Hier eine schöne Idee für Zebradem.com.
Man kann Samsung Handies über USSD Codes automatisiert löschen lassen, könnte ja mal einer hier im ZD integrieren. :D:D:D
[h=1]Dirty USSD' code could automatically wipe your Samsung TouchWiz device[/h]
The Factory Reset. One of those last ditch efforts that many of us have a fair bit of experience with. However, a malicious embed code could potentially do the exact same thing to your Galaxy S III. The Unstructured Supplementary Service Data (USSD) code (which we won't reproduce here) apparently only works on Samsung phones running Touchwiz, and only if you are directed to the dodgy destination while inside the stock browser (rather than Chrome, for example). This means the Galaxy Nexus is unaffected, but it can work the same dark magic on the likes of the Galaxy S II.
We've been trying to murder a GS III here at Engadget, but with no luck as yet -- we can cause the malicious digits to appear in the dialer, but we can't force the stock browser to visit them as a URL, even when trying a bit of URL forwarding and QR code trickery. However, this particular GS III has been rooted in the past, even though it's now running an official TouchWiz ROM, and that may be interfering with the process.
Aside from our own experiences, the evidence for the vulnerability is certainly strong. It was demonstrated at the Ekoparty security conference last weekend, during which time presenter Ravi Borgaonkar also showed how a different code could even wipe your SIM card.
See the video after the break for the evidence.
![]() ![]() http://www.ekoparty.org/2012/ravi-borgaonkar.phpA single line of HTML embedded in any web page will, according to @pof, reset and wipe any Samsung Galaxy S3. Blimey: http://t.co/phpYtpCi Quelle: https://twitter.com/tomscott/status/250548467603226624 |