Smartphones hacked through insecure Wi-Fi

Researchers break security in Apple, Nokia, HTC and T-Mobile devices to gain access to email passwords.

hacker word

Security researchers have successfully performed man-in-the middle-attacks' (MITM) against four popular smartphones.

A team from SMobile Systems released a paper on how they broke the security provided by SSL on the Nokia N95, HTC tilt, T-Mobile G1 Android and Apple iPhone 3GS through an unsecured Wi-Fi network.

A MITM attack is where a hacker can intercept the communication between two systems by relaying messages between them. The attacker re-routes this traffic, where they can create new connections or kill existing connections. They can also view and replay anything that is private between the machines.

Through tools available to a hacker such as Arpspoof and SSLStrip, the researchers tried to gain access to an email user name and password by breaking a smartphone's SSL encryption protection using a laptop.

Modern web browsers rely on SSL certificates, but researcher Moxie Marlinspike has already proven that this can be easily broken.

Targeting a smartphone's mailbox, web browser or email application, the testers were successful in getting email login credentials for all four devices.

The report said: "[It] underscores the fact that the use of public Wi-Fi hotspots should be approached with caution and care should be taken that confidential or private data is adequately encrypted, when it becomes necessary to access such data."

The SMobile researchers said that such applications which could encrypt smartphone data were scarce, and without it a user would have to make sure that they were using a trusted and secure Wi-Fi network to keep safe.

They also said that enterprise smartphones need security software providing firewall and antivirus capabilities, and they should be treated with the same care as PCs or laptops.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020