Dect phones open to eavesdropping

Powered by SC Magazine
 

Attackers can intercept calls.

Failure to enable an encryption option in Digital Enhanced Cordless Telecommunications (Dect) phones can allow an attacker to overhear and record calls.

ProCheckUp researcher George Christopoulos demonstrated the attack to SC and said the problem was that the manufacturers did not enable encryption as standard, despite users believing that it is ‘super secure'.

“We started looking at this a couple of years ago and it is easy to accomplish eavesdropping on any conversation," Christopoulos said.

He explained that each phone has 10 frequencies and its own range. Attackers would find the best frequency to "lock on".

A capability using a rooted booster could allow an attacker to detect the connection and listen to all calls that have been made. Christopoulos said that this attack was completely transparent to the victim.

The PCMCIA type 2 booster card is now difficult to find and was produced as a way to improve signals over a wider area.

Christopoulos said the shell would show a call was made, reveal the identity of the Dect phone base station and begin recording the call.

He explained there was no recoding limit adding the auto record function could begin when new calls were placed, without intervention.

“If encryption is in place, then the same thing happens with auto record but the call will be silent when they play it back. However this is not bullet-proof, as an attacker can build a rogue base station that your handset will try to connect to,” he said.

He also explained that Dect phones have no mutual authentication or certificate to their individual base stations.

“Everyone should be more concerned about the dangers in the technology that we are using.”

Christopoulos began the experiment three years ago using the top 10 Dect phones from Amazon.

He said that the majority were susceptible to attack as they did not use encryption.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Dect phones open to eavesdropping
 
 
 
Top Stories
Photos: iTnews Benchmark Awards countdown begins
Just a few days left until entries close for 2014.
 
Australian Govt to rethink cyber security strategy
Six-year old policy to be refreshed.
 
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1069

Vote