Haktuts-Hacking News

All About ethical hacking,hacking news hacker news,security news,privacy Issue,cyber crime,pentesting tools,open sources,cyber security, information security, technology news,how-to,Tips and tricks and dark web news

China spies on airline passengers with IMSI-catchers

in: China spies on airline passengers chinese-goverment-spyware Hacking News hacking|Spying user data. IMSI IMSI-catchers NEWS Silent Logging
John McAfee,The former owner of McAfee security firm said, about the ability of the Chinese government to spy on four airlines customer.

John McAfee has never revealed the names of the airlines and never explained how he got this information, but he explained the complete cyber espionage campaign.

First, he got an Android software that had the capability to detect “man in the middle attacks by devices that emulate legitimate cell phone towers, to hundreds of international travelers flying with four highly renowned airlines”.

The software tries to detect anomalies in the IMSI-catchers (International Mobile Subscriber Identity), something that manufacturers can’t hide.

The next question is, but what is an IMSI-catcher?
“IMSI-catchers are devices that emulate cell phone towers. They trick our smartphones into believing a cell tower suddenly appeared in close range and entices our phones to connect through it.”

If your mobile is caught by any IMSI-catchers, you are in trouble. Once you are connected to the fake cell tower a man-in-the-middle attack is performed, “the IMSI-catcher analyses our configuration and “pushes” the necessary software into our smartphones in order for some third party related to the IMSI catcher to take control.”

When traveler attempted to connect to the onboard internet, a module was pushed to the connecting smartphone that surreptitiously turned on the 3G or 4G communications (without displaying the corresponding icon). At that point, an onboard IMSI-catcher attempted to connect to the phone and compromise traveler’s devices.

After this step, it will be check if your mobile have already installed an Android APP called ”Silent Logging“, if not the application will be pushed to your device.

“Silent Logging” has the purpose of spying on you and uses the following permissions:
mcafee silent logging airlines spy passengers IMSI-catchers
“After Silent Logging is activated, a spyware app is downloaded to the users’ smartphone that utilises the Silent Logging app, unless the phone is “physically wiped” by the manufacturer, this software remains forever.”

If you try to do a factory reset by your own be aware that the spyware will detect it and emulate that you are doing a factory reset.

Once you have this spyware installed your device will available for the government to check on you, reading emails, SMS, recording videos, voice,etc etc, and all is sent to China.

0 comments:

Post a Comment

Newer Post Older Post Home
Powered by Blogger.

Labels

  • Ethical hacking course

Featured post

Free Ethical Hacking Tranning

Ethical hacking and pentesting from beginners to advance are given below: Introduction Hackers Hierarchy Hackers Keyword Virus Typ...

Popular Posts

  • How to secure android device from spying and location tracking
    Ever  puzzled   regarding  being snooped  on-line  by  the large    companies?  will  it raise associate  alarm in your head?  affirmative...
  • How To Unfriend All Facebook Friend In Single Click Using Firefox|Chrome|Opera Browser
    Unfriend all the facebook friend in single click is quite simple,just follow the given below : Steps to unfriend all the facebook friend...
  • CEH v9 : Certified Ethical Hacker V9 PDFs & Tools Download
    Download Certified Ethical Hacking ( CEHv9 ) PDF & Tools. This is a PDF & Tools collection of CEH | V9. Read to learn How to Hack ...
  • How to become admin of any facebook fan page (Hijack Facebook Fan Page)
    Hacking Any Facebook Page The latest bug in Social networking site facebook could allow attackers to  take over control of your Facebo...
  • How To Root Xiaomi Redmi Note 4 using android application
    How To Root Xiaomi Redmi Note 4 using android application Towel Root? 1). Download towel root 2). Install the application 3). Ru...
  • Free Ethical Hacking Tranning
    Ethical hacking and pentesting from beginners to advance are given below: Introduction Hackers Hierarchy Hackers Keyword Virus Typ...
  • List of Top 20 Google dorks
    What is google hacking? Google hacking involves using advanced operators in the google search engine to locate the specific string of ...
  • How To Use WhatsApp As A Search Engine And Wikipedia By Activating WhatsApp Bot
    Today, we are going to tell you about a WhatsApp bot Which is created to bring search engine-like feature to WhatsApp. This WhatsApp bo...
  • Snowden Unveils NSA "God Mode" Malware That Lives On Your Motherboard And Can Not Be Traced
    New Snowden revelation “GODSURGE” gives NSA ability to see everything your computer does – even the screen The NSA backdoor GODSURGE h...
  • Run Windows 98, Linux, KolibriOS inside your web browser using javaScript And NodeJS
    With time, JavaScript engines have grown to become faster and more powerful than ever. Demonstrating the same, a coder has created an on...

About This Blog