您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[CCIA]:美情报机构针对全球移动智能终端实施的监听窃密活动研究报告 - 发现报告

美情报机构针对全球移动智能终端实施的监听窃密活动研究报告

信息技术2025-03-24-CCIA哪***
AI智能总结
查看更多
美情报机构针对全球移动智能终端实施的监听窃密活动研究报告

Contents Introduction................................................................................................................... 1 Chapter 1. Taking Over the Mobile Phone via SMS - Highly Sophisticated AttacksTargeting SIM Card Vulnerabilities......................................................................5 Incident Review........................................................................................................................6Attack Method..........................................................................................................................6Traceability Analysis................................................................................................................ 8Extended Analysis.................................................................................................................. 10References.............................................................................................................................. 13 Chapter 2. The Stolen Key - Stealing the Encryption Key of the Mobile Phone SIMCard......................................................................................................................14 Incident Review......................................................................................................................14Attack Method........................................................................................................................15Extended Analysis.................................................................................................................. 17References.............................................................................................................................. 18 Chapter 3. Sneaky Intrusion - Zero-Click Attack on iPhone..................................... 20 Incident Review......................................................................................................................20Attack Method........................................................................................................................21Extended Analysis.................................................................................................................. 23References.............................................................................................................................. 24 Chapter 4. Pegasus - the Use of Commercial Spyware...............................................26 Incident Review of the Pegasus Spyware................................................................................ 26The US Intelligence Agencies Use Spyware (Pegasus)........................................................... 27Extended Analysis.................................................................................................................. 29References.............................................................................................................................. 30 Chapter 5. Apps That Cannot Be Uninstalled - Collecting Data Through SoftwareWidely Preinstalled by Operators....................................................................... 32 Incident Review......................................................................................................................33Incident Analysis.................................................................................................................... 34Extended Analysis.................................................................................................................. 34References.............................................................................................................................. 35 Chapter 6. Getting to the Bottom - Obtaining Technical Parameters of Global MobileOperators..............................................................................................................37 Incident Review......................................................................................................................38 Attack Method........................................................................................................................38Extended analysis................................................................................................................... 42References.............................................................................................................................. 43 Chapter 7. Camouflaged Base Stations–Fake Base Stations Are Widely Used toMonitor Mobile Phones........................................................................................44 Fake Base Stations Are Widely Used by the US Intelligence Agencies and Law EnforcementAgencies.................................................................................................................................45Fake Base Stations Become Avenues for Surveillance and Cyberattacks..........................