Using Client Provisioning to Intercept a Victim's Mobile Traffic
Check Point Research recently discovered an attack vector for redirecting a victim's mobile traffic to an attacker-controlled server. For more information visit http://research.checkpoint.com/advanced-sms-phishing-attacks-against-modern-android-based-smartphones.
This attack vector relies on a process called over-the-air client provisioning, which is normally used by cellular network operators to deploy network-specific settings to a new phone joining their network.
We discovered how, via a client provisioning message, a remote agent can trick a user into accepting new phone settings that route all his mobile traffic through a malicious proxy. To demonstrate this attack, in the video we are redirecting a victim to a fake social network login page and stealing his credentials just by sending him a rogue client provisioning message.