How RCS exposes mobile users to hackers (2024)

In 2019, Google and several mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS replaced traditional calling and SMS, serving as their replacement in the communication landscape.

The technology included also new messaging possibilities and features. So, the idea was to make native text more competitive to popular digital alternatives like WhatsApp and iMessage.

RCS is based on internet protocols like SIP and HTTP to implement group chats, video calls, file transfers and more. In 2019 SRLabs’ researchers conducted a worldwide survey to estimate security risks in active RCS deployments.

Key findings on RCS security
  • The provisioning process for activating RCS functionality on a phone is badly protected in many networks, allowing hackers to fully take over user accounts by stealing RCS configuration files that include SIP and HTTP credentials
  • Andorid Messages, the most popular RCS client, does not implement sufficient domain and certificate validation, enabling hackers to use DNS spoofing to intercept and manipulate communication
  • Some RCS core nodes do not effectively validate the user identity, allowing caller ID spoofing and fraud through SIP message injection
  • VoWiFi-enabled smartphones expose users to new WiFi-based IMSI catcher
How popular is RCS?

In June 2019, Google officially announced their plans to release RCS on all Android phones starting with trials in the UK and France. Then, in November 2019, RCS was rolled out to all Android smartphones in the US, and operators in other countries were running trials. As of 2022 there is no exact data how wide-spread RCS is, but as it is natively integrated in all Android Smartphones around 70 % off all smartphone users own at least one RCS capable device.

Additionally, in 2019 SRLabs conducted an internet survey using DNS queries directed to RCS specific domains, confirming the presence of its servers in many countries.

How RCS exposes mobile users to hackers (1)

How secure is RCS?

After the international release, SRLabs researchers found a range of vulnerabilities that allowed different hacking attacks against some deployments. Although, not all vulnerabilities applied to all networks.

The issues included:

  • User Tracking
  • Impersonating Users
  • Conducting Fraud
  • Website DDoS
  • Intercepting texts

How RCS exposes mobile users to hackers (2)

Criminals achieve impersonation, fraud, and user tracking without sophisticated equipment or extra target information. Therefore, attackers intercept SMS-based One-Time-Password (OTP) codes locally and remotely, depending on network configuration. So, they attempt fraudulent bank transactions or take over email accounts by doing so.

The detected issues made RCS deployments as vulnerable to hacking as legacy mobile technologies, such as 2G and SS7, according to the SRLabs experts.

For example, a local Man-In-The-Middle (MITM) attack allowed hackers to intercept and manipulate all user communications. The underlying issue was that the RCS client, including the official Android messaging app, did not properly validate that the server identity matches the identity provided by the network during the provisioning phase. Therefore, DNS spoofing can abuse this issue, enabling hackers to be in the middle of the encrypted connection between the mobile and the RCS network core.

This video by SRLabs demonstrates how RCS allowed hackers to impersonate subscribers by spoofing their IP address:

This video demonstrates a MITM attack, in which messages intercepted and modified:

A demo video showing how a user’s config file can be stolen can be found here:

These vulnerabilities can allow attackers to intercept OTPs that can be used to take control of critical accounts:

Can these attacks be mitigated?

The vulnerabilities’ impact on mobile networks varies based on gaps in their individual implementations and configuration. Nonetheless, all vulnerabilities found relate to common security mistakes that can be mitigated by applying the following best practices:

How RCS exposes mobile users to hackers (3)

Research by: Sina Yazdanmehr (@SinaYazdanmehr), Luca Melette, and Lukas Euler

References

[1] https://www.gsma.com/futurenetworks/rcs/

[2] https://www.blackhat.com/eu-19/briefings/schedule/index.html#mobile-network-hacking-ip-edition-17617

How RCS exposes mobile users to hackers (2024)
Top Articles
NFT Art Theft: What Buyers and Artists Need to Know
What Are NFT Royalties, and How Can You Earn Them?
Time in Baltimore, Maryland, United States now
Truist Park Section 135
Linkvertise Bypass 2023
The Best Classes in WoW War Within - Best Class in 11.0.2 | Dving Guides
Noaa Weather Philadelphia
Student Rating Of Teaching Umn
Amelia Bissoon Wedding
Fredericksburg Free Lance Star Obituaries
The most iconic acting lineages in cinema history
9044906381
Telegram Scat
Skyward Login Jennings County
Inside the life of 17-year-old Charli D'Amelio, the most popular TikTok star in the world who now has her own TV show and clothing line
Sni 35 Wiring Diagram
Abby's Caribbean Cafe
Cta Bus Tracker 77
Outlet For The Thames Crossword
Music Go Round Music Store
Beverage Lyons Funeral Home Obituaries
Ceramic tiles vs vitrified tiles: Which one should you choose? - Building And Interiors
Deshuesadero El Pulpo
Breckiehill Shower Cucumber
Barista Breast Expansion
Jesus Revolution Showtimes Near Regal Stonecrest
Sams Gas Price Sanford Fl
Criglist Miami
Play It Again Sports Forsyth Photos
Guide to Cost-Benefit Analysis of Investment Projects Economic appraisal tool for Cohesion Policy 2014-2020
R/Sandiego
Royal Caribbean Luggage Tags Pending
Build-A-Team: Putting together the best Cathedral basketball team
Myfxbook Historical Data
Mandy Rose - WWE News, Rumors, & Updates
Linda Sublette Actress
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
Pa Legion Baseball
Mbfs Com Login
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Ehome America Coupon Code
Academic Notice and Subject to Dismissal
News & Events | Pi Recordings
5103 Liberty Ave, North Bergen, NJ 07047 - MLS 240018284 - Coldwell Banker
Is My Sister Toxic Quiz
2000 Fortnite Symbols
Prologistix Ein Number
Karen Kripas Obituary
Ark Silica Pearls Gfi
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 6410

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.