Impersonating iOS Password Prompts

This is an interesting security vulnerability: because it is so easy to impersonate iOS password prompts, a malicious app can steal your password just by asking. Why does this work? iOS asks the user for their iTunes password for many reasons, the most common ones are recently installed iOS operating system updates, or iOS apps that are stuck during installation…. Continue reading Impersonating iOS Password Prompts

GPS Spoofing Attacks

Wired has a story about a possible GPS spoofing attack by Russia: After trawling through AIS data from recent years, evidence of spoofing becomes clear. Goward says GPS data has placed ships at three different airports and there have been other interesting anomalies. "We would find very large oil tankers who could travel at the maximum speed at 15 knots,"… Continue reading GPS Spoofing Attacks

Are there any cyber investigators that help individuals locate the source of spoofed death/bodily harm texts?

For the past two and a half years I’ve been getting text messages threatening my life and detailing disgusting acts of physical torture planned for my wife and our dogs.

The texts have been spoofed to my cell phone, one hun… Continue reading Are there any cyber investigators that help individuals locate the source of spoofed death/bodily harm texts?

Posted in Uncategorized | Tagged

Is it possible to Spoof Another Machine’s MAC Address on LAN?

Is it possible to Spoof Another Machine’s MAC Address on LAN?

I know we can spoof mac address of machine that we are currently on, using macchanger or ifconfig wlan0 ether de:ad:be:ef:ca:fe. But I want to make another host on LAN to pret… Continue reading Is it possible to Spoof Another Machine’s MAC Address on LAN?

Why can’t I force an application to close active session by spoofing the Source IP address?

I am trying to get my head around the setup above. A simple netcat session between two hosts and a pentesting machine is trying to get that established session to be terminated by only knowing source and destination IP:port… Continue reading Why can’t I force an application to close active session by spoofing the Source IP address?

Posted in Uncategorized | Tagged

Suspicious text received from my # but I did not send it – is there definitely a virus involved, and if so who has it, the sender or receiver?

A close friend texted me this morning asking if I meant to send that last text, noting it was suspicious. I asked for a screenshot of the text in question, and it is a text from my number with spam I did not send. The text said “Visit http://legacy.operator.com:8080/webgui/vm[…] to read your new mms.” and it appears in-line with the actual dialogue I’d had with this person.

From my phone, I see no record of sending that text. They received it around 10am, and at 11:30am I received a text from an unrecognized # with similar spam but in German. An odd coincidence or just a sign spammers were active all around. In any case, because of the difference in timing, at least the German text couldn’t have infected me and caused the text to my friend.

Neither of us clicked either spam attack’s link. I expect the German one I received can safely be ignored. I’m uncertain about the other text which my friend received from my # and which I have no record of sending.


Does the text my friend received from my number imply one of us has a virus? I’m concerned this is the case because either a virus on my phone sent spam out to the # I contact the most (this friend), or a virus on my friend’s phone brought up spam spoofed from the # they contact the most (me). How else would the spammer know to spoof from my # to my friend’s # – of all the #s it could go to/come from, my friend and I are each other’s top contact.

If it does imply one of us has a virus as I suspect, is there a way to tell who, or do we each need to take antivirus cleanup measures? We both have Android phones and I think the same carrier but different phone models and OS versions. We both have antivirus on our phones (WebRoot on my end, Norton on my friend’s) and scans came back clean.


Related but doesn’t answer my question, just clarifies tech involved:

Continue reading Suspicious text received from my # but I did not send it – is there definitely a virus involved, and if so who has it, the sender or receiver?