Smear phishing: a new Android vulnerability
In this post I show how you can trick Android into displaying an SMS as coming from any contact on a victim’s phone. The trick is convincing and easy, and the Android vulnerability is still unpatched. I then show how I stumbled onto it, reported it, and how Google ignored it. Have fun, whether you patch the vuln or exploit it!
Say I work at Twitter. I have Jack Dorsey, Twitter CEO, saved to my phone’s contacts. I have a previous legit conversation with Jack. Right now, you can send me message from Jack, which will appear in that conversation history, like this:
Ten seconds later, my phone rings, I answer, and it’s Jack. Blearily, I follow his instructions to click the link in my latest email. An hour later, hundreds of Twitter’s biggest accounts are hacked.
The recent incident at Twitter was traced to “a phone spear phishing attack”. Though we don’t know all the details, we do know that phone spoofs can lead to massive breaches. Or, if your alignment is chaotic evil, you could send a message from your enemy to his boss, or a fake “drunk text” to his ex. Fake messages that are completely indistinguishable from genuine messages. Sit back and watch the fallout.
How does this phishing technique work?
It exploits a bug in how Android treats the “Sender ID” of an SMS message.
An SMS message can have an alphanumeric “Sender ID”,
rather than coming from a numeric telephone number.
For example, I have an SMS message from the Sender ID
Sender ID on its own can be used for low-quality phishing.
You could send me a message from the Sender ID
This might convince someone, but
the message would appear in a new conversation,
the sender would not show up as a contact,
and the message details would show that it is not from a real phone number.
My phishing alarm would ring loudly.
For a different approach,
you could try sending me a message from the Sender ID
This would actually be the same as sending a message from Jack’s number:
the only way SMS distinguishes real phone numbers from Sender IDs
is that Sender IDs have non-numeric characters in them!
Therefore, SMS gateways stop you using numeric Sender IDs,
precisely to avoid forgery.
But then you have a dumb idea:
what if you sent an SMS from
with a leading
O, rather than
It’s a valid Sender ID,
but surely no one would fall for a low-quality scam like that?
Imagine my surprise, dear reader,
when I tried this stupid trick,
and the message actually arrived from the genuine Jack Dorsey contact on my phone.
As a new message in the legit conversation.
And which, when inspected, was indistinguishable from a genuine message:
it shows as from
Somewhere in the chain from the SMS gateway to my Android Messages app,
something was replacing the
O with a
0, and interpreting it as a genuine phone number!
Who could be so stupid, and how did this code get into production?
By elimination, I quickly found that Android is the culprit. It wasn’t the SMS gateway -- the same stupid trick works with other gateways. It wasn’t the phone’s network provider, or country -- the same stupid trick works with another phone on another operator in France. It wasn’t the Messages app -- the same stupid trick works with all other SMS apps on Android. But if I tried the trick with an iPhone, it wasn’t fooled -- it came through just as the fake Sender ID.
On July 3rd, I reported this vulnerability to Google via their security vuln program. But on July 17th, Google closed the issue as “Won’t Fix (Infeasible)”, with the assessment that “there are no guarantees regarding the sender ID of SMS messages, and they are known to be spoofable.” While this isn’t wrong, it’s another thing for the OS to completely misrepresent the Sender ID as a genuine phone number. And clearly it’s feasible to fix, because iOS does not have this vulnerability.
So it’s up to you, internet hackers, to find and fix the vuln!
Here are some clues.
The bug, more precisely, is that Android extracts the numeric characters from the Sender ID,
and tries to parse this as a phone number (with the phone’s local dialling prefix --
+44 in my case).
If it parses, the message is interpreted as from that number.
7890X123456 also parses as
Then, if a contact on the phone has that number,
the message displays from that contact.
Android’s SMS APIs are
and the “SMS inbox” API.
The latter API looks just awful,
so I imagine you’ll find the bug somewhere in there.
If you find or fix the vulnerability,
I’ll give you some fake internet points and mention you here.
I’m very curious why Android has this behavior.
Thanks Jonathan, Kevin and Alex for reviewing previous drafts of this post. Thanks Luka and others for helping test the vuln.
More by Jim
- Your syntax highlighter is wrong
- Granddad died today
- The Three Ts of Time, Thought and Typing: measuring cost on the web
- I hate telephones
- The sorry state of OpenSSL usability
- The dots do matter: how to scam a Gmail user
- My parents are Flat-Earthers
- How Hacker News stays interesting
- Project C-43: the lost origins of asymmetric crypto
- The hacker hype cycle
- The inception bar: a new phishing method
- Time is running out to catch COVID-19
- A probabilistic pub quiz for nerds
- Smear phishing: a new Android vulnerability