| Deutsch English Français Italiano |
|
<4nu91lx41l.ln2@Telcontar.valinor> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feeds.phibee-telecom.net!news.mixmin.net!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail From: "Carlos E.R." <robin_listas@es.invalid> Newsgroups: comp.mobile.android Subject: Phising via forging the "from" in an SMS message. Date: Sat, 23 Nov 2024 22:40:19 +0100 Lines: 37 Message-ID: <4nu91lx41l.ln2@Telcontar.valinor> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Trace: individual.net /nhWm39bNMT748gYj+gnYQzRWm8gwRJ0DD/ZPtt8SOL+8l1zz+ X-Orig-Path: Telcontar.valinor!not-for-mail Cancel-Lock: sha1:mVYjeqr7ZoS4d+XK1E68yA46q4U= sha256:rbm+mwr1IEkmCB/ehe0xV5nZEvVRd2bFb0WTmLL9woA= User-Agent: Mozilla Thunderbird Content-Language: es-ES, en-CA Bytes: 2029 Hi, Imagine you normally get SMS messages from the bank, and the from is not a number but a name: BANK OF ME Date: now. You made successfully a payment of 10€ to Mr B. And you have a conversation. You trust those messages in your SMS application. They are legit. One day, you get another SMS in the same conversation: BANK OF ME Date: now. Warning, strange movement, please click here http:\\some.bad.link.com But this last message is a fake. The bad guys convince you, they get your credentials and your money. A case like that was seen recently in court here, and the bank lost. They must do more to ensure security, they did not protect their client properly. (in Spanish: https://www.genbeta.com/seguridad/parecia-imposible-condenan-al-bbva-a-reembolsar-dinero-estafado-via-sms-a-clienta-debe-asumir-su-responsabilidad). Now my question is, how did the bad guys insert a false SMS in the same conversation from the bank. They successfully forged the bank name (there is no phone number). What is the hole in the GSM network that allows this forgery? (I have similarly forged texts in my phone, I have direct first hand proof). -- Cheers, Carlos.