SIM maker Gemalto confirms possible spy attacks

Gemalto CEO Olivier Piou gives a press conference in Paris on February 25, 2015
Gemalto CEO Olivier Piou gives a press conference in Paris on February 25, 2015

European SIM maker Gemalto said Wednesday it had suffered hacking attacks that may have been conducted by US and British intelligence agencies but denied any "massive theft" of encryption keys that could be used to spy on conversations.

Investigative website The Intercept last week said the US National Security Agency and Britain's GCHQ hacked into the firm in 2010 and 2011 and stole SIM , with which they can reportedly monitor communications over mobiles without using a warrant or wiretap.

The website made the allegations on the theft of the keys—which encrypt and decrypt data—based on a document leaked by former NSA contractor Edward Snowden, and its report prompted some experts to decry a huge breach in mobile privacy.

"In 2010 and 2011, we detected two particularly sophisticated intrusions which could be related to the operation," Gemalto said in a statement.

"During the same period, we also detected several attempts to access the PCs of Gemalto employees who had regular contact with customers," it added.

"At the time we were unable to identify the perpetrators but we now think that they could be related to the NSA and GCHQ operation."

But the company denied that these attacks resulted in a large-scale theft of encryption keys.

"The attacks against Gemalto only breached its office networks and could not have resulted in a massive theft of SIM encryption keys," it said.

The company said the aim of the operation was to intercept the encryption keys as they were exchanged between mobile operators and suppliers such as Gemalto.

But "by 2010, Gemalto had already widely deployed a secure transfer system with its customers and only rare exceptions to this scheme could have led to theft."

"In the case of an eventual key theft, the intelligence services would only be able to spy on communications on second generation 2G mobile networks.

"3G and 4G networks are not vulnerable to this type of attack."

The NSA has come under intense scrutiny both at home and abroad after Snowden leaked documents from June 2013 about government surveillance programmes that sweep up data from Americans as well as foreigners.

The revelations led to a public outcry and strained relations with US allies.

Snowden, who fled the United States, has now sought temporary asylum in Russia.

US President Barack Obama vowed to reform the country's surveillance programmes following the outcry, but the US Senate in November blocked a bid by lawmakers to curb NSA bulk data collection.

The USA Freedom Act surveillance reform bill that was blocked would have reined in the NSA and also replaced the agency's blanket authority with a far narrower one allowing it to obtain call records from phone companies but only in specific cases.


Explore further

Snowden leak: NSA helped British steal cell phone codes (Update)

© 2015 AFP

Citation: SIM maker Gemalto confirms possible spy attacks (2015, February 25) retrieved 26 August 2019 from https://phys.org/news/2015-02-sim-maker-gemalto-spy.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
31 shares

Feedback to editors

User comments

Feb 26, 2015
If it was confirmed that the keys were actually stolen it would be very bad for their business, particularly as customers around the world demand replacement SIMs and put pressure on their phone companies to deliver safe SIMs.

If the breach happened and the SIM keys were stolen, they would have no real options other than to deny it. Unfortunately, that is also what they would do if the breach hadn't happened... There will always be some uncertainty in the truth of the situation.

I don't think any intelligence agency will have an interest in my phone conversations so I really don't care. However, those that would care (terrorists and criminals) might now move to other technologies for communications to avoid the risk that someone is listening in.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more