Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A French hacker has released a tool capable of sending SMSes with spoofed sender details on the iPhone 4.
The sendrawpdu command line interface tool allows users to customise the reply number on SMSes and could be ideal for phishing attacks.
The hacker, known as pod2g, released the free tool after detailing a flaw in the way the iPhone handled SMSes which made it possible to spoof sender details.
“Pirates could send a message that seems to come from the bank of the receiver asking for some private information, or inviting them to go to a dedicated [phishing] website,” pod2g said in a blog.
The vulnerability existed on other mobile devices and all versions of Apple’s iOS platform including the upcoming iOS 6, according to pod2g.
"If the destination mobile is compatible with (User Data Header features), and if the receiver tries to answer the text, he will not respond to the original number, but to the specified one,” pod2g wrote.
“Most carriers don't check this part of the message, which means one can write whatever he wants in this section.
“In a good implementation of this feature, the receiver would see the original phone number and the reply-to one. On iPhone, when you see the message, it seems to come from the reply-to number, and you lose track of the origin.”
Apple urged customers to use its iMessage service because it verified the address from which messages were sent, unlike its SMS app which displayed the vulnerable reply-to address.
iMessages were only available between iOS and OS X devices.
“When using iMessage instead of SMS, addresses are verified which protects against these kinds of spoofing attack, Apple said in a statement.
“One of the limitations of SMS is that it allows messages to be sent with spoofed addresses to any phone, so we urge customers to be extremely careful if they're directed to an unknown website or address over SMS.”
Website SMSspoofing.com pointed out that dozens of paid SMS spoofing services exist online, and said Australia and Europe were “two of the easiest places to spoof SMS messages to”.
Senddrawpdu was based on sendmodem and could be downloaded for jailbroken iPhone 4 devices from github.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.