Overview
Explore vulnerabilities in GSM devices and their potential impact on individuals, businesses, and communities in this 26-minute conference talk from the Kaspersky Industrial Cybersecurity Conference 2019. Delve into various types of attacks targeting GSM-enabled devices, ranging from children's watches to industrial controllers. Learn about scanning IP addresses, mobile number pools, API usage, and methods for identifying and exploiting security weaknesses. Gain insights into the costs associated with these activities and the ease of acquiring vulnerable devices. Understand the implications for specific companies and the broader cybersecurity landscape. Access accompanying slides for visual reference and discover additional resources to further your knowledge in industrial cybersecurity.
Syllabus
Introduction
What are GSM devices
The big issue with GSM devices
Scanning IP addresses
Cost
Mobile numbers pool
Using API
Remove inactive numbers
Remove millions of numbers
The possibility of buying such devices
The possibility of hacking a specific company
Get contact
Apps
Security complaints
Conclusion
Taught by
Kaspersky