The 2017 Pwnie Nominee For Most Innovative Research

Ghost telephonist

Credit: Yuwei Zheng, Lin Huang, Qing Yang, Haoqi Shan, Jun Li

Only using a computer and a cell phone, these researchers showed how on some cellular networks, due to an issue with LTE signaling, they could impersonate devices on the network. This allowed them to intercept calls and SMS messages intended for the victim as well as make calls and send SMS message that seem to come from the victim.

Even though I like me some shellcode in my research, I guess if you can just take calls intended for famous Hollywood movie actors or break SMS based 2fa without it, it is still probably okay.

Ghost telephonist