Monday, April 28, 2025
HomeCyber AttackStealthy SMS Side-Channel Attack Exposes SMS Recipient Location

Stealthy SMS Side-Channel Attack Exposes SMS Recipient Location

Published on

SIEM as a Service

Follow Us on Google News

Stealthy SMS Side-Channel Attack Exposed. When you send an SMS, delivery reports let you know if your message reached the recipient.

But here the most interesting thing is that they also have the potential to provide the location of the receiver.

Researchers have revealed that when you receive a silent SMS message, the sender can easily figure out where you are and it’s possible by looking at when you receive the messages.

- Advertisement - Google News

The development of this covert SMS side-channel attack involved researchers from multiple colleges working together.

Here below we have mentioned the name researchers along with their colleges:-

  • Evangelos Bitsikas from Northeastern University
  • Theodor Schnitzler from Research Center Trustworthy Data Science and Security
  • Christina Pöpper from New York University Abu Dhabi
  • Aanjhan Ranganathan from Northeastern University

SMS Side-Channel Attack

By analyzing the message timing, a sender can guess the receiver’s location in multiple countries with around 96% accuracy.

This attack primarily focuses on exploiting the main vulnerabilities of the GSMA network, which powers SMS technology. Since this side-channel attack targets GSMA, so, most of the cell phone networks worldwide get covered.

Although there are other communication options like 3G and 4G, the researchers selected to study SMS, as it is widely used by the general public for 2G communication.

The researchers noticed that receiving SMS Delivery Reports after getting an SMS message activates a timing attack vulnerability.

The SMS Delivery Reports feature operates in a way that the recipient cannot prevent its misuse because they have no control over it.

The attacker’s ML model will give more accurate location predictions during the attack if they have precise information about their targets’ whereabouts.

By sending multiple SMS messages to the target, the attacker can collect the data.

To make them discreet, they can present them as marketing messages that the target would likely dismiss or deploy silent SMS messages.

When a silent SMS is sent, it appears as an empty message on the target device without triggering any notifications, but it is still acknowledged as received by the device’s SMSC.

The researchers sent sets of 20 silent SMS messages every hour using ADB for three days to various test devices located in:-

  • The United States
  • The United Arab Emirates
  • Seven European nations

Ten different operators were included in this experiment, which aimed to analyze a wide collection of communication technologies and variations based on different generations.

Network Delay Factors

Here below we have mentioned all the network delay factors:-

  • UE Processing
  • Propagation Delay
  • Routing Delay
  • Processing Delay

To perform this attack, the attacker only needs to know the victim’s cell phone number.

Although it takes time, an attacker can uncover a new or unknown location of their target by collecting and analyzing the timing patterns of the user.

While in this case, the time interval between sending and receiving an SMS message can be beneficial significantly.

For location classification, the researchers selected the Multilayer Perceptron (MLP), which is a classifier that is accessible in Python’s SKLearn libraries.

Its selection was based on its versatility in parameter tuning and its remarkable performance with large amounts of data.

Even if the entire world were inaccessible, the accuracy of over 90 percent still poses a privacy risk to individuals.

The researchers found that the existing countermeasures against similar attacks do not work for this specific side-channel attack.

Looking For an All-in-One Multi-OS Patch Management Platform – 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...