Thursday, September 23, 2021
Markfed Sept to Nov

mrsptu

Innocent Admission

Scientists spot 4G bug that can help hackers impersonate you

- Advertisement -
Berlin, Feb 23, 2020-

Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users, take a streaming service subscription at your expense or publish secret company documents under someone else’s identity.

The vulnerability — which affects virtually all mobile phones, tablets and some connected household appliances — may also hamper investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name but can also access websites using the victim’s identity.

For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator, said researchers from Ruhr-Universitat Bochum public university.

“An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them,” said Professor Thorsten Holz from Horst Gortz Institute for IT Security.

Only changing the hardware design would mitigate the threat.

The team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out.

“Mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future,” said David Rupprecht.

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping.

However, it is possible to modify the exchanged data packets.

“We don’t know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0,” said Rupprecht.

By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages.

They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider – such as a purchase command for a subscription.

The researchers from Bochum used so-called software-defined radios for the attacks.

These devices enable them to relay the communication between mobile phone and base station.

Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone.

For a successful attack, the attacker must be in the vicinity of the victim’s mobile phone, said the researchers.  (Agency)

- Advertisement -

Yes Punjab - TOP STORIES

Punjab News

Sikh News

Transfers, Postings, Promotions

- Advertisement -spot_img

Stay Connected

20,369FansLike
112,338FollowersFollow

ENTERTAINMENT

National

GLOBAL

OPINION

Congress Flag

Congress’ revival journey: It’s all about making the right beginning – by Nirendra Dev

Do not be surprised if another veteran Congressman, Lal Thanhawla from Mizoram , also steps aside like Capt Amarinder Singh in Punjab. The Congress...
Narendra Modi Joe Biden

Biden, Modi or who? Wanted a world leader at UNGA this week – by Robinder Sachdev

Who could be the 2-3 personalities from among the 200 or so heads of governments, who could rise and shine, and give hope to...
Joe Biden

Joe Biden’s QUAD summit could yield up to $100bn in military sales – by Robinder Sachdev

US President Joe Biden will be hosting the QUAD countries' heads of governments summit this coming week, in Washington D.C. – comprising of the...

SPORTS

Health & Fitness

Alzheimer

Does all memory loss indicate Alzheimer’s Disease?

New Delhi, Sep 21, 2021- While memory loss is most often associated with the elderly, more and more young people today are having trouble remembering things. Are all these a sign of Alzheimer's? No, say doctors. According to doctors, multiple factors are responsible for the youth tending to forget things. These include lack of sleep, too much screen time on...

Gadgets & Tech

error: Content is protected !!