NoGoolag
4.53K subscribers
13.1K photos
6.88K videos
584 files
14.1K links
Download Telegram
The Biden administration and allied groups, including the Democratic National Committee (DNC), are “planning to engage fact-checkers more aggressively and work with SMS [Short Message Service] carriers to dispel misinformation about vaccines sent over social media and text messages,” according to a report today in Politico by White House correspondents Natasha Korecki and Eugene Daniels...
(
https://www.politico.com/news/2021/07/12/biden-covid-vaccination-campaign-499278 )


Politico did not clearly define what the administration meant by “monitoring” of text messages, including if messages would be flagged or if they would be prevented from being delivered.

The media outlet also did not clarify how the administration or social media platforms would determine what exactly constitutes “misinformation.”


https://childrenshealthdefense.org/defender/white-house-sms-carriers-monitor-vaccine-misinformation-private-text-messages/

#usa #sms #censorship #gov #why
Complex new SMS malware discovered

Cell phone users in Canada and the United States are being targeted by a new and advanced form of SMS malware that lures victims with COVID-19-related content.

This complex malware named Tanglebot by Cloudmark threat analysis because of its multiple levels of obfuscation, can directly obtain personal information, control device interaction with apps and overlay screens, and steal account information from financial activities initiated on the device.

How it works?

TangleBot sends SMS text messages themed around coronavirus regulations and third doses of COVID vaccines known as booster shots to entice users into downloading malware. Victims who take the lure unwittingly download malware that compromises the security of their device and configures the system so that confidential information can be exfiltrated to systems controlled by the attacker(s).

TangleBot can overlay banking or financial apps and directly steal the victim’s account credentials.

TangleBot can use the victim’s device to message other mobile devices, spreading throughout the mobile network.

Complete control over the infected device

The malware allows the threat actor(s) to control everything including contacts, SMS and phone capabilities, call logs, internet access, and camera and microphone on an infected device and employs multiple levels of obfuscation to keep its presence hidden from the device's user.

Examples of few SMS messages

The messages sent as part of the malware campaign appear to be warnings or appointment notifications. One such SMS contained the text "New regulations about COVID-19 in your region. Read here:" followed by a malicious link.

Another preceded a malicious link with the statement: "You have received the appointment for the 3rd dose. For more information visit:"

Users who click on the link are taken to a website where they are notified that the Adobe Flash Player software on their device is out of date and must be updated for them to proceed. If the user clicks on the subsequent dialog boxes, TangleBot malware is installed on the Android device.


https://www.infosecurity-magazine.com/news/complex-new-sms-malware-discovered/

#tanglebot #malware #sms #covid
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings - Arxiv - 2023

Short Message Service (SMS) remains one of the most popular communication channels since its introduction in 2G cellular networks. In this paper, we demonstrate that merely receiving silent SMS messages regularly opens a stealthy side-channel that allows other regular network users to infer the whereabouts of the SMS recipient. The core idea is that receiving an SMS inevitably generates Delivery Reports whose reception bestows a timing attack vector at the sender.

#Cellular #SMS
Media is too big
VIEW IN TELEGRAM
GSM Voice Decryption From Start To Finish (2G Non-Hopping Only)

The GSM data used in the making of this video was recorded and decrypted with unanimous consent from the owner(s) for the purpose of demonstrating the 2G decoding features of gr-gsm and for evaluating cellular network security.

Due to it's complexity and difficulty, decoding 2G phone calls is considered by most to be the hardest task to accomplish in the realm of GSM decoding. Differing voice codecs, varying channel data rates, arbitrary allocation of frequency hopping and carrier-specific network configurations add too many variables into the mix to make it a straight-forward enough goal to achieve.

I showcase the entire 2G voice decryption process from start to finish, excluding the actual recording of the GSM data

This video was made for purposes of education & experimentation only #IMSI-CATCHING, #SMS-SNIFFING and voice call #interceptior on #CELLULAR #NETWORKS is illegal & punishable by hefty fines & imprisonment

#GSM #2G #SDR #GRsdm
Media is too big
VIEW IN TELEGRAM
How Sim Swap Hackers Steal Millions | Mental Outlaw

In this video I explain how hackers are able to steal millions of dollars and access sensitive data in peoples accounts that are secured with #SMS 2 factor authentication and how you can defend yourself from sim swapping attacks by using 2 factor authentication

#Hacking #Hackers #Sim #2fA
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? | Team Cymru

Coper, a descendant of the Exobot malware family, was first observed in the wild in July 2021, targeting Colombian Android users. At that time, Coper (the Spanish translation of “Copper”) was distributed as a fake version of Bancolombia’s “Personas'' application.

The malware offers a variety of advanced features, including keylogging, interception of SMS messages and push notifications, and control over the device's screen. It employs various injects to steal sensitive information, such as passwords and login credentials, by displaying fake screens or overlays. Additionally, it utilizes VNC (Virtual Network Computing) for remote access to devices, enhancing its surveillance capabilities.

#Android #MAS #Exobot #Keylogging #Malware #RemoteAccess #SMS #Coper #Octo