At NDSS Symposium 2019, a group of university researchers yesterday revealed newly discovered cellular network vulnerabilities that impact both 4G and 5G LTE protocols.According to a paper published by the researchers, “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information,” the new attacks could allow remote attackers to bypass security protections implemented in 4G and 5G, re-enabling IMSI catching devices like “Stingrays” to intercept users’ phone calls and track their location.Here below, we have described all the three attacks, how they work, what are their impacts, and why you should be concerned about these attacks.ToRPEDO Attack — Location Verification, DoS, Inject Fake Alerts
Short for “TRacking via Paging mEssage DistributiOn,” TorPEDO is the most concerning attack that leverages paging protocol, allowing remote attackers to verify a victim device’s location, inject fabricated paging messages, and mount denial-of-service (DoS) attacks.
When a device is not actively communicating with the cellular network, it enters an idle mode, sort of a low-energy mode that saves device battery power.So, when you receive a phone call or an SMS message while your device is in the ideal mode, the cellular network first sends a paging message to notify the device of the incoming call or text.It should be noted that paging messages also include a value called “Temporary Mobile Subscriber Identity” (TMSI) of the device that doesn’t change frequently.However, researchers find that if an attacker starts and then immediately cancels calls several times in a short period, the base station update TMSI value very frequently while sending the paging messages.Therefore, an attacker sniffing the paging messages, through devices like Stingrays, can verify if a targeted cellular user is within a range of the interception or not.
“If the attacker is aware of the victim’s …

Go to Source

Author:

Comments are closed.