It is undeniable that network technology has developed very rapidly and has become an indispensable part of our lives. But at the same time, it has also provided many criminals with opportunities to take advantage of. Recently, a user found that his mobile network suddenly changed from 4G to 2G, and received a large number of verification code messages, and finally the money in the network account was transferred away.
It is reported that these incidents are the result of criminals tampering with the user's network and using "SMS sniffing technology" to obtain the content of the mobile phone and steal money. In fact, sniffing technology is to use fake base stations and SMS interception devices to steal data on the user's mobile phone. At present, many people's mobile banking and payment platforms are bound to their own mobile phone numbers. Criminals use fake base stations to obtain nearby phone numbers. Then use the mobile phone number to log in to the financial website, and at the same time monitor the verification code sent back by the website through the air, so as to log in to the website and steal or transfer money.
Once sniffing technology is used, the signal will be downgraded from 4G to 2G. This is because the 2G communication protocol was formulated 30 years ago. Due to the limitations of the conditions at the time, the 2G protocol has a lot of loopholes. The most fundamental loophole is that the original 2G system did not verify the legitimacy of the base station, so as long as the base station parameter configuration is the same as the operator's base station parameter configuration, the mobile phone will think that the base station is legal and will establish a connection and communication with it.
Finally, when the victim is targeted by sniffing technology, he will receive a large number of text messages in a short period of time. However, in order not to arouse the victim's suspicion, criminals usually choose to act late at night or early in the morning. In this regard, turning off the phone at night or turning off the cellular network can effectively avoid attacks.
Previous article:Elcomsoft forensics package upgraded to retrieve information without unlocking iPhone
Next article:Li Yizhong believes that the deployment of 5G base stations nationwide will cost 1.5 trillion yuan in 7 years, and the climax will be next year and the year after next
Recommended ReadingLatest update time:2024-11-15 07:20
- Popular Resources
- Popular amplifiers
- Apple and Samsung reportedly failed to develop ultra-thin high-density batteries, iPhone 17 Air and Galaxy S25 Slim phones became thicker
- Micron will appear at the 2024 CIIE, continue to deepen its presence in the Chinese market and lead sustainable development
- Qorvo: Innovative technologies lead the next generation of mobile industry
- BOE exclusively supplies Nubia and Red Magic flagship new products with a new generation of under-screen display technology, leading the industry into the era of true full-screen
- OPPO and Hong Kong Polytechnic University renew cooperation to upgrade innovation research center and expand new boundaries of AI imaging
- Gurman: Vision Pro will upgrade the chip, Apple is also considering launching glasses connected to the iPhone
- OnePlus 13 officially released: the first flagship of the new decade is "Super Pro in every aspect"
- Goodix Technology helps iQOO 13 create a new flagship experience for e-sports performance
- BOE's new generation of light-emitting devices empowers iQOO 13 to fully lead the flexible display industry to a new level of performance
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- CGD and Qorvo to jointly revolutionize motor control solutions
- CGD and Qorvo to jointly revolutionize motor control solutions
- Keysight Technologies FieldFox handheld analyzer with VDI spread spectrum module to achieve millimeter wave analysis function
- Infineon's PASCO2V15 XENSIV PAS CO2 5V Sensor Now Available at Mouser for Accurate CO2 Level Measurement
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- A new chapter in Great Wall Motors R&D: solid-state battery technology leads the future
- Naxin Micro provides full-scenario GaN driver IC solutions
- Interpreting Huawei’s new solid-state battery patent, will it challenge CATL in 2030?
- Are pure electric/plug-in hybrid vehicles going crazy? A Chinese company has launched the world's first -40℃ dischargeable hybrid battery that is not afraid of cold
- Switching Power Supply Interest Group 19th Task
- LED power supply not working
- Smart MM32 + UCOS + uCGUI
- How to decorate a chemical analysis room?
- Find VHDL half-integer division
- Has anyone used AMIS-30543 to drive a stepper motor?
- Is the emitter voltage of the PNP tube pulled down by the base?
- Basic knowledge of wireless WiFi coverage
- mpy firmware for Nucleo-L432 development board
- What is UWB technology? Several major mobile phone manufacturers are planning to develop this business