Nav: Home

LTE vulnerability: Attackers can impersonate other mobile phone users

February 17, 2020

Exploiting a vulnerability in the mobile communication standard LTE, also known as 4G, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book fee-based services in their name that are paid for via the mobile phone bill - for example, a subscription to streaming services.

"An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them," illustrates Professor Thorsten Holz from Horst Görtz Institute for IT Security, who discovered the vulnerability together with David Rupprecht, Dr. Katharina Kohls and Professor Christina Pöpper. The team from Bochum will present the results on 25 February 2020 at the Network Distributed System Security Symposium, NDSS for short, in San Diego, USA. Details of the attacks are also available on the website http://www.imp4gt-attacks.net.

According to the researcher, the vulnerability may also affect investigations of law enforcement agencies because attackers can not only make purchases in the victim's name, but can also access websites using the victim's identity. For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator.

Almost all mobile phones and tablets at risk

The discovered vulnerability affects all devices that communicate with LTE, i.e. virtually all mobile phones, tablets, and some connected household appliances. Only changing the hardware design would mitigate the threat. The Bochum-based team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out. "For a technical perspective this is possible," explains David Rupprecht. "However, mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future."

As early as 2018, the group had already drawn attention to security gaps in LTE, through which attackers can redirect users to fake websites and retrieve their passwords (https://news.rub.de/english/press-releases/2018-06-28-it-engineering-security-gaps-identified-lte-mobile-telephony-standard).

Attacker has to be nearby

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping. However, it is possible to modify the exchanged data packets. "We don't know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0," as David Rupprecht elaborates. By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages. They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider - such as a purchase command for a subscription.

The researchers from Bochum use so-called software-defined radios for the attacks. These devices enable them to relay the communication between mobile phone and base station. Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone. For a successful attack, the attacker must be in the vicinity of the victim's mobile phone.
-end-


Ruhr-University Bochum

Related Mobile Phone Articles:

Some mobile phone apps may contain hidden behaviors that users never see
A team of cybersecurity researchers has discovered that a large number of cell phone applications contain hardcoded secrets allowing others to access private data or block content provided by users.
How secure are four and six-digit mobile phone PINs?
A German-American team of IT security researchers has investigated how users choose the PIN for their mobile phones and how they can be convinced to use a more secure number combination.
World's smelliest fruit could charge your mobile phone
Pungent produce packs an electrical punch. New method using world's 'most repulsive smelling fruit' could 'substantially reduce' the cost of energy storage.
LTE vulnerability: Attackers can impersonate other mobile phone users
Exploiting a vulnerability in the mobile communication standard LTE, also known as 4G, researchers at Ruhr-Universität Bochum can impersonate mobile phone users.
A photo taken with a mobile phone to detect frauds in rice labelling
Including plastic that is undetectable by the consumer or distorting the quality of the product are some of the frauds facing the third most consumed cereal in the world: rice.
Mapping disease outbreaks in urban settings using mobile phone data
A new EPFL and MIT study into the interplay between mobility and the 2013 and 2014 dengue outbreaks in Singapore has uncovered a legal void around access to mobile phone data -- information that can prove vital in preventing the spread of infectious diseases.
Mobile phone data reveals non-market value of coastal tourism under climate change
Big data application is an emerging field in climate change adaptation.
Market competition sets tone for lower cost of UK mobile phone contracts, research shows
Healthy and competitive markets -- and not stringent regulations -- help dial back the cost of mobile phone contacts, according to new research.
Generic mobile phone chargers escalate risk of burn, electrocution
Electric currents generated by mobile phone chargers, particularly from lower-cost generic manufacturers, are causing serious injuries.
The use of mobile phone and the development of new pathologies
Professor Raquel Cantero of the University of Malaga (UMA) has identified a generational change in the use of this finger due to the influence of new technologies.
More Mobile Phone News and Mobile Phone Current Events

Trending Science News

Current Coronavirus (COVID-19) News

Top Science Podcasts

We have hand picked the top science podcasts of 2020.
Now Playing: TED Radio Hour

Climate Mindset
In the past few months, human beings have come together to fight a global threat. This hour, TED speakers explore how our response can be the catalyst to fight another global crisis: climate change. Guests include political strategist Tom Rivett-Carnac, diplomat Christiana Figueres, climate justice activist Xiye Bastida, and writer, illustrator, and artist Oliver Jeffers.
Now Playing: Science for the People

#562 Superbug to Bedside
By now we're all good and scared about antibiotic resistance, one of the many things coming to get us all. But there's good news, sort of. News antibiotics are coming out! How do they get tested? What does that kind of a trial look like and how does it happen? Host Bethany Brookeshire talks with Matt McCarthy, author of "Superbugs: The Race to Stop an Epidemic", about the ins and outs of testing a new antibiotic in the hospital.
Now Playing: Radiolab

Speedy Beet
There are few musical moments more well-worn than the first four notes of Beethoven's Fifth Symphony. But in this short, we find out that Beethoven might have made a last-ditch effort to keep his music from ever feeling familiar, to keep pushing his listeners to a kind of psychological limit. Big thanks to our Brooklyn Philharmonic musicians: Deborah Buck and Suzy Perelman on violin, Arash Amini on cello, and Ah Ling Neu on viola. And check out The First Four Notes, Matthew Guerrieri's book on Beethoven's Fifth. Support Radiolab today at Radiolab.org/donate.