iPhone SMS spoofing tool released

Share this article:
A French hacker has released a tool capable of sending SMS messages with spoofed sender details on the iPhone 4.

The "sendrawpdu" command-line interface tool allows users to customize the reply number on text messages and could be ideal for phishing attacks.

The hacker, known as pod2g, released the free tool after detailing a flaw in the way the iPhone handled SMS messages, which made it possible to spoof sender details.

“Pirates could send a message that seems to come from the bank of the receiver asking for some private information, or inviting them to go to a dedicated [phishing] website,” pod2g said in a blog post. 

The vulnerability exists on other mobile devices and all versions of Apple's iOS platform, including the upcoming iOS 6, according to pod2g.

"If the destination mobile is compatible with (User Data Header features), and if the receiver tries to answer the text, he will not respond to the original number, but to the specified one,” pod2g wrote. “Most carriers don't check this part of the message, which means one can write whatever he wants in this section. In a good implementation of this feature, the receiver would see the original phone number and the reply-to one. On iPhone, when you see the message, it seems to come from the reply-to number, and you lose track of the origin.”

Apple urged customers to use its iMessage service because it verifies the address from which messages were sent, unlike its SMS app which displays the vulnerable reply-to address.

iMessages are only available between iOS and OS X devices.

“When using iMessage instead of SMS, addresses are verified which protects against these kinds of spoofing attack," Apple said in a statement. “One of the limitations of SMS is that it allows messages to be sent with spoofed addresses to any phone, so we urge customers to be extremely careful if they're directed to an unknown website or address over SMS.”

Website SMSspoofing.com pointed out that dozens of paid SMS spoofing services exist online.

Senddrawpdu was based on sendmodem and could be downloaded for jailbroken iPhone 4 devices from GitHub.

This article originally appeared at scmagazine.au.

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.