Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Even if carriers shape up, though, an attacker can still track a smartphone's location and snoop on phone calls thanks to newly discovered flaws in 4G and even 5G protocols.

A group of researchers from Purdue University and the University of Iowa will present their findings Tuesday at the Network and Distributed System Security Symposium in San Diego. They note that their discoveries, first reported by TechCrunch, are particularly concerning since the 5G standard was specifically developed to better protect against these types of attacks.

The researchers, who also uncovered other vulnerabilities in the 4G network last year, describe a series of new protocol weaknesses that could be used in a variety of attacks. An exploit the researchers call Torpedo underlies the others; it preys on flaws in the "paging protocol" used to notify devices about incoming communications.

An idle device checks in with the nearest cellular base station for these pages at set increments, so it isn't killing battery life by checking constantly. If an attacker wants to determine if a target is nearby, they can initiate a quick series of phone calls to a victim's deice to "sniff," or evaluate, the paging protocol communications.

Both 4G and 5G have built-in protections against this type of surveillance, but researchers found that these obfuscation efforts fall short.
An attacker can spot patterns in the paging messages that reveal which base station the device is closest to, and confirm that the victim is in the area.

Fundamental protocol flaws, like those in the historic SS7 backbone standard, have remained unresolved for decades and led to increasing risk to end users.

Original article
Author: Wired

Wired has recently written 8 articles on similar topics including :
  1. "Opinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework". (July 7, 2019)
  2. "Who needs the dark web? Researchers found 74 groups offering stolen credit cards and hacking tools by conducting simple Facebook searches". (April 5, 2019)
  3. "On Wednesday, Mark Zuckerberg laid out a vision for a very different Facebook—with a lot of unknowns about how to get there". (March 7, 2019)
  4. "The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests". (June 27, 2018)
  5. "An exposed database belonging to Verifications.io contained both personal and business information, including 763 million unique email addresses". (March 7, 2019)
  6. "The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years". (April 10, 2019)
  7. "In the latest in its long string of incidents this year, Facebook let developers access the private photos of 6.8 million users". (December 15, 2018)
  8. "Some of those sequences are worth millions of dollars, but fortunately the hack isn’t easy to deploy—yet". (March 4, 2019)
Posted on  , ,