Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Android Google Security Sony

Smartphones From 11 OEMs, Including Google, Samsung, HTC, Lenovo and Sony, Vulnerable To Attacks Via Hidden AT Commands (bleepingcomputer.com) 116

An anonymous reader writes: In massive and groundbreaking research, a team of eleven scientists from the University of Florida, Stony Brook University, and Samsung Research America, have looked into what types of AT commands, or the Hayes command set, are currently supported on modern Android devices.

The research team analyzed over 2,000 Android firmware images from eleven Android OEMs such as ASUS, Google, HTC, Huawei, Lenovo, LG, LineageOS, Motorola, Samsung, Sony, and ZTE. They say they discovered that these devices support over 3,500 different types of AT commands, some of which grant access to very dangerous functions. These AT commands are all exposed via the phone's USB interface, meaning an attacker would have to either gain access to a user's device, or hide a malicious component inside USB docks, chargers, or charging stations. Once an attacker is connected via the USB to a target's phone, s/he can use one of the phone's secret AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, perform screen unlocks, or even inject touch events solely through the use of AT commands.

This discussion has been archived. No new comments can be posted.

Smartphones From 11 OEMs, Including Google, Samsung, HTC, Lenovo and Sony, Vulnerable To Attacks Via Hidden AT Commands

Comments Filter:
  • by b0s0z0ku ( 752509 ) on Sunday August 26, 2018 @02:13PM (#57198304)
    Why is a cell phone modem still emulating a dial-up modem in 2018? (!) Shouldn't it behave like an Ethernet card or something? Do they still "officially" need to dial "#777" to get a data connection?
    • Re:Oyyyyyy. (Score:5, Informative)

      by mikael ( 484 ) on Sunday August 26, 2018 @02:36PM (#57198426)

      It's not just cell phone modems. PCMCIA cards for laptops have the same set of AT commands. Same with satellite modem cards that would allow a PC to connect with the various satellite networks. This makes the development and porting of device driver software easy. You just take a basic functionality driver and add the extras you need like support for SMS, reading cell phone tower/satellite signal strengths, making and ending calls, switching to data mode.

      • by AmiMoJo ( 196126 )

        It's a non issue though.

        To exploit this an attacker would need to unlock and get root on the device. If they can do that you are screwed anyway.

        • Not on LG phones. On those, you can unlock the phone, send arbitrary touch events to do whatever you want, and access files in /sdcard, all with just a USB connection. Samsung are also some what vulnerable, but at least their screenlock can't be bypassed. However, the paper points out 28% of smartphone users to not have a pin, pattern, or biometric lock set. Also, Samsung allow phone calls to be made/answered using the AT commands even if locked.

    • by Anonymous Coward

      Why is a cell phone modem still emulating a dial-up modem in 2018? (!) Shouldn't it behave like an Ethernet card or something? Do they still "officially" need to dial "#777" to get a data connection?

      Because when connected to a computer with a serial cable, you can only speak to the chip over serial.
      Ethernet doesn't support dialing into another modem or faxing, and most all devices that use a modem to connect to the phone network don't have an IP or any address suitable for Ethernet framing to be sent to them.

      You would only dial #777 if you wanted to dial into Sprint by PPP
      You'd dial something different if you wanted to connect to a device with its own phone number.

      The AT command set is very expandable,

      • by AC-x ( 735297 )

        Because when connected to a computer with a serial cable, you can only speak to the chip over serial

        Serial? You mean RS-232? Who connects to their phone over RS-232 any more? How do you even connect to a modern smartphone with an RS-232 cable??

        When I plug my phone into my computer over USB the phone gives me the option to tether via USB, which then presents the phone as a USB ethernet device and routes the traffic over that...

    • The fact that the modem itself speaks AT commands isn't anything new (the smartphone OSes still needs to send command to it to ask to get a 3G/4G connection, or to dial a voice number. The ethernet-card-like interface is only exposed by the modem when the connection is set up.)

