Scientists spot 4G bug that can help hackers impersonate you

Feb 23, 2020
Berlin: Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users, take a streaming service subscription at your expense or publish secret company documents under someone else’s identity.

The vulnerability — which affects virtually all mobile phones, tablets and some connected household appliances — may also hamper investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name but can also access websites using the victim’s identity.

For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator, said researchers from Ruhr-Universitat Bochum public university.

“An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them,” said Professor Thorsten Holz from Horst Gortz Institute for IT Security.

Only changing the hardware design would mitigate the threat.

The team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out.

“Mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future,” said David Rupprecht.

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping.

However, it is possible to modify the exchanged data packets.

“We don’t know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0,” said Rupprecht.

By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages.

They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider – such as a purchase command for a subscription.

The researchers from Bochum used so-called software-defined radios for the attacks.

These devices enable them to relay the communication between mobile phone and base station.

Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone.

For a successful attack, the attacker must be in the vicinity of the victim’s mobile phone, said the researchers. IANS

Pakistan: Protests in Sindh intensify over canals issue, no outcome in meeting chaired by Sharif

Islamabad: The protests in Pakistan's Sindh against the construction of controversial new canals on the Indus River intensified Monday with the province cut off from the rest of the country...

Do terrorists have time to ask about religion before firing bullets: Maha Cong leader Vijay Wadettiwar

Nagpur: Maharashtra Congress Legislature Party leader Vijay Wadettiwar on Monday stoked a controversy by questioning the Hindu targeting in the Pahalgam terror attack, saying that do terrorists have the time...

From Kupwara to Kathua, people came out to protest: CM Omar Abdullah on Pahalgam attack

Jammu: Jammu and Kashmir Chief Minister Omar Abdullah said on Monday that for the first time, the people of the country are united, and this unity is needed to end...

CBI begins probe into CM Vijayan’s close aide Abraham, petitioner files caveat

Kochi: The CBI on Monday launched an investigation, as directed by the Kerala High Court, into allegations of illegal amassment of wealth by K.M. Abraham -- Chief Principal Secretary to...

Robots will surpass best human surgeons within 5 years: Elon Musk

New Delhi: Amid significant medical breakthroughs being achieved by robots, billionaire Elon Musk on Monday said they have the potential to surpass the best human surgeons within five years. The...

DeepSeek discloses Korean version of revised info processing policy

Seoul: Chinese artificial intelligence (AI) service DeepSeek, which stirred controversy last week for the overseas transfer of Korean user information, disclosed a Korean-language version of its partially revised information processing...

Five more cheetah cubs born in MP’s Kuno National Park

Bhopal: In a ground-breaking global effort to protect the endangered cheetah, a remarkable development has taken place in Madhya Pradesh’s (MP) Kuno National Park (KNP) in Sheopur district. Nirva, a...

US military considering permanent deployment of F-35 fighter jets to South Korea: Report

Seoul: The US military is considering the permanent deployment of advanced F-35A radar-evading fighter jets to South Korea, a source said Sunday. The deployment, if realised, would mark a major...

Govt cautions citizens against using public Wi-Fi for transactions

New Delhi: The government has issued a strong warning to citizens, advising them to avoid using public Wi-Fi networks for financial transactions and other sensitive activities. Free Wi-Fi at places...

Russia confirms for first time North Korean troop dispatch to Ukraine war: Reports

Seoul: Russia confirmed for the first time that North Korean troops have been deployed and are fighting alongside Moscow in the war against Ukraine, media reports said. Valery Gerasimov, chief...

Will continue offering full support to Indian govt: Kash Patel on Pahalgam attack

Washington: Federal Bureau of Investigation (FBI) Director Kash Patel on Sunday condemned the Pahalgam terror attack in Jammu and Kashmir and assured continued support to the Indian government in its...

Kerala: Pinarayi Vijayan’s daughter responds to ‘false’ news

Thiruvananthapuram: Breaking her silence for the first time since the allegations against Chief Minister Pinarayi Vijayan’s daughter, Veena Vijayan, and her now-defunct IT firm ‘Exalogic’, and denied the news in...

Read Previous

Finishing touches being given at the Motera Stadium for the Feb 24 “Namaste Trump” event in Ahmedabad . (Photo IANS/PIB)

Read Next

Samsung Galaxy A51: All rounder mid-range smartphone

WP2Social Auto Publish Powered By : XYZScripts.com