Active 4G LTE Vulnerability Allows Hackers to See Texts, Track Location

Active 4G LTE Vulnerability Allows Hackers to See Texts, Track Location

Your phone may not be a secure as you thought it once was.

Zhang Wanqiao, a Chinese researcher from Qihoo has demonstrated how a hacker could eavesdrop on conversations, read texts and see a smartphone’s location all through a 4G LTE vulnerability.

The 4G vulnerability is exploitable on any LTE network and is based off a “fail-safe” that is to be used during emergencies, such as natural disasters or when phone towers have become overloaded and redirection is necessary.

The hack works by using fake LTE towers to downgrade a phone’s LTE connection to a 3G connection and then finally to a 2G connection where many vulnerabilities can be exploited.

Researchers have brought up this vulnerability before. 3GPP, an organization in charge of setting mobile data network standards and enforcing them, acknowledged the issue in 2006 but did nothing to patch it. In 2015, a paper titled: Practical attacks against privacy and availability in 4G/LTE mobile communication systems outlined a similar incident that could allow a cybercriminal to access private information from one’s smartphone. That same year, ACLU obtained documents that described the vulnerability as having identical functionalities to stingray surveillance, used by law enforcement to track a suspect’s cell phone.

At DEFCON 24 in August, Wanqiao extended the initial findings of the researchers and presented it at the conference. Then this month, he showed attendees at Ruxcon that the vulnerability could be used across al LTE networks in the world with readily available gear.

Some have speculated that the vulnerability has not been patched on purpose, to allow law enforcement to continue their stingray surveillance.

The attack involves readily available hardware and open source software, so any dedicated hacker could be accessing your phone right now. But as the 3GPP has shown, it’s been 10 years and there have been no moves made to fix this vulnerability.

Featured

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3