      The problem lies at two different levels :

      - Why is the smartphone exposing the modem over its USB connection ? It might by a bug in the OS (it should either expose some android-y interface like ADB, expose whatever shitty thing is pop

    • by tlhIngan ( 30335 )

      Why is a cell phone modem still emulating a dial-up modem in 2018? (!) Shouldn't it behave like an Ethernet card or something? Do they still "officially" need to dial "#777" to get a data connection?

      Because a data connection is still attached like a dialup connection.

      Though to be completely correct, only voice calls and circuit-switched data connections traditionally use the "ATD" command. To establish a proper 3G+ connection takes another command to establish and tear down data contexts.

      The whole command s

  • by fahrbot-bot ( 874524 ) on Sunday August 26, 2018 @02:28PM (#57198378)
    Imperial All Terrain Armored Transport vehicles (aka Walkers) vulnerable to attacks via hidden AT-AT commands.
  • by Anonymous Coward

    One of the easiest backdoors into phones just got noticed. I'm not shocked, and wonder if the RF side of the baseband is just as bad.

    Upshot is that your devices will be a lot more secure after this gets patched. The downside is that all those companies providing 'unlocks' for law enforcement just had a major hole closed up and their lives just got more difficult

  • PC's BIOS contains code that allow security mechanisms to be bypassed, code injected, formatted, and even become hijacked with alternative OS'es. I'm glad they are discovering this for us but it's not that scary - to me the news is that this is undocumented.. assuming they googled the results.
  • What's new? Do people actually expect their phones or PCs to survive encounters with offensive USB hardware? Nevermind RIL access I can plug a keyboard or mouse into a phone USB port and hack away without authorization as well. It only takes a couple of seconds to drop a payload with malicious HID USB via preprogrammed keystrokes. Attack surface of USB is as massive as it is indefensible.

    From TFA 5 of the 13 devices they tested give access to serial interface over USB by default. The others require ex

    • The news is you can unlock a phone via the usb port, and presumably gain access to an encrypted phone without the passcode.
      You can't do that by sending keystrokes via a usb hid.

      • by kenh ( 9056 )

        The news is you can unlock a phone via the usb port, and presumably gain access to an encrypted phone without the passcode.

        So the user has to dock their device into an insecure device and the phone is unlocked by injecting some AT commands? What smartmodem AT command unlocks a cellphone? And once it is supposedly unlocked though this magical AT command, there are other magical AT commands to emulate touch events?

        Why was the AT smartmodem expanded to include "smartphone unlock" and "touch event" commands?

        • Comment removed based on user account deletion
        • Or hand it over to a TSA agent...

        • What smartmodem AT command unlocks a cellphone? And once it is supposedly unlocked though this magical AT command, there are other magical AT commands to emulate touch events?

          LG smartphones. From the paper:

          To demonstrate this attack, we combine AT commands to bypass the lock screen (AT%KEYLOCK=0), navigate to the settings menu using touchscreen automation, and allow USB debugging from our attacking machine (AT%USB=adb). The KEYLOCK AT command bypasses the lock screen even if a pattern or passcode is set. From there, arbitrary touch events can be sent to control the phone(*). Given that nearly 28% of users do not have a pin, pattern, or biometric lock, this attack would still be feasible even without the LG-specific KEYLOCK command

          * Once these commands are patched, visit https://github.com/FICS/atcmd [github.com] for an automated script and the required utilities

          Samsung phones have AT commands for touch events, but no magic unlock command.

      • The news is you can unlock a phone via the usb port

        This is not news. Attack surface of USB is gargantuan. Completely indefensible.

        https://nakedsecurity.sophos.c... [sophos.com]

  • by jfdavis668 ( 1414919 ) on Sunday August 26, 2018 @03:31PM (#57198872)
    Next thing you will tell me is that there are Pascal vulnerabilities.
  • by MindPrison ( 864299 ) on Sunday August 26, 2018 @03:42PM (#57198968) Journal

    I don't know if anyone of you are into Arduino?

