Using Client Provisioning to Intercept a Victim's Mobile Traffic

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=3G5NXGMLKvE



Duration: 1:37
14,514 views
102


Check Point Research recently discovered an attack vector for redirecting a victim's mobile traffic to an attacker-controlled server. For more information visit http://research.checkpoint.com/advanced-sms-phishing-attacks-against-modern-android-based-smartphones.

This attack vector relies on a process called over-the-air client provisioning, which is normally used by cellular network operators to deploy network-specific settings to a new phone joining their network.

We discovered how, via a client provisioning message, a remote agent can trick a user into accepting new phone settings that route all his mobile traffic through a malicious proxy. To demonstrate this attack, in the video we are redirecting a victim to a fake social network login page and stealing his credentials just by sending him a rogue client provisioning message.




Other Videos By Check Point Software


2019-09-30CheckMates “Ask Us Anything” with Check Point CEO Gil Shwed and VP of Products Dr. Dorit Dor | Pt. 2
2019-09-23Avianca Airlines Takes Off to the Cloud Securely with Check Point
2019-09-20CheckMates “Ask Us Anything” with Check Point CEO Gil Shwed and VP of Products Dr. Dorit Dor | Pt. 1
2019-09-18Desert Research Institute Elevates Data Security With Check Point R80 and SandBlast Network
2019-09-18How to Transform Your Branch Office Connectivity Through Cloud-Delivered Security Services
2019-09-17Protecting Branch Offices with Cloud-Delivered Security | Check Point's CloudGuard Connect
2019-09-11Stefanini Prevents Zero-Day Attacks with Check Point R80.10 Solutions
2019-09-11Webinar | How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance
2019-09-11BlueKeep Security Vulnerability Escalates to Critical Cyber Threat
2019-09-06Welcome to the Future of Cyber Security | Check Point Software
2019-09-05Using Client Provisioning to Intercept a Victim's Mobile Traffic
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 3/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 2/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 1/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Outbound ASG
2019-09-03Check Point CloudGuard IaaS - Setting up the AWS Transit Gateway
2019-09-03Check Point CloudGuard IaaS - Management Server Advanced Configuration
2019-09-03Check Point CloudGuard IaaS - Install Management Server
2019-09-03Check Point CloudGuard Network Security - AWS Transit Gateway Introduction
2019-09-03Best Practices for Architecting Hybrid Cloud Security | VMworld 2019 US
2019-09-03Prevent Unknown Cyber Threats with Zero-Day Protection



Tags:
Check Point Research
Mobile Traffic
malicious proxy
mobile security
cyber vulnerabilities
cyber vulnerability management
cyber attack research