Ralf-Philipp Weinmann found devastating flaws in a large percentage of cellular communication stacks. According to him, sufficiently motivated attackers are able to perform these attacks, which are almost undetectable. They allow to take over control of mobile phones in the range of the rogue transceiver, which may mean hundreds of phones at a time, in crowded urban areas. Attackers hence are able to cause billing problems by either dialling premium numbers or sending text messages to premium services, or monitor all communications of the cellphone user.
Moreover, even eavesdropping on the surroundings of the cellphone is possible by making the cell phone pick up incoming calls automatically - without the user noticing. The attacking transceiver needs to be online for just a couple of seconds to perform the attack.
The University of Luxembourg, an international university focusing on research areas like Security in Information Technology, is working together with a number of vendors for both cellular communication chips and mobile phones. The objective is to fix the security flaws found and to prevent similar flaws from happening in the future. While programming bugs are inevitable, serious code security audit and exploit mitigations by the major baseband chip vendors help to reduce this class of security problem.
Source information: myMOSAIK.lu