Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Communications Network United States Wireless Networking

New Flaws In 4G, 5G Allow Attackers To Intercept Calls and Track Phone Locations (techcrunch.com) 46

An anonymous reader quotes a report from TechCrunch: A group of academics have found three new security flaws in 4G and 5G, which they say can be used to intercept phone calls and track the locations of cell phone users. The findings are said to be the first time vulnerabilities have affected both 4G and the incoming 5G standard, which promises faster speeds and better security, particularly against law enforcement use of cell site simulators, known as "stingrays." But the researchers say that their new attacks can defeat newer protections that were believed to make it more difficult to snoop on phone users. [Rafiul Hussain, one of the co-authors of the paper, along with Ninghui Li and Elisa Bertino at Purdue University, and Mitziu Echeverria and Omar Chowdhury at the University of Iowa are set to reveal their findings at the Network and Distributed System Security Symposium in San Diego on Tuesday.

The paper, seen by TechCrunch prior to the talk, details the attacks: the first is Torpedo, which exploits a weakness in the paging protocol that carriers use to notify a phone before a call or text message comes through. The researchers found that several phone calls placed and cancelled in a short period can trigger a paging message without alerting the target device to an incoming call, which an attacker can use to track a victim's location. Knowing the victim's paging occasion also lets an attacker hijack the paging channel and inject or deny paging messages, by spoofing messages like Amber alerts or blocking messages altogether, the researchers say. Torpedo opens the door to two other attacks: Piercer, which the researchers say allows an attacker to determine an international mobile subscriber identity (IMSI) on the 4G network; and the aptly named IMSI-Cracking attack, which can brute force an IMSI number in both 4G and 5G networks, where IMSI numbers are encrypted.
AT&T, Verizon, Sprint and T-Mobile are all affected by Torpedo, "and the attacks can be carried out with radio equipment costing as little as $200," the report adds. One U.S. network is reportedly vulnerable to the Piercer attack, but the researcher wouldn't name which one.
This discussion has been archived. No new comments can be posted.

New Flaws In 4G, 5G Allow Attackers To Intercept Calls and Track Phone Locations

Comments Filter:
  • Hardly sounds like a "flaw".

  • 5G? (Score:4, Funny)

    by olsmeister ( 1488789 ) on Monday February 25, 2019 @05:27PM (#58179096)
    Are we talking real 5G, or AT&T 5G?
    • Are we talking real 5G, or AT&T 5G?

      Both, since the flaws are also in 4G.

      • by rtb61 ( 674572 )

        Right letter 'F', wrong word, definitely not flaws but FEATURES, oh yeah, all those bugs by accident, yep uh huh. This crap has been going on for decades and they still can not check their code properly, or, do they?

        • This crap has been going on for decades and they still can not check their code properly, or, do they?

          Fair point, but there's plenty of evidence for both malice and incompetence.

  • by Anonymous Coward

    requested by .gov

  • Since the advent of the surveillance state, I just assume that speaking on a cell phone, texting on a cell phone, and carrying a cell phone with the battery in it is the technological equivalent of breadcrumbs... if anybody is highly motivated enough to want to track my movements.

    The Stingray Tools [npr.org] are fairly easy for well-funded organisations to deploy, your cellie hits on towers it is closest to, and all manner of back doors for national security may be built in.

    Don't take a knife to a gun fight, and do

  • It cannot possibly be that security flaws in communication are a consequence of bad design, sloppy/cheap implementation or deliberate back-door placement by domestic agencies. We demand our usual amount of foreign-evil-doer blame-assignment!
  • Oh, you poor naive civilians ...

  • "Flaws"? You've used the wrong verb there. "Working as designed" is probably more accurate.

    Just because you're paranoid doesn't mean that they aren't out to get you. That was my funny phrase in the 70's, it's not quite so funny now.

    Luckily they're not trying to find or get me. But I'll ask Google Home about it just to make sure.
  • Thank goodness my flip-phone is still on 2G. Not sure what I will do when I need a new real-keyboard, no-camera Telephone that is really just a telephone.
  • 911 systems that have phase II (E911, phase II) is "suppose" to get you within 50 to 150 meters which is between 150 feet to 500 feet max which sounds "close" unless you are on the other end of the 911 call screaming for help. Shoot, when I was dispatching, we had to figure out WHERE they lived by the "well, you go down the old creek road where that barn got hit by lightning, turn right (and right could be north, south, east or west depending on where they were coming from!) then I'm right next to that ba

Did you know that if you took all the economists in the world and lined them up end to end, they'd still point in the wrong direction?

Working...