• News
    • Tech News
    • AI
  • Gadgets
    • Apple
    • iPhone
  • Gaming
    • Playstation
    • Xbox
  • Science
    • News
    • Space
  • Streaming
    • Netflix
  • Vehicles
    • Car News
  • Social Media
    • WhatsApp
    • YouTube
  • Advertise
  • Terms
  • Privacy & Cookies
  • LADbible Group
  • LADbible
  • UNILAD
  • SPORTbible
  • GAMINGbible
  • Tyla
  • FOODbible
  • License Our Content
  • About Us & Contact
  • Jobs
  • Latest
  • Topics A-Z
  • Authors
Facebook
Instagram
X
TikTok
Snapchat
WhatsApp
Submit Your Content
YouTubers hack Linus Tech Tips’ phone network to spy on him and expose the worrying flaws in our phone systems

Home> Social Media

Published 12:23 25 Sep 2024 GMT+1

YouTubers hack Linus Tech Tips’ phone network to spy on him and expose the worrying flaws in our phone systems

They were able to intercept his phone calls and steal his two-factor passcodes

Bec Oakes

Bec Oakes

From ordering an Uber and booking vacations to work chats and online banking, we rely on our phones for pretty much everything.

But with individuals, companies and even governments falling victim to cyber-attacks, it makes you wonder how safe your personal information actually is.

In a demo shared on YouTube channel Veritasium, hackers infiltrated Linus Tech Tips' phone and exposed some pretty worrying flaws in the phone system.

"We hacked the phone system to spy on [Linus]," the video starts.

Advert

"We intercepted his phone calls and stole his two-factor passcodes. We didn't touch his phone. We didn't send him an email or a text, nothing.

"We did it all remotely and the worst part is it could happen to you."

Here's how they did it.

YouTube channel Veritasium hacked Linus Tech Tips' phone and were able to intercept both his phone calls and text messages (YouTube/Veritasium)
YouTube channel Veritasium hacked Linus Tech Tips' phone and were able to intercept both his phone calls and text messages (YouTube/Veritasium)

Advert

Signalling System 7 (SS7) is an international telecommunication system that controls how phone calls are routed and billed. It also enables advanced calling features and Short Message Service (SMS).

SS7 was first adapted as an international standard in 1988 and is still in use for both landline and cellphone service today.

But, while it revolutionized the way we communicate, SS7 is incredibly vulnerable to hacking, with some networks selling services to third parties and allowing themselves to be bribed.

Once a hacker has SS7 access, the next step is to collect a phone's IMSI - a unique 15 digit identifier which belongs exclusively to the SIM card of a phone.

Advert

Then, it's time to launch the attack.

The experiment exposed a major flaw in the phone system (YouTube/Veritasium)
The experiment exposed a major flaw in the phone system (YouTube/Veritasium)

After completing to steps to gain access to Linus' phone (with his knowledge, of course), they ran a test to see if it worked.

A call was made to Linus' phone number, but in a rather eerie moment, he didn't receive it. Instead, Derek (the hacker) intercepted the call and his phone started ringing.

Advert

Speaking over video chat, Linus said: "I didn't get it, mine didn't even ring. I heard it ring but I heard it through my speakers on my computer."

Derek then noted: "The crazy thing is that's a regular Canadian SIM card. So any Canadian SIM card, in theory, could be vulnerable to such an attack."

But why were they able to do this?

"When you put a phone number in your address book, you often don't put the country code," an expert explained. "But then if you're in a roaming scenario, that phone number would connect to a completely different person in the country you're currently in.

"By tricking the network into thinking his phone is roaming, we can rewrite the number someone is calling to a number that we control."

Advert

As part of the experiment, the team at Veritasium also managed to intercept Linus' text messages and receive a one-time login code sent to his phone.

In further cases they were unable to try out, SS7 can also be used to intercept two-factor passcodes and even track your location.

It's a pretty terrifying thought, but fortunately there are some steps you can take to protect yourself from hacking.

"If possible, choose alternatives to SMS-based two-factor authentication so messages can't be intercepted," Derek advises.

"And, if you're worried about phone tapping, use encrypted Internet-based calling services like Signal or WhatsApp," he says.

Featured Image Credit: Veritasium/ YouTube
Youtube
Cybersecurity
Smartphone

Advert

Advert

Advert

Choose your content:

18 hours ago
a day ago
  • Warner Bros.
    18 hours ago

    People mind-blown after realizing who is actually in iconic meme after years

    A tragic passing has caused the realization

    Social Media
  • NurPhoto / Contributor via Getty
    a day ago

    Facebook users set to receive their share of $725,000,000 settlement as payments begin

    You could earn a lot by signing up

    Social Media
  • Leon Bennett / Stringer via Getty
    a day ago

    Amanda Seyfried slammed following three-word statement on Charlie Kirk assassination

    The famous actor has offered her own assessment

    Social Media
  • wehatethecold / YouTube
    a day ago

    YouTuber goes viral after being caught in viral government coup with 51 deaths

    One clip has racked over 20 million views

    Social Media
  • Researchers urge users to delete every app from their phone on this list to protect yourself from cybercriminals
  • Popular YouTuber joins Dark Web chat room to expose what people are really like on there
  • How the FBI designed a fake phone company that landed criminals in jail cells
  • Hacker shows how frighteningly easy it is to hack any cell phone in 15 minutes