View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Researchers expose vulnerabilities in Verizon device

Vulnerability could assist hackers to snoop into private information of Verizon Wireless mobile phone users.

By CBR Staff Writer

Security experts have exposed vulnerability in a device sold by Verizon, which they claim could assist hackers to snoop into private information of Verizon Wireless mobile phone users.

Security firm iSEC Partners senior consultants Tom Ritter and Doug DePerry managed to snoop on Verizon users’ calls, photos, text messages and emails by hacking into the carrier’s signal-boosting devices known as femtocells or network extenders.

The finding comes amidst the intense global debate over privacy issues following NSA leaks by Edward Snowden in June 2013.

Tom Ritter was cited by Reuters as saying that the move is not about how the NSA would attack ordinary people.

"This is about how ordinary people would attack ordinary people," Ritter said.

However, Verizon reported that it has updated the software on its femtocells or network extenders, which would avoid hackers from copying the skills used by the two experts.

Verizon spokesman David Samberg said that the company has released a Linux software update in March that avoids its network extenders from being compromised in the manner reported by Ritter and DePerry.

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

"The Verizon Wireless Network Extender remains a very secure and effective solution for our customers," Samberg said.

Experts also reveal that the hackers can still work on other tricks to hack the femtocells of Verizon, in addition to devices offered by about 30 global carriers to their customers.

Femtocells are used to improve Wi-Fi and mobile signals within the buildings, while common software installed in several devices has a major security issue that enables all traffic to be recorded and analysed.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU