Connect with us

Press Release

Hackers use the call forwarding scam to gain WhatsApp accounts.

Published

on

Hackers use the call forwarding scam to gain WhatsApp accounts.

There is a method that enables attackers to take over a victim’s WhatsApp account and view their contact list and private conversations.

The technique depends on WhatsApp’s ability to provide a one-time password (OTP) verification code through voice call and the automated call forwarding services offered by mobile carriers.

Utilizing the MMI code
The founder and CEO of the digital risk management firm CloudSEK, Rahul Sasi, tweeted some information about the technique and claimed that it is used to hack WhatsApp accounts.

Testing by BleepingComputer revealed that the approach is effective, despite a few drawbacks that a determined attacker may get over.

A victim’s WhatsApp account can be hacked in a matter of minutes, but the attacker must have the victim’s phone number and be ready to use some social engineering.

According to Sasi, an attacker must first persuade the target to call a number that begins with an MMI code that the mobile carrier set up to facilitate call forwarding.

Depending on the carrier, a different MMI code may redirect calls to a terminal to another number whenever the line is busy or there is no reception, or only when the line is congested.

These codes begin with the symbols star (*) or hash (#). They are widely available, and according to our research, they are supported by all of the main mobile network operators.

The MMI code in front of the 10-digit number instructs the mobile carrier to divert all calls to the phone number supplied after it while the victim’s line is busy, according to the researcher, who claims that the 10-digit number belongs to the attacker.

The attacker starts the WhatsApp registration process on the victim’s device after deceiving them into forwarding calls to their number, selecting the option to get the OTP via voice call.

Once they have the OTP code, the attacker can set up two-factor authentication (2FA) for the victim’s WhatsApp account on their smartphone, preventing the account’s rightful owners from regaining access.

a few warnings
Although the technique appears straightforward, as BleepingComputer discovered through testing, getting it to function takes a little more work.

First, the attacker must utilise an MMI code that sends all calls, independent of the condition of the target device (unconditionally). For instance, call waiting may result in the hijack failing if the MMI only forwards calls when a line is busy.

The target device also received text messages during testing from BleepingComputer telling it that WhatsApp was registered on another device.

If the attacker also uses social engineering and engages the target in a phone call for just long enough for them to hear the WhatsApp OTP code over voice, users could not notice this warning.

A minor annoyance that can necessitate more social engineering is that the attacker must use a different phone number than the one used for the redirection if call forwarding has already been enabled on the victim device.

The mobile operators’ activation of call forwarding leaves the target user with the clearest indication of suspicious activity because a warning is displayed on the screen upon activation and doesn’t go away until the user acknowledges it.

Threat actors still stand a decent chance of succeeding despite this prominent warning since the majority of users are unfamiliar with the MMI codes or the mobile phone settings that prohibit call forwarding.

Despite these barriers, dishonest individuals who are skilled at social engineering can create a scenario that enables them to keep the victim occupied on the phone until they obtain the OTP code for setting up the victim’s WhatsApp account on their device.

Using mobile services from Verizon and Vodafone, BleepingComputer examined this technique and came to the conclusion that an attacker with a convincing scenario is likely to hijack WhatsApp accounts.

According to publicly available data, Sasi’s post refers to the cell providers Jio and Airtel, each of which had more than 400 million subscribers as of December 2020.

It’s simple to defend against this kind of assault by enabling WhatsApp’s two-factor authentication feature. Every time you register a phone with the messaging app, this function requires a PIN, preventing fraudulent users from taking over the account.

 

Continue Reading

Press Release

Russian processor manufacturers are prohibited from using ARM because of UK sanctions.

Published

on

Russian processor manufacturers are prohibited from using ARM because of UK sanctions.

On Wednesday, the UK government expanded its list of sanctioned Russian organisations by 63. The two most significant chip manufacturers in Russia, Baikal Electronics and MCST (Moscow Center of SPARC Technologies), are among them.

