Criminals are willing to pay thousands of euros for a discontinued Nokia mobile phone with a software problem that can be exploited to hack into online bank accounts Criminals are willing to pay thousands of euros for a discontinued Nokia mobile phone with a software problem that can be exploited to hack into online bank accounts, according to a fraud investigator in the Netherlands.About 10 days ago, investigators observed someone transfer 25,000 Euros (US$32,413) for a Nokia 1100 phone, said Frank Engelsman of Ultrascan Advanced Global Investigations. The candy-bar style phone is one of Nokia’s all-time best-selling models, and originally sold for under 100 Euros.Engelsman said police contacted Ultrascan about six months ago to see if the security company knew why the phones were in demand. Since then, Ultrascan has seen the price for the Nokia 1100 rise from around ¬5,000 to the latest figure.“We thought ‘What could be so special about the phone?'” Engelsman said. The 1100 was a low-cost phone released in late 2003 and aimed at developing markets. Nokia has sold more than 200 million of the 1100 and its successors.However, the high prices are only being paid for Nokia 1100 phones that were made in a factory in Bochum, Germany, Engelsman said, citing an Ultrascan informant. Those phones contain Nokia software from 2002 that is apparently vulnerable to tampering. Investigators don’t have a complete picture of the technical problem. However, Ultrascan’s informant said the phones can be used to intercept one-time passwords needed to complete an online banking transaction, Engelsman said.It appears that a known Russian and Moroccan cybercrime gang, as well as other Romanian gangs, are trying to obtain the Nokia 1100 with the vulnerable software, Engelsman said. Nokia officials contacted Monday morning did not have an immediate comment.Engelsman said cybercriminals have collected thousands of user names and passwords for online banking accounts in countries such as Germany and Holland. Banks in those countries also request a TAN (transaction authentication number) code, or a one-time password, to complete a transaction.The banks previously issued lists of TAN codes to customers. During a transaction, the bank would request one of the codes to complete the transaction. However, due to successful phishing attacks where people have been tricked into revealing some TAN codes, the banks are now sending a code by SMS (Short Message Service) to a person’s mobile phone, Engelsman said.The Bochum-made 1100 can apparently be reprogrammed to use someone else’s phone number, thus intercepting the TAN code and enabling an illegal money transfer into a criminal’s account, Engelsman said. Ultrascan is trying to obtain the affected 1100 model to verify if the attack works as described, he said. The Nokia 1100 has had other software problems. A drug-related criminal case in the Netherlands in late 2005 detailed how the police had difficulty linking SMSes sent from certain Nokia 1100 phones to a specific phone number. Police were, however, able to use other means to identify the general area in which the phones were used, which helped bolster their case, Engelsman said. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe