Thursday, January 23, 2025
HomeAndroidRCS - New Android Text Messaging Service Let Hackers to Take Full...

RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts

Published on

SIEM as a Service

Follow Us on Google News

RCS expanded as Rich Communications Services is the next generation SMS protocol aimed to replace the SMS and MMS services. It was taken over by GSM Association in the year February 2008.

Starting from April 2018 Google started integrating RCS with its instant messaging mobile app Google Allo. RCS is the IP-based messaging service based on SIP and HTTP to provide various services such as group chats, video calls, file transfers and more.

RCS Hacking Attacks

According to the Security Research Labs report with some implementations RCS functionality not properly protected and it allows a range of different hacking attacks.

The improper implementation of RCS functionality in many networks let hackers gain complete control over the user accounts by stealing RCS configuration files that include SIP and HTTP credentials.

The implementation lack in certificate and domain validation which allows an attacker to intercept and manipulate communication in the middle and they also failed to validate user identity, which allows caller ID spoofing.

Following are the RCS hacking attacks possible with some implementations

RCS Hacking Attacks
RCS Hacking Attacks

These vulnerabilities can be exploited by a remote or local attacker to intercept an OTP message and to host fraudulent transactions and to take over your online accounts.

An attacker can also launch a MITM attack to intercept and manipulate the user communications with some deployments that failed to validate identity.

SRLabs researchers said that the “attacks make current RCS deployments as vulnerable to hacking as legacy mobile technologies, such as 2G and SS7.”

According to GSMA, 310 million active users already using RCS services.it currently launched by 84 operators worldwide and expected to be launched by another 27 operators in the first quarter of 2020.

It is currently supported only with the Android device if the RCS message received in a device or network that doesn’t support then it will be a regular text message.

RCS Message Examples
RCS Message Examples

Rich Communication Services allows advertisers to send interactive & personalized messages with full interactive functions without any additional apps.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read

861 Million SIM cards in 29 Countries are Vulnerable to Simjacker Attacks

Simjacker Vulnerability – Attackers take Control Over Mobile Phones via an SMS Message

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks

 A critical vulnerability in SonicWall's SMA1000 series tracked as CVE-2025-23006, has come under active exploitation...

Rails Apps Arbitrary File Write Vulnerability Let Attackers Execute Code Remotely

A newly exposed vulnerability in Ruby on Rails applications allows attackers to achieve Remote...