Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Auto-BAHN: Using Smart phones to create emergency, ad hoc networks

Thomas Wilhelm, Sr. Security Consultant at Trustwave SpiderLabs, revealed a proof of concept this weekend at the DefCon 19 conference that demonstrated how ad hoc networks could be created using smart phones. These ad hoc networks could provide a method for citizens - impacted by natural or man-made disasters - to communicate with emergency responders without the use of telecommunication infrastructures.

In times of emergencies, cellular and phone systems are often destroyed or severely damaged, which prevents civilians from communicating with fire, police, or medical services. By creating broadcast, ad hoc networks using smart phones, it is possible to allow messages requesting help to pass between phones until they are intercepted by emergency services. To facilitate the communication between smart phones, Thomas decided to create an open source project called "Auto-BAHN" (Automated Broadcast Ad Hoc Network), which uses an application that can be quickly installed on smart phones.

Once cellular infrastructures are taken off-line for whatever reason, the Auto-BAHN software can reach out to other phones, installed with the same software, to pass messages between each other, including calls for help. Because of the inherent design of broadcast networks, all messages find the shortest path to their intended target, allowing responders to act accordingly in a timely manner.

The proof of concept presented by Thomas at DefCon will be developed for multiple platforms, including Android, iPhones and Blackberry phones. The long range goal of the Auto-BAHN project is to encourage Operating System developers of smart phone technologies to deploy Auto-BAHN on all systems; thus ensuring wide deployment of an alternative method of communication during disasters.

Latest SpiderLabs Blogs

Breakdown of Tycoon Phishing-as-a-Service System

Just weeks after Trustwave SpiderLabs reported on the Greatness phishing-as-a-service (PaaS) framework, SpiderLabs’ Email Security team is tracking another PaaS called Tycoon Group.

Read More

Physical Address Strangeness in Spam

Ten years ago, Congress passed the "CAN-SPAM Act" (also known as theYou-CAN-SPAM Act, since it defined legal spam and supersedes any stricter state-antispam laws). One of the provisions of the act is...

Read More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising

During an Advanced Continual Threat Hunt (ACTH) investigation that took place in early December 2023, Trustwave SpiderLabs discovered Ov3r_Stealer, an infostealer distributed using Facebook...

Read More