A variation of the recently disclosed attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers say.
Ravishankar Borgaonkar, a research assistant in the Telecommunications Security department at the Technical University of Berlin, recently demonstrated the remote data wiping attack at the Ekoparty security conference in Buenos Aires, Argentina.
[ The Web browser is your portal to the world -- and the gateway for security threats. InfoWorld's expert contributors show you how to secure your Web browsers. Download the free PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
The attack can be launched from a Web page by loading a "tel:" URI (uniform resource identifier) with a special factory reset code inside an iframe. If the page is visited from a vulnerable device, the dialer application automatically executes the code and performs a factory reset. Several Samsung Android devices, including Samsung Galaxy S III, Galaxy S II, Galaxy Beam, S Advance, and Galaxy Ace were reported to be vulnerable because they supported the special factory reset code.
Borgaonkar showed that a device can be forced to automatically open a link to such a page by touching a NFC-enabled phone to a rogue NFC tag, by scanning a QR code or by including the link in a special service message. However, an attacker can also include the link in a Twitter feed, SMS or an email message and trick the victim to manually click on it.
The vulnerability exploited by this attack was located in the Android stock dialer and was addressed three months ago. The patch comments from the Android source repository suggest that the dialer was modified to no longer execute special codes passed through "tel:" URIs.
Mobile users are capable of executing special commands on their phones by typing certain codes through the phone's dialing interface. These codes are enclosed between the * and # characters and are known as Unstructured Supplementary Service Data (USSD) codes when they access services supplied by the mobile operator, or MMI (Man-Machine Interface) codes, when they access phone functions.
Not all devices support the same codes, but some are more or less standard. For example, *#06# is an almost universal code for displaying an Android device's IMEI (International Mobile Equipment Identity) number.
Some devices from other manufacturers besides Samsung might also be vulnerable to the factory reset attack. A simple Google search returned a factory reset code for the popular HTC Desire phone.
In addition to the factory reset codes, some other codes can also be dangerous. During his presentation, Borgaonkar mentioned that the same attack can be used to "kill" SIM cards. This is possible because of a MMI code that allows changing a SIM card's PIN (Personal Identity Number) number using the PUK (Personal Unblocking Key), Collin Mulliner, a mobile security researcher who works in the SECLAB at Northeastern University in Boston, said Tuesday via email.
If this code is executed multiple times with the wrong PUK, the SIM card is locked permanently and the user needs to get a new one from the operator, Mulliner said.
Instead of using a "tel:" URI with the factory reset code in an iframe, an attacker could have 10 iframes with the PIN changing code and wrong PUK on the malicious Web page .