Published On: Tue, Oct 10th, 2017

2G, 3G Weren’t Secure? 4G and 5G Also Put Mobile Users and Smart Cities during Risk of Surveillance & DoS Attacks

While earnest a constantly connected world, usually like their predecessors, 4G and 5G networks are also exposed to cyberattacks. Plagued with weaknesses that leave whole networks during risk of hijacking and DoS attacks, researchers have suggested how 4G and 5G networks’ Evolved Packet Core (EPC) design can be exploited.

The vulnerabilities don’t even need an assailant to have “any worldly collection or skills” and can be exploited with a “laptop, a giveaway program installer for invasion tests, and simple programming skills.”

windows-10-vs-windows-7Related Time to Upgrade! Microsoft Ends Support for “Windows 10 Nov Update” Tomorrow

Calling these elemental confidence flaws in 4G network core, aka EPC, enemy can feat them to prevent and collect phone calls and content messages, launch Denial-of-Service and man-in-the-middle attacks, and put intelligent cities and Industrial IoT inclination during risk.

“Detected vulnerabilities poise a hazard to intelligent trade lights and travel lighting; electronic highway signs; information displays during train stops; and other intelligent city facilities that are ordinarily connected to mobile networks of a fourth generation.”

Researchers during Positive Technologies exhibit that this crowd of “attacks can be carried out by employees of probably any telecom user and by outmost enemy who benefit entrance to a operator’s infrastructure.”

“In some cases, attacks can even be implemented from a subscriber’s mobile phone.”

“4G and 5G are not prepared for intelligent cities”

The confidence organisation has detected flaws in EPC’s GTP custom (General parcel radio use Tunneling Protocol), divulgence shortcomings in a protocol. “Before 4G LTE, voice-call interception compulsory that enemy have special apparatus and in-depth believe of all a specific protocols used for voice calls,” Dmitry Kurbatov of Positive Technologies said.

“But given 4G networks are built on a element of an all-IP network, a assailant can use all now accessible hacking tools, that are mostly programmed and do not need a low bargain of a inlet of a attack.” The confidence news published by a organisation reveals that a vulnerabilities outcome in several intensity threats, including:

australia-cybersecurityRelated Australia Wants to Make Cybersecurity Relevant for “Mums and Dads”

  • Threats to Industrial Internet of Things connected to mobile networks
  • Interception of user data, like calls, content messages, unencrypted emails, internet traffic
  • Disruption of services, like DoS and MitM attacks
  • Collection of data

This is usually one of a several reports that have focused on a series of vulnerabilities detected in 4G and 5G networks that capacitate enemy to view on users and spin IoT inclination into slaves for their botnets. The confidence organisation has endorsed networks to analyze security of a mobile networks and request special instruments for monitoring and filtering of messages that cranky network boundaries. For users, a risks sojourn same as on prior protocols and WiFi or Bluetooth connections. Security experts suggest regulating apps that offer encryption for communications to strengthen information and privately identifiable information.

About the Author

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>