Engel at the Chaos Communication Congress in Berlin uses a specially formatted SMS message to wage a denial-of-service attack on the victim's phone. It targets a vulnerability in versions 8 through 9.2 of the Symbian operating system and so far has been shown to affect the Nokia Series 60 phone versions 2.6, 2.8, 3.0, 3.1, and the Sony Ericsson UiQ.
Engel, who did not release any exploit code for the attack, showed how SMS/MMS messaging features on the phones were affected but that otherwise, the phone remains operational. In the attack, an SMS message is sent to the victim's phone by setting the protocol identifier to "Internet Electronic Mail" with a specific format that Engel demonstrates in his paper.
Some phones immediately stop receiving text messages, while others lock up after receiving one or more of the messages.
In a video demonstration of the hack, F-Secure said even powering off and on the victimized phone won't stop the attack. "The attack messages are silent and invisible so that you will not be able to delete them," F-Secure says in its demo.
For now, there's no manual workaround for the attack. And until a firmware fix is available, network operators are advised to filter messages with TP-PID "Internet Electronic Mail" as well as email addresses of more than 32 characters, according to Engel.
"At least it is not possible to steal user data from the phones or make calls at other people's expense," Engel says. "But it shows again that mobile phones are just computers which are connected to the network all the time."
He continues: "Phone manufacturers and network operators have to make sure that there is a way to quickly deploy bug-fix firmware releases to phones, free of charge to the user."
F-Secure, meanwhile, noted in its blog that the attack may be more of annoyance. "Hopefully this exploit will not be widely used. We don't see much of a profit motive after all. Still, there were thousands of participants at this year's CCC and many of them saw the demonstration. As easy as it is to utilize the Curse of Silence, someone will surely try this for harassment," F-Secure said in its blog post.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
Get the Gartner Report: SOC Model Guide