{"id":205595,"date":"2010-01-20T15:03:00","date_gmt":"2010-01-20T19:03:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-7449191477721656425"},"modified":"2010-01-20T15:03:00","modified_gmt":"2010-01-20T19:03:00","slug":"geo-location-based-ddos-can-target-mobile-operators","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/205595","title":{"rendered":"Geo Location based DDOS can target Mobile Operators"},"content":{"rendered":"<p>The sharp rise of smart mobile phones is introducing a new and concerning attack vector &#8211; a geo-location based DDOS.<\/p>\n<p><span style=\"font-weight: bold;\">Example Scenario<\/span><br \/>Imagine a popular mobile application (bejeweled like game) that is downloaded by many.<\/p>\n<ol>\n<li>The app contains a small amount of code to reference the phone&#8217;s GPS and also check in with a command and control website.<\/li>\n<li>The attacker decides on a city to target and a popular time of day and then updates the command and control website.<\/li>\n<li>The mobie applications all check in with the C&amp;C site and all mobile applications in the city area begin downloading large video files from YouTube.<a onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\" href=\"http:\/\/4.bp.blogspot.com\/_Hu1rpxRsqcU\/S1dWEK8iD9I\/AAAAAAAAAec\/w0r8N8zLRJY\/s1600-h\/cell_phone_gps.jpg\"><img decoding=\"async\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 305px; height: 320px;\" src=\"http:\/\/4.bp.blogspot.com\/_Hu1rpxRsqcU\/S1dWEK8iD9I\/AAAAAAAAAec\/w0r8N8zLRJY\/s320\/cell_phone_gps.jpg\" alt=\"\" id=\"BLOGGER_PHOTO_ID_5428902505476132818\" border=\"0\" \/><\/a><\/li>\n<\/ol>\n<p><span style=\"font-weight: bold;\">Result?<\/span><\/p>\n<ul>\n<li>A massive sudden spike in high bandwidth usage of the mobile data network in a single metropolitan area.<\/li>\n<li style=\"font-weight: bold;\">Most cellular networks run near capacity during the lunch rushes of popular cities. A sudden massive spike such as this would likely push the network over the edge and bring it down entirely.<\/li>\n<\/ul>\n<p>This is a tough issue to address and I think it warrants a bit of consideration.<\/p>\n<p>This is a guest post by Michael Coates, a senior application security consultant with extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.<br \/>The original text is published on<a href=\"http:\/\/michael-coates.blogspot.com\/\"> &#8230;Application Security&#8230;<\/a><\/p>\n<p>Talkback and comments are most welcome<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2010\/01\/gsm-encryption-broken-cellular-calls-at.html\">GSM Encryption Broken &#8211; Cellular Calls At Risk<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/08\/when-will-your-mobile-phone-get-hacked.html\">When Will Your Mobile Phone get Hacked?<\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-7449191477721656425?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/2Rmm9C0fiko\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The sharp rise of smart mobile phones is introducing a new and concerning attack vector &#8211; a geo-location based DDOS. Example ScenarioImagine a popular mobile application (bejeweled like game) that is downloaded by many. The app contains a small amount of code to reference the phone&#8217;s GPS and also check in with a command and [&hellip;]<\/p>\n","protected":false},"author":5679,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-205595","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/205595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/5679"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=205595"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/205595\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=205595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=205595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=205595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}