Since the licensee, Arm Ltd., is situated in Cambridge, England, and must abide by the penalties, the two sanctioned firms will now be denied access to the ARM architecture.

contacting inactive entities

The UK government provided the following justification for the restrictive measures put in place against Baikal and MCST:

The clause’s goal is to persuade Russia to stop acting in a way that threatens Ukraine’s territorial integrity, sovereignty, or independence or that destabilises Ukraine.

The two companies are important to Russia’s ambitions to achieve technical independence since they are anticipated to step up and fill the gaps left by the absence of processors built by Western chip manufacturers like Intel and AMD.

The two currently available most cutting-edge processors are:

Eight ARM Cortex A57 cores running at 1.5 GHz and an ARM Mali-T628 GPU running at 750 MHz make up the 35 Watt Baikal BE-M1000 (28nm) processor.
MCST Elbrus-16S (28nm), a 16-core processor clocked at 2.0 GHz, is capable of 1.5 TFLOP calculations, which is a tenth of what an Xbox Series X can do. Baikal BE-S1000 (16nm), a 120 Watt processor featuring 48 ARM cores clocked at 2.0 GHz, MCST Elbrus-8C (28nm), a 70 Watt processor featuring eight cores clocked at 1.3 GHz,
Russian businesses and organisations that evaluated these chips in demanding applications claim that they fall short of industry standards and are even unacceptably priced.

Although the performance of these processors and the far poorer mid-tier and low-tier chips with the Baikal and MCST stickers is not very spectacular, they could keep some crucial components of the Russian IT sector operating amid shortages.

In reality, MCST recently bragged that it was “rushing to the rescue” of vital Russian enterprises and organisations, successfully filling the void left in the domestic market.

sanctions’ effects
Given that Russia has previously demonstrated its willingness to relax licencing requirements in order to mitigate the consequences of Western-imposed limitations, it is simple to discount the application and impact of the UK’s sanctions.

It is crucial to keep in mind that the Baikal and MCST processors are produced in foreign foundries, such as those owned by Samsung and TSMC, and that neither of them would violate Arm’s licencing policies or international law to serve Russian objectives.

The only option is to bring the production home and break the law as Baikal, which has a legitimate licence to produce at 16nm, only has a design licence for its next products.

The fact that chip fabrication in Russia can only now be done at the 90nm node level presents yet another significant issue. That was the same technology NVIDIA employed in 2006 for its GeForce 7000-series GPUs.

To combat this in April 2022, the Russian government has already approved an investment of 3.19 trillion rubles (38.2 billion USD), although increasing domestic production will take many years. In the best-case scenarios, 28nm circuits will be able to be produced by Russian foundries by 2030.

Continue Reading

Press Release

PE firm Insight Allies spends $290M for a bulk risk in CivicPlus, which provides software and also various other innovation to greater than 4,000 municipal governments (AJ Dome/Manhattan Mercury).

Published

on

PE firm Insight Allies spends

PE firm Insight Partners invests $290M for a majority stake in CivicPlus, which provides software and other technology to more than 4,000 municipal governments (AJ Dome/Manhattan Mercury)

AJ Dome / Manhattan Mercury:
PE firm Insight Partners invests $290M for a majority stake in CivicPlus, which provides software and other technology to more than 4,000 municipal governments  —  A Manhattan software business owner says a multimillion-dollar investment into the company will not change the company’s makeup.

Continue Reading

Press Release

EXAMINING THE LINKS BETWEEN THE RATIONALIST COMMUNITY, WITH SLATE STAR CODEX BLOG AS ITS EPICENTER, AND INFLUENTIAL LEADERS IN TECH, INCLUDING OPENAI’S FOUNDERS (CADE METZ/NEW YORK TIMES)

Published

on

EXAMINING THE LINKS BETWEEN THE RATIONALIST COMMUNITY

Examining the links between the Rationalist community, with Slate Star Codex blog as its epicenter, and influential leaders in tech, including OpenAI’s founders  —  Slate Star Codex was a window into the psyche of many tech leaders building our collective future.  Then it disappeared.

Continue Reading

Trending