Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

SilverLight300

macrumors member
Original poster
May 31, 2016
36
1
Hi,
Can provider hack IOS and acccess your phone somehow?
You know some sms messages can change phone settings : GPRS, MMS, etc Settings.
So Is there a way to hack a phone through cell towers or providers?

Thanks in advance
 
The most they can do is blacklist your imei or send a carrier update file (which usually goes though Apple first)
[doublepost=1470667388][/doublepost]Oh they can read your texts and mms messages too
 
Just my two cents on this one :
In your cell phone you have a SIM card, this is a small computer running a Java virtual machine. On this card the provider can download an app to make this computer do whatever he wants ( as the operator has the OTAKey for your SIM card ) , read your data, your location, listen your communications, ....
Also as millions of these key have been stolen by the UK NSA ( CGHQ ) you can count that NSA , DEA, FBI etc have them so they can do the same thing.
Sorry for all that
 
Can they disable your wi-fi or burn something in your phone? (physical part)
Which information they can access and read? (mean IMEI, IOS version, Jailbroken or not, etc)
 
Just my two cents on this one :
In your cell phone you have a SIM card, this is a small computer running a Java virtual machine. On this card the provider can download an app to make this computer do whatever he wants ( as the operator has the OTAKey for your SIM card ) , read your data, your location, listen your communications, ....
Also as millions of these key have been stolen by the UK NSA ( CGHQ ) you can count that NSA , DEA, FBI etc have them so they can do the same thing.
Sorry for all that

Blatantly false.

The "small computer" is not running Java anything, and the SIM card subsystem (RIL) is completely isolated from the main smartphone OS.
 
  • Like
Reactions: M. Gustave
Can they disable your wi-fi or burn something in your phone? (physical part)
Which information they can access and read? (mean IMEI, IOS version, Jailbroken or not, etc)
[doublepost=1470693799][/doublepost]Depend of the app , but there is some Infos from the various actual implant from the NSA
-
GOPHERSET

(TS//SI//REL) GOPHERSET is a software implant for GSM (Global System for Mobile communication) subscriber identity module (SIM) cards. This implant pulls Phonebook, SMS, and call log information from a target handset and exfiltrates it to a user-defined phone number via short message service (SMS).

DROPOUTJEEP

(TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant for the Apple iPhone operating system and uses the CHIMNEYPOOL framework. DROPOUTJEEP is compliant with the FREEFLOW project, therefore it is supported in the TURBULENCE architecture.

(TS//SI//REL) DROPOUTJEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device, SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control, and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.
 
[doublepost=1470693799][/doublepost]Depend of the app , but there is some Infos from the various actual implant from the NSA
-
GOPHERSET

(TS//SI//REL) GOPHERSET is a software implant for GSM (Global System for Mobile communication) subscriber identity module (SIM) cards. This implant pulls Phonebook, SMS, and call log information from a target handset and exfiltrates it to a user-defined phone number via short message service (SMS).

DROPOUTJEEP

(TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant for the Apple iPhone operating system and uses the CHIMNEYPOOL framework. DROPOUTJEEP is compliant with the FREEFLOW project, therefore it is supported in the TURBULENCE architecture.

(TS//SI//REL) DROPOUTJEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device, SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control, and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.

Great! Conspiracy theory material!
 
Jesus, It's horrible...
Can they turn on/off your airplane mode?

(TS//SI//REL) DROPOUTJEEP -> What about jailbreak of phone?
What about password on the phone?
I think they need physical access to phone!
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.