    But it's been common knowledge for years now that you can purchase chips complete with IMEI number, multi-band RX/TX, fully featured with data, phone, simcard reader (just solder directly to pins!) mic in/speaker out pins, and the commands you send to it is via normal serial connections, you can use AT commands just like on an old HAYES(tm) modem.

    The ones on ebay are often batches from really old cellphones, but very simple to code as you basically can do this just by interfacing them with an USB to SERIAL adapter, and then you can in fact use them just as a regular cellphone. I have a bunch of such chips in my drawer, let me give you some numbers for fun so you can find out for yourself, it's really an open door, surprising that so few know this, here's some numbers: NEOWAY M590E and another: SIM800L, if you google the first - you'll find tons of coding examples (which is so easy a 12 year old can figure it out), and instructional videos. The chips are often found complete with DIY PCB's someone put together as a kit out there, or presoldered, usually around 2-3 dollars, what a world we live in.

    And yes, these can be wired up to become your own cellphone, simple, or smart (use an raspberry pi with a touch screen, load it up with an OS, your choice). And a little software magic aka amateur hour - and you're done.

    A lot of devs, have done the same thing, it's a lot easier and a LOT more accessible to construct your own phone, than most people even dare to dream of.

    • by quenda ( 644621 )

      here's some numbers: NEOWAY M590E and another: SIM800L,

      Good luck finding an operational 2G network in 2018! :-)
        Are there any cheap 3g/lte equivalents?

      You could buy an old phone or USB 3G modem from ebay for a few dollars. Can an Arduino use the USB serial port on that?

  • Colossus and Guardian are one.
  • I understand that through careful use of AT commands through a device a user would have to physically dock into you can trigger the device to perform certain actions (like dial a call), but the claims in the summary are nothing short of fantastical:

    These AT commands are all exposed via the phone's USB interface, meaning an attacker would have to either gain access to a user's device, or hide a malicious component inside USB docks, chargers, or charging stations. Once an attacker is connected via the USB to a target's phone, s/he can use one of the phone's secret AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, perform screen unlocks, or even inject touch events solely through the use of AT commands.

    Exactly what AT command from the 1980s Hayes smartmodems does one use to "perform screen unlocks" or "inject touch events" into a device, let alone "exfiltrate sensitive device information"?

    • by Anonymous Coward

      the command set was significantly extended to support connectivity of modern devices. this is how host devices/software communicate with the connected device for everything like software maintenance, data dumps, connectivity, firmware updates, settings and configuration, etc. cheap to implement but oh, so shitty by design.

    • Re:Nonsensical (Score:5, Informative)

      by mikael ( 484 ) on Sunday August 26, 2018 @05:46PM (#57199736)

      The AT+CPIN and AT+CPIN2 commands is used to enter the PIN codes used to unlock the SIM card and modem equipment. Once you have access to the SIM Card, you get caller lists. Proactive SIM cards now have their own menu systems and UI built in. AT+CKPD emulates the keypad. AT+CPBS and AT+CPBR allow access to the phonebook lists of callers and called numbers.

      https://www.arcelect.com/GSM%2... [arcelect.com]

      • The AT+CPIN and AT+CPIN2 commands is used to enter the PIN codes used to unlock the SIM card and modem equipment. Once you have access to the SIM Card, you get caller lists. Proactive SIM cards now have their own menu systems and UI built in. AT+CKPD emulates the keypad. AT+CPBS and AT+CPBR allow access to the phonebook lists of callers and called numbers.

        If you were to use these commands on most smart phones they would come up blank. While there are provisions for SIM storage of messages, phone book, history it's seldom used.

    • Exactly what AT command from the 1980s Hayes smartmodems does one use to "perform screen unlocks" or "inject touch events" into a device, let alone "exfiltrate sensitive device information"?

