Cellular Exploitation on a Global Scale

By Mathew Solnik, Marc Blanchou ·

As a supplement to our Black Hat presentation, the below videos demonstrate cellular phone attacks to help educate the community on the seriousness of the risks.

Only devices prior to 7.04 are vulnerable to completely invisible attacks. Newer devices require a mobile configuration profile to be accepted in order to be attacked by a third party.

Mobile phone users should make sure their devices are up to date with the latest patches. If no recent patches have been issued for a device, users should contact their carriers to find out if they are impacted and if a fix is available or has already been implemented.