How attackers over 4G can ruin your life: 10 new ways from scientists

4g

How attackers over 4G can ruin your life: 10 new ways from scientists

Researchers at Purdue University and the University of Iowa have come up with 10 new ways to hack 4G LTE networks. With them, hackers can connect to the network under the guise of another user, spoof the sender of messages and data on the location of the mobile device, as well as forcibly disconnect other people’s phones from the network. We tell briefly about what the researchers came up with.

According to Bleeping Computer, the researchers have presented only a description of the problems and did not talk about their details. They are waiting for Troubleshooting.

Картинки по запросу How attackers over 4G can ruin your life

What are the three main types of hacking found by scientists?
Depending on the Protocol being damaged, which supports 4G LTE mobile networks around the world: connecting the device to the network (Attach), disconnecting (Detach) and paging (Paging) – a Protocol designed to re-obtain system information by the device.

To find these vulnerabilities and test how they work, the authors used a test rig built from low-cost radios, open-source LTE software, and a tool called LTEInspector, the source code of which was laid out on GitHub.

What can be done through the attach-protocols: disable services, merge information about the location, cause the failure of cellular services, read the messages of another user, change the location in the history of the device.

What can be done through paging protocols: disable some services, disconnect the user from the network, publish fake messages with warnings about disasters and terrorist attacks, drain the battery.

What can be done through detach-protocols: reduce the speed of the network connection to 2G/3G.

What is the most dangerous type of attack?

The report of scientists says that such methods can be adopted by criminals to provide an alibi. The most dangerous they consider the attack, which allows you to substitute the location of the mobile device. No less dangerous is the attack, which allows you to transmit false warning messages, including natural disasters.

Leave a Reply

Your email address will not be published. Required fields are marked *