Thursday, January 21, 17:31
Home security Error on LTE devices helps hackers "impersonate" users!

Error in LTE devices helps hackers to "impersonate" users!

4G LTE hackersResearchers from Germany's Ruhr-Universität Bochum recently discovered a new bug in mobile devices 4G/ LTE which could be exploited by hackers to tell the owner of the phone. The team is expected to present the results of its research to Network Distributed System Security Symposium in San Diego.

In particular, hackers have the ability to breach and manipulate user accounts, download illegally authenticated documents, and even block encrypted internet traffic, due to an error on all devices using the LTE service. However, it is highly unlikely that an average user will fall victim to this "Hacking" attack. This is due to the fact that it is quite a complicated hack and therefore difficult to implement.

4G LTE hackers
Computer hacker or Cyber ​​attack concept background

According to a security engineer, Maya Levine, the hacker who has carried out the attack must have the necessary know-how and be close to the victim. He also points out that there is little chance that an average user will be the victim of this "hacking" attack, as opposed to a famous and prominent person who may have a large amount of sensitive information. Even then, however, the chances of a hacker being able to extract useful information are minimal, as most digital activities are encrypted.

Hackers can exploit this error in the following way: When an LTE mobile user moves, the nearest cell tower sends a signal to his device. The hacker must be in the same place as the potential victim to "fool" the cell tower and have the know-how to signal the original user and therefore send and receive LTE signals.

According to Mark Nunnikhoven, his vice president in cloud research for cyber security company Trend Micro, the hacker could also handle and direct a user's account by making international calls or using high-quality services provided by the victim's provider, such as subscribing to a TV package.Mark Nunnikhoven

Hackers can also collect unencrypted information sent to the victim, which is however common only in activities such as Facebook and e-mail, while regular activities are almost unlikely to be affected by it.

However, the error can pose a problem for network providers and legal services, as they may find it difficult to control whether a particular user has performed the activities suggested by their device.

According to Darren Shou, head of technology at NortonLifeLock, the carrier could say "I received a request for this service and I charged you" and the user correspondingly replied "it wasn't me, it was a bad twin." What denial will there be? ”Darren Shou

Although discovering this error need not panic any LTE user, it reminds consumers, providers, and technologists of the need to constantly improve their security practices.

LTE error is not something a user can control, but there are other things he can control. For example, making sure your passwords have changed, knowing which links they click on, and freezing bank accounts when there is suspicious activity are the best practices to prevent hackers.

Finally, for technologists, the revelation about the LTE hack is another proof of how important encryption is, as hackers continue to find new ways to steal valuable and sensitive data.

 

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

00:02:35

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...

Microsoft: "Zero trust" protects against sophisticated hacking attacks

According to Microsoft, the techniques used by the hackers of SolarWinds, were sophisticated but common and preventable. To avoid future attacks ...