HUO Computer Tips and tricks

Welcome to My Website. This website about Computer, Mobile and internet Tips and tricks,free Softwares and many more...

Welcome to My website

اسلام علیکم میرےویب سائٹ میں آنے کا بہت بہت شکریہ آپ اس ویب سائٹ میں مختلف کمپیوٹر،موبائل اور انٹرنٹ ٹپس اور ٹرکس سیکھ سکتے ہیں۔۔ ﷽ اVisit my new Website www.courseshub.org for free couses and other educational stuff

Monday 12 March 2018

​​🔗New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof & Spam🔗

Security researchers have discovered a set of severe vulnerabilities in 4G LTE protocol that could be exploited to spy on user phone calls and text messages, send fake emergency alerts, spoof location of the device and even knock devices entirely offline.

A new research paper PDF recently published by researchers at Purdue University and the University of Iowa details 10 new cyber attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals.

The attacks exploit design weaknesses in three key protocol procedures of the 4G LTE network known as attach, detach, and paging.

Unlike many previous research, these aren’t just theoretical attacks. The researchers employed a systematic model-based adversarial testing approach, which they called LTEInspector, and were able to test 8 of the 10 attacks in a real testbed using SIM cards from four large US carriers.

Authentication Synchronization Failure Attack

Traceability Attack

Numb Attack

Authentication Relay Attack

Detach/Downgrade Attack

Paging Channel Hijacking Attack

Stealthy Kicking-off Attack

Panic Attack

Energy Depletion Attack

Linkability Attack

Among the above-listed attacks, researchers consider an authentication relay attack is particularly worrying, as it lets an attacker connect to a 4G LTE network by impersonating a victim’s phone number without any legitimate credentials.


This attack could not only allow a hacker to compromise the cellular network to read incoming and outgoing messages of the victims but also frame someone else for the crime.

“Through this attack the adversary can poison the location of the victim device in the core networks, thus allowing setting up a false alibi or planting fake evidence during a criminal investigation,” the report said.

Other notable attacks reported by the researchers could allow attackers to obtain victim’s coarse-grained location information (linkability attack) and launch denial of service (DoS) attack against the device and take it offline (detach attack).

“Using LTEInspector, we obtained the intuition of an attack which enables an adversary to possibly hijack a cellular device’s paging channel with which it can not only stop notifications (e.g., call, SMS) to reach the device but also can inject fabricated messages resulting in multiple implications including energy depletion and activity profiling,” the paper reads.

No comments:

Post a Comment