Opinion

Grey market phones – a security risk

In the majority of European countries it’s possible to buy a mobile phone for very little money. In effect, the cost of the handset is subsidized by the service provider. However, in many cases, the phone will only work on a specified network.

If the user wants to put in a new SIM card, and change service providers, the handset has to be unlocked. This is done by changing the firmware on the phone.

As a rule, these phones are only sold on the grey market. Some sources estimate that between 15 – 18% of users have such phones. This causes an estimated 1.5 million euros loss to the mobile telecoms market.

Unlocking handsets is illegal, and causes a whole range of security problems.

A lot of modern handsets run Symbian OS, and are therefore vulnerable to attack from mobile malware. There are a number of known cases where ‘unlocked’ phones have been infected with Cabir or with other malware.

The firmware itself can pose another threat. The firmware on grey market handsets that have been unlocked may contain code which can be used by unsanctioned services, and could potentially add several hundred euros to the user’s phone bill.

The Italian mass media has recently reported a number of such cases, and an investigation is currently being conducted.

Grey market phones – a security risk

Your email address will not be published. Required fields are marked *

 

Reports

Focus on DroxiDat/SystemBC

An unknown actor targeted an electric utility in southern Africa with Cobalt Strike beacons and DroxiDat, a new variant of the SystemBC payload. We speculate that this incident was in the initial stages of a ransomware attack.

APT trends report Q2 2023

This is our latest summary of the significant events and findings, focusing on activities that we observed during Q2 2023.

Meet the GoldenJackal APT group. Don’t expect any howls

GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher.

Subscribe to our weekly e-mails

The hottest research right in your inbox