New smartphone vulnerability discovered by Northeastern Ph.D. student reveals hackers could track your location
A newly discovered vulnerability in text messaging may enable attackers to trace your location, according to Northeastern Ph.D. student Evangelos Bitsikas.
His research group exposed the flaw by applying a sophisticated machine-learning program to data gleaned from the relatively primitive SMS system that has driven texting in mobile phones since the early 1990s.
âJust by knowing the phone number of the user victim, and having normal network access, you can locate that victim,â says Bitsikas, who will formally present his research next month at the 32nd USENIX Security Symposium in Anaheim, California. âEventually this leads to tracking the user to different locations worldwide.â

SMS security has improved marginally since its initial creation for 2g systems three decades ago, Bitsikas says. When a text is sent to you, your phone responds automatically with a notification to the senderâessentially a receipt of delivery.
Using Bitsikasâ method, a hacker would send multiple text messages to your cellphone. The timing of your automated delivery replies would enable the hacker to triangulate your locationâregardless of whether your communications are encrypted.
The timing of each automated delivery notification sent by your phone leaves a fingerprint of your location. Those fingerprints werenât a problem until Bitsikasâ group used machine learning to develop an algorithm capable of detecting them.
âOnce the machine-learning model is established, then the attacker is ready to send a few SMS messages,â says Bitsikas, who is pursuing his Ph.D. in cybersecurity. âThe results are fed into the machine-learning model, which will respond with the predicted location.â
Bitsikas has found no evidence that the vulnerabilityâwhich so far has been leveraging Android operating systemsâis currently being exploited.
âThis does not mean that [hackers] arenât going to make use of it later on,â Bitsikas says. âThe procedure might be difficult to scale. The attacker will need to have Android devices in multiple locations sending messages every hour and calculating the responses. The collection itself can take days or weeks depending on how many fingerprints the attacker wants to collect.
âNot only are the collection and the analysis difficult, but then you have also the problem of sufficiently and appropriately configuring the machine-learning model, which is related to deep learning.â
Just by knowing the phone number of the user victim, and having normal network access, you can locate that victim.
The concern, says Bitsikas, is that a deep-pocketed organization could exploit the flaw to locate government leaders, activists, CEOs and others who desire to keep their whereabouts private.
âWe are researchers with limited resources and we are not experts in data science,â Bitsikas says of his group. âWhat I’m afraid of is that advanced attackersâhacker groups, state-sponsored agencies, police, who of course have more resourcesâcan achieve greater impact with this kind of attack.â
Before publishing the research, Bitsikas shared it with GSMA, a global organization of more than 15,000 member experts that oversees the health and welfare of the mobile ecosystem.
âOur results and findings have been verified by GSMA,â Bitsikas says. âThey have acknowledged the results, saying that this is a difficult problem to solve considering also the cost and effort for deploying complete countermeasures.â
Closing the vulnerability would require an overhaul of the global SMS system, Bitsikas says. He has been told that GSMA plans to add countermeasures that will make the hack more difficult to achieveâbut wonât close the window entirely.
âIt’s different from Microsoft or Apple creating a software patch to solve a security vulnerability,â Bitsikas says. âThese networks cannot be changed instantly everywhere.â
Bitsikas is planning additional research that may build upon this breakthrough.
âI don’t want to frighten you,â he says, âbut I want us to focus on making the model more accurate.â
Ian Thomsen is a Northeastern Global News reporter. Email him at i.thomsen@northeastern.edu. Follow him on Twitter @IanatNU.





