Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

A is for Apple. -- Hester Pryne


comp / comp.mobile.android / Re: Phising via forging the "from" in an SMS message.

SubjectAuthor
* Phising via forging the "from" in an SMS message.Carlos E.R.
`* Re: Phising via forging the "from" in an SMS message.VanguardLH
 `- Re: Phising via forging the "from" in an SMS message.Carlos E.R.

1
Subject: Phising via forging the "from" in an SMS message.
From: Carlos E.R.
Newsgroups: comp.mobile.android
Date: Sat, 23 Nov 2024 21:40 UTC
Path: eternal-september.org!news.eternal-september.org!feeder2.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: comp.mobile.android
Subject: Phising via forging the "from" in an SMS message.
Date: Sat, 23 Nov 2024 22:40:19 +0100
Lines: 37
Message-ID: <4nu91lx41l.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net /nhWm39bNMT748gYj+gnYQzRWm8gwRJ0DD/ZPtt8SOL+8l1zz+
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:mVYjeqr7ZoS4d+XK1E68yA46q4U= sha256:rbm+mwr1IEkmCB/ehe0xV5nZEvVRd2bFb0WTmLL9woA=
User-Agent: Mozilla Thunderbird
Content-Language: es-ES, en-CA
View all headers

Hi,

Imagine you normally get SMS messages from the bank, and the from is not
a number but a name:

BANK OF ME
Date: now.
You made successfully a payment of 10€ to Mr B.

And you have a conversation. You trust those messages in your SMS
application. They are legit. One day, you get another SMS in the same
conversation:

BANK OF ME
Date: now.
Warning, strange movement, please click here http:\\some.bad.link.com

But this last message is a fake. The bad guys convince you, they get
your credentials and your money. A case like that was seen recently in
court here, and the bank lost. They must do more to ensure security,
they did not protect their client properly.

(in Spanish:
https://www.genbeta.com/seguridad/parecia-imposible-condenan-al-bbva-a-reembolsar-dinero-estafado-via-sms-a-clienta-debe-asumir-su-responsabilidad).

Now my question is, how did the bad guys insert a false SMS in the same
conversation from the bank. They successfully forged the bank name
(there is no phone number). What is the hole in the GSM network that
allows this forgery?

(I have similarly forged texts in my phone, I have direct first hand proof).

--
Cheers, Carlos.

Subject: Re: Phising via forging the "from" in an SMS message.
From: VanguardLH
Newsgroups: comp.mobile.android
Organization: Usenet Elder
Date: Sun, 24 Nov 2024 03:03 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder2.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: comp.mobile.android
Subject: Re: Phising via forging the "from" in an SMS message.
Date: Sat, 23 Nov 2024 21:03:11 -0600
Organization: Usenet Elder
Lines: 69
Sender: V@nguard.LH
Message-ID: <s31odbc8uyue$.dlg@v.nguard.lh>
References: <4nu91lx41l.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"
Content-Transfer-Encoding: 8bit
X-Trace: individual.net HdCQL312/qDaJa22XrZ8OQz1pSwGlaUwNoaEB7SAEbyIW8EiPN
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:my35GpP/MMS24h++g/MeXP+W+6s= sha256:DSfBGlDXmtBK8ohnIxsJerLUjPkF/gO7NdCxpg5R6io=
User-Agent: 40tude_Dialog/2.0.15.41
View all headers

"Carlos E.R." <robin_listas@es.invalid> wrote:

> Hi,
>
> Imagine you normally get SMS messages from the bank, and the from is not
> a number but a name:
>
> BANK OF ME
> Date: now.
> You made successfully a payment of 10€ to Mr B.
>
> And you have a conversation. You trust those messages in your SMS
> application. They are legit. One day, you get another SMS in the same
> conversation:
>
> BANK OF ME
> Date: now.
> Warning, strange movement, please click here http:\\some.bad.link.com
>
> But this last message is a fake. The bad guys convince you, they get
> your credentials and your money. A case like that was seen recently in
> court here, and the bank lost. They must do more to ensure security,
> they did not protect their client properly.
>
> (in Spanish:
> https://www.genbeta.com/seguridad/parecia-imposible-condenan-al-bbva-a-reembolsar-dinero-estafado-via-sms-a-clienta-debe-asumir-su-responsabilidad).
>
> Now my question is, how did the bad guys insert a false SMS in the same
> conversation from the bank. They successfully forged the bank name
> (there is no phone number). What is the hole in the GSM network that
> allows this forgery?
>
> (I have similarly forged texts in my phone, I have direct first hand proof).

Worse is when you get a text that doesn't say who the hell sent it, just
some digit string that never identifies the sender. I never respond to
those unless their content is something I expect to receive, like the
grocer saying their driver is leaving to deliver the goods I ordered.

Smishing
https://www.ibm.com/topics/smishing
https://www.proofpoint.com/us/threat-reference/smishing

I don't want to get into the details on how a scammer can spoof the
sender ID in an SMS message since that seems an inappropriate "how to
smish" enabler to to wannabe aholes. Search on "sms spoofing".
Spoofing is not always illegal or with malicious intent. For example, I
use Google Voice to receive and make calls. They will remove the sender
ID from my outbound call to replace with my GV phone number, so the
recipient sees my GV number, not the true number for whatever carrier my
cell phone is using. That way, my callees see my number which they
recognize or is in their Contacts lists, and they call me back on my GV
number which call all my phones in my GV account using simultaneous
ring. Callees see my GV number, not my cell phone's carrier-assigned
number.

https://www.infobip.com/glossary/sms-spoofing

You can even find apps that let you spoof your sender ID, but I suspect
they incorporate some shady SMS provider that lets the user specify the
sender ID differently than is recorded, if anything, at the service.