      Where have YOU been? You've seen the movies: "AT Do-What-I-Want" by banging away on the keyboard like a Shakespeare monkey. Every good hacker knows that.

      Really though, I'm surprised to see they've enhanced the command set this much.

    • Read the article linked and watch the 2nd video...!
      (It's quite obvious from your comment that you didn't already)

  • Those command are how USB tethering works

    Yes, it pretends to be a modem/serial port. Oh well.

    The USB gadget interface is odd at best.

  • Secret really? (Score:5, Informative)

    by skullandbones99 ( 3478115 ) on Sunday August 26, 2018 @05:29PM (#57199612)

    The cellular AT commands are specified by the 3GPP Open Standard document 27.007.

    Anyone can download the latest doc from http://www.3gpp.org/ftp/Specs/... [3gpp.org]

    There was no need to reinvent the wheel because the old Hayes inspired AT command technology could easily be applied to modern cellular devices.

    Bluetooth can use AT commands for transferring contact information between devices and therefore AT commands are not restricted to the USB to serial interface. In other words, Bluetooth can provide virtual serial links over the Bluetooth radio link which I suspect an attacker would like to exploit remotely.

    When implementing an AT command interpreter, care is needed to not allow unauthorised entities from executing actions that are deemed to be dangerous to the integrity of the system.

    However, vendors can create their own vendor specific commands. That can be a weakness because they won't be tested in conformity testing for 27.007 and other AT command specifications.

    • by SpzToid ( 869795 )

      300baud FTW! with screeches and bleeps to alert anyone around, possibly in the early am hours because of pure bandwidth lust and greed.

  • Wow! AT&F&C1&D2 (Score:3, Interesting)

    by p51d007 ( 656414 ) on Sunday August 26, 2018 @09:30PM (#57200646)
    Holy crap! I haven't used AT commands since I got rid of my external modem in the dial up internet days. Started with a 2400bps, then 9600, 33k, and 56k. When I went to 1.5meg DSL then to a whopping 3-6 meg, thought it couldn't get any better LOL. AT commands...there's a walk down memory lane!
    • by Anonymous Coward

      Pretty much all 2G, 3G, 4G, NB-IoT, Cat-M1, etc. cellular modules use AT commands. Anyone building things like GNSS trackers or M2M devices is familiar with them. It's something that worked and could easily be adapted for new uses without reinventing the wheel.

  • +++ath

    Just testing...

  • by pablo_max ( 626328 ) on Monday August 27, 2018 @12:41AM (#57201188)

    Seriously, this article is fucking ridiculous scare mongering, pure and simple.
    Let's see.
    They need physical access to your phone.
    They need to have your password because the phone must be able to install as a modem, but Android does not do without enabling it EACH time you plug it in.
    They need the modem drivers.
    Then, they need to send AT commands after all that. After they were already holding your unlocked phone.

    Likely most people have no idea about AT commands. Yes, they are still used. They are also mandatory to support, should you wish to certify your phone according to PTCRB, which, unless you are selling only to VzW or Sprint, you MUST do to be allowed on the network.
    AT commands are normally not used by people. They are used by machines.
    They are used by SIM application tool kit for example. Your SIM card has applications on it that handles things like steering of roaming. This is done via at commands to the modem.
    Or changing the PLMN as another example.

    If you really want to fuck with your phone, then DL a copy of QXDM and start tweaking NV items. NV items are used by qualcomm to control everything about the radio. Change the bands? Sure, no problem. Change power class? Yup.
    Of course, the physical HW would not support it and likely you would damage the PA, but you can still set it. There likely wont be any matching circuit in the antenna path either. So if the PA can transmit in that band, you will get some pretty wicked spurious emissions.
    There are tons of settings you can make to brink your phone straight away.
    This takes the same level of access then sending stupid AT commands.

  • This isn't even an issue.

You know you've landed gear-up when it takes full power to taxi.

Working...