Monday, January 25, 22:55
Home security Hackers use mobile internet protocol errors targeting 4G / ... users

Hackers use mobile internet protocol errors targeting 4G / 5G users

According to a recently published research, high impact errors in modern communication protocol, used by mobile network providers (MNOs), can be exploited by hackers for interception data users, as well as to perform DDoS attacks and forgeries - fraud. The findings are part of a new report on faults on 4G and 5G networks for 2020, published last week by London-based Positive Technologies. The report includes the results of the evaluations security held between 2018-2019 on behalf of 28 telecommunications providers in Europe, Asia, Africa and South America.

protocol

Named GPRS Tunneling Protocol (GTP), the Internet Protocol (IP) communication standard sets out a set of rules governing data traffic on 2G, 3G and 4G networks. It is also the basis for the basics network GPRS and its successor Evolved Packet Core (EPC), allowing users to stay connected to the Internet while moving from one place to another.

According to the company, the GTP protocol contains a number of bugs that threaten both mobile providers and their customers. As a result, hackers can intervene in network equipment and leave an entire city without communication, "falsifying" users to obtain access in various resources, and use services network at the expense of network operators or subscribers.

Basic error due to the fact that the protocol does not control the actual position of the subscriber, thus making it difficult to verify whether the incoming movement is legal. A second architectural issue is related to the way they are verified credentials subscribers, thus allowing hackers to forge the node that acts as SGSN (Serving GPRS Support Node). Even more troubling is the possibility of fraud and forgery, where hackers can use a hacked ID to use a mobile phone. Internet as legal users. In an alternative scenario, hackers could breach user login data containing identifiers, such as a subscriber's phone number, to "emulate" that person and gain Internet access.

According to the report, these attacks can be used not only by hackers but also by a dishonest mobile network provider, with the aim of creating roaming traffic, with MNO charging another provider for non-existent roaming activity of this provider's subscribers. In all the networks tested, it was possible to use mobile internet at the expense of both the other subscribers and the operator. With 5G networks using EPC as the main network for wireless communications, Positive Technologies has said it is just as vulnerable to hacking and hacking. He added that any network tested was prone to DDoS attacks on network equipment, thus preventing reputable subscribers from connecting to the Internet and disrupting mobile communications services. Researchers say mass communication loss is particularly dangerous for 5G networks, because it's about devices and production such as industrial equipment, Smart Homes and city infrastructure.

To mitigate security issues and reduce the risk of hackers, the company urges operators to perform whitelist-based IP filtering at the GTP level, as well as to follow GSMA's security recommendations for real-time traffic analysis and for the exclusion of illegal activity. The report concluded that safety should be a priority when designing a network. This is now coming to the fore, as operators are beginning to build 5G networks.

Finally, according to the report, efforts to implement security at later stages can cost much more. At best, operators will likely need to purchase additional equipment. In the worst case, they may encounter security errors that cannot be fixed later.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

00:02:40

COVID-19 vaccines: Ways to protect supply chains

The development of vaccines for COVID-19 in such a short period of time has created many challenges and these are not only related to ...
00:02:17

How do insurance companies "enhance" ransomware attacks?

Ransomware attacks have increased significantly, with experts warning that their victims should not pay ransom to hackers ....

Russia: "US may be planning retaliation for SolarWinds hack"!

The Russian government warns the country's organizations about possible cyber attacks that the US may carry out, as "retaliation" for the hack ...

iPhone: How to see which apps have access to your contacts

Some iPhone privacy issues go deeper than accessing your contacts list, which exposes your contacts to ...

COVID-19: Google makes vaccination clinics available

Google CEO Sundar Pichai said Monday that the company will make its facilities available to become clinics ...

Netflix offers "studio quality" audio upgrade on Android

Do not be surprised if Netflix sounds better the next time you run a marathon with rows on your Android phone ...

Will Bitcoin return to $ 40.000? There is concern!

Bitcoin lovers who take his return above the level of $ 40.000 for granted have been worried because the demand ...

Avaddon ransomware: Its operators threaten with DDoS attacks to get ransom!

Lately, more and more ransomware gangs tend to threaten their targets with DDoS attacks in order to secure profits ....

Volunteer firefighters will be trained through VR simulation

Volunteer firefighters in the Australian state of Victoria will soon have access to the virtual reality (VR) training that will be available in ...

Tesla: Accuses its former employee of stealing her confidential data!

On January 23, Tesla sued former employee Alex Khatilov for stealing 26.000 confidential documents, including trade secrets. The software ...