SMS is not a secure communications venue. It's not even encrypted nor
has guaranteed delivery, just like e-mail. So, the pretense that
sending 2FA codes via SMS or e-mail makes a login more secure (what you
know plus what you have) is a lie since insecure and non-guaranteed
delivery communication venues are employed. Yep, use insecure
communication to secure a login, and all started because users are lazy
boobs who don't use strong and *unique* passwords at each domain.

Subject: Re: Phising via forging the "from" in an SMS message.
From: Carlos E.R.
Newsgroups: comp.mobile.android
Date: Sun, 24 Nov 2024 13:35 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder2.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: comp.mobile.android
Subject: Re: Phising via forging the "from" in an SMS message.
Date: Sun, 24 Nov 2024 14:35:18 +0100
Lines: 94
Message-ID: <mlmb1lxsgi.ln2@Telcontar.valinor>
References: <4nu91lx41l.ln2@Telcontar.valinor> <s31odbc8uyue$.dlg@v.nguard.lh>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net eaxbnAFK5BuDKUNQHeAPZg5ejFVIncMzdM+0o7ZQ6ANVr1Zq3o
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:w1uP3AGCBICLB0QK2sHaw561HjA= sha256:RMCLNlm7CvDlq6r6oXt50PpY2da4u2QtJDx8ZkgGPQA=
User-Agent: Mozilla Thunderbird
Content-Language: es-ES, en-CA
In-Reply-To: <s31odbc8uyue$.dlg@v.nguard.lh>
View all headers

On 2024-11-24 04:03, VanguardLH wrote:
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>> Hi,
>>
>> Imagine you normally get SMS messages from the bank, and the from is not
>> a number but a name:
>>
>> BANK OF ME
>> Date: now.
>> You made successfully a payment of 10€ to Mr B.
>>
>> And you have a conversation. You trust those messages in your SMS
>> application. They are legit. One day, you get another SMS in the same
>> conversation:
>>
>> BANK OF ME
>> Date: now.
>> Warning, strange movement, please click here http:\\some.bad.link.com
>>
>> But this last message is a fake. The bad guys convince you, they get
>> your credentials and your money. A case like that was seen recently in
>> court here, and the bank lost. They must do more to ensure security,
>> they did not protect their client properly.
>>
>> (in Spanish:
>> https://www.genbeta.com/seguridad/parecia-imposible-condenan-al-bbva-a-reembolsar-dinero-estafado-via-sms-a-clienta-debe-asumir-su-responsabilidad).
>>
>> Now my question is, how did the bad guys insert a false SMS in the same
>> conversation from the bank. They successfully forged the bank name
>> (there is no phone number). What is the hole in the GSM network that
>> allows this forgery?
>>
>> (I have similarly forged texts in my phone, I have direct first hand proof).
>
> Worse is when you get a text that doesn't say who the hell sent it, just
> some digit string that never identifies the sender. I never respond to
> those unless their content is something I expect to receive, like the
> grocer saying their driver is leaving to deliver the goods I ordered.
>
> Smishing
> https://www.ibm.com/topics/smishing
> https://www.proofpoint.com/us/threat-reference/smishing
>
> I don't want to get into the details on how a scammer can spoof the
> sender ID in an SMS message since that seems an inappropriate "how to
> smish" enabler to to wannabe aholes. Search on "sms spoofing".
> Spoofing is not always illegal or with malicious intent. For example, I
> use Google Voice to receive and make calls. They will remove the sender
> ID from my outbound call to replace with my GV phone number, so the
> recipient sees my GV number, not the true number for whatever carrier my
> cell phone is using. That way, my callees see my number which they
> recognize or is in their Contacts lists, and they call me back on my GV
> number which call all my phones in my GV account using simultaneous
> ring. Callees see my GV number, not my cell phone's carrier-assigned
> number.
>
> https://www.infobip.com/glossary/sms-spoofing
>
> You can even find apps that let you spoof your sender ID, but I suspect
> they incorporate some shady SMS provider that lets the user specify the
> sender ID differently than is recorded, if anything, at the service.
>
> SMS is not a secure communications venue. It's not even encrypted nor
> has guaranteed delivery, just like e-mail. So, the pretense that
> sending 2FA codes via SMS or e-mail makes a login more secure (what you
> know plus what you have) is a lie since insecure and non-guaranteed
> delivery communication venues are employed. Yep, use insecure
> communication to secure a login, and all started because users are lazy
> boobs who don't use strong and *unique* passwords at each domain.

The second link you posted, from proofpoint, has some precise information:

Message Delivery: Using SMS gateways, spoofing tools, or infected
devices, the attacker sends out the smishing message to their selected
targets.

It appears they can use email to sms gateways. That's the weak point.
And some shady provider, as you mention.

It could be detected if the message would contain "hidden" tracking
information, like email do. Look at the headers. But SMSs do not contain
that information. At least, even if tap on "details", there is no such info.

--
Cheers, Carlos.

1

rocksolid light 0.9.8
clearnet tor