Draft:Sina Yazdanmehr

Sina Yazdanmehr

Sina Yazdanmehr[1] is a Berlin-based cybersecurity researcher who investigates structural security issues in different domains including Global System for Mobile Communications (GSM) and Digital health. He has shared his research at various conferences such as Black Hat Briefings.

Yazdanmehr takes on the role of co-organizer for the BSides Berlin information security conference.[2]

Notable research

edit

DICOM

edit

Yazdanmehr presented a critical security flaw on the DICOM Store service at BlackHat Europe 2023[3], showcasing the potential for hackers to manipulate established series of medical images. His research underscored the capability of attackers to compromise a series of images or introduce misleading indicators of illness.

Yazdanmehr emphasized the severity of the situation by revealing that over 59 million patient records were accessible on the internet due to inherent security shortcomings in DICOM.[4][5][6]

In collaboration with Luca Melette, Yazdanmehr presented research on Rich Communication Services (RCS) at BlackHat Europe 2019[7]. They demonstrated various attacks, including SMS hijacking, showcasing their ability to remotely intercept a Multi-factor authentication (MFA) code delivered via SMS and gain access to a Gmail account.[8][9]

References

edit
  1. ^ "Sina Yazdanmehr on LinkedIn". linkedin.com.
  2. ^ "BSides Berlin". bsides.berlin.
  3. ^ "Millions of Patient Records at Risk: The Perils of Legacy Protocols" (PDF). i.blackhat.com.
  4. ^ "Millionen von Patientendaten liegen ungeschützt im Netz". golem.de.
  5. ^ "Millions of patient scans and health records spilling online thanks to decades-old protocol bug". techcrunch.com. 6 December 2023.
  6. ^ "Interview with Sina Yazdanmehr, Aplite". 4imag.com. 18 December 2023.
  7. ^ "Mobile Network Hacking, IP Edition". youtube.com. 15 January 2020.
  8. ^ "SMS Replacement is Exposing Users to Text, Call Interception Thanks to Sloppy Telecos". vice.com. 29 November 2019.
  9. ^ Kammer, Alena (29 November 2019). "Hacker können SMS-Nachfolger RCS ausspionieren". Die Zeit.