Bypass Cell-phone-verification Through a Smartphone-based Botnet
نویسندگان
چکیده
Due to the trend that more and more web services, such as Google, Facebook, and many auction websites, require users to open their new accounts or to login to their accounts through cell-phone-verification, cell-phone-verification has become an important function of cellular phones. However, our research shows that cell-phone-verification is not always reliable. This study proposes a new attack method named MAC-YURI (My ACcount, YoUr ResponsIbility) against cell-phone-verification to show people one possible abuse of smartphones. Through MAC-YURI, an attacker can utilize a compromised smartphone as a steppingstone to accept and forward account verification code to finish cell-phone-verification when applying a new account or logging in to an account. We have implemented MAC-YURI on an Android smartphone. Experimental results show that MAC-YURI can successfully assist an attacker in obtaining the verification code of an account without the awareness of a steppingstone smartphone owner. Besides, MACYURI also develops an SMS-based mechanism to create a smartphone-based botnet. After such a botnet is created, it is difficult to locate the bot master or the machine a bot will contact in the future. Finally, this paper proposes some recommendations to protect a smartphone against MAC-YURI.
منابع مشابه
SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications
Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed D...
متن کاملDeveloping a Smartphone-Based Educational Application for Women at Risk of Endometriosis
Introduction: Since endometriosis is a chronic disease and requires long-term care, it can have a devastating effect on life quality. For this reason, it is necessary to increase awareness and educate women about endometriosis. In this regard, a mobile phone-based endometriosis training program was designed. Method: The present paper is a development-applied study and was conducted in two stage...
متن کاملExamining the Effect of Smartphone on Musculoskeletal Disorders and Neck Kinematic Among Smartphone Users in Different Postures and Tasks
Background and Objectives: In the last decade, the smartphones have become one of the most popular technologies around the world. Due to the multi-functional use of smartphones, the technology users spend long hours using it. Methods: This was a semi-experimental and experimental study. In the first section, 98 students entered the semi-experimental part and completed demographic and body map ...
متن کاملDeveloping a Smartphone-Based Educational Application for Women at Risk of Endometriosis
Introduction: Since endometriosis is a chronic disease and requires long-term care, it can have a devastating effect on life quality. For this reason, it is necessary to increase awareness and educate women about endometriosis. In this regard, a mobile phone-based endometriosis training program was designed. Method: The present paper is a development-applied study and was conducted in two stage...
متن کاملDesign of a Hybrid Command and Control Mobile Botnet
The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. A mobile botnet is defined as a collection of compromised smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 31 شماره
صفحات -
تاریخ انتشار 2015