Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Infected Smart-Phone Bots can Create DDoS Condition in America’s ‘911’ Service


A group of 3 infosec researchers from Israel recently demonstrated the way infected smart-phones compiled into a botnet can take out 911 emergency phone dialing of USA within one complete state as well as the entire nation over many days together.

As per present US regulations, phones dialing 911 should be instantly connected with the country's emergency services no matter who the caller is. Researchers Yuval Elovici, Yisroel Mirsky and Mordechai Guri from the cyber-security investigation center of Negev Ben-Gurion University based on this regulation, tried to prove their point.

Accordingly, attackers merely require manipulating the 1996 E911 First Report and Order of FCC that mandates wireless carriers to transfer every emergency call for contacting PSAP (Public Safety Answering Point) no matter if the caller is any mobile network subscriber. The infection spreading on the mobile phones is through the attackers' malware-tainted MMS/SMS, malevolent applications else malicious ad campaigns.

The bots making the distributed denial-of-service botnet may be all identifiable that dial 911 from the key operating system of a mobile phone and therefore make public their IMEI (International Mobile Station Equipment Identity) along with ISMI (International Mobile Subscriber Identity) -useful for emergency services towards halting a phone-call incase the call is from a spam-generating bot.

For bypassing such blocking tactics attackers could substitute their usual practice by utilizing 'anonymized' as well as persistent 'anonymized' bots for hiding their details. Grahamcluley.com posted this, September 12, 2016.

According to principal analyst Jeff Pollard of Forrester Research, an attacker being barred from degrading/disrupting crucial infrastructure shows up as weakening rapidly. Pollard contends that infrastructures frequently operate with systems whose designs and implementation are based on availability rather than security.

For averting assaults, device-sellers may keep IMEIs as well as other distinct identifiers within areas of trustworthy memory like the design TrustZone of ARM-processor so that malware cannot alter them.

The researchers further suggest compulsory firewall to filter calls from devices wherein trustworthy low-level parts help to detect DDoS activity like repeated 911 calls.

However, these initiatives shall require joint working by mobile-phone service providers, emergency services, security professionals and of course government along with others

» SPAMfighter News - 9/16/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next