New error detection in 4G LTE protocol
Scientists from Purdue and Iowa University have discovered new vulnerabilities in the main protocol of the 4G LTE mobile network - currently very popular in the world.
The vulnerability affects the process of mounting, splitting, wrapping - part of Long Term Evolution (LTE), the high-speed wireless communication standard on mobile devices.
The vulnerability can lead to blocking or falsifying messages
The researchers say the bug allows an attacker to connect to the 4G LTE network without authentication. By connecting via another user identity, the attacker sends a message that fakes the user, blocks the message, fakes the device's address and even forces other devices to disconnect from the network.
4G LTE is not yet 4G, but is very popular
Researchers worry that this error will be used in practice to hide crime. For example, an offender in the United States can assume the address as if he were in Europe.
Vulnerability using LTEInspector tool
Researchers use a special tool called LTEInspector to detect these errors - 10 new vulnerabilities and 9 known vulnerabilities. They also demonstrate the accuracy of their tools by exploiting 8 of the 10 new vulnerabilities by testing and faking the network, using the available software.
Each error found by LTEInspector is detailed in the research report. This tool is also available for free on GitHub.https://github.com/relentless-warrior/LTEInspector
See more:
- Are 4G and 4G LTE networks the same?
- Learn about 5G network, future mobile platform
You should read it
May be interested
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGXresearchers from the ohio state university have discovered a new dangerous variant of the specter vulnerability called sgxpectre with the ability to exploit information from safe partitions created by intel sgx.
- Bkav released a free detection tool for Meltdown and Specterbkav has released a free tool that checks whether the browser and the user's computer are also suffering from specter and meldown errors.
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- Windows 10 vulnerability from Cortana helps hackers open unauthorized malicious websites and how to fix themby default, cortana will always listen to users' requests, even if the lock screen on windows 10, this is the hole that gives hackers the opportunity to manipulate the device and install malicious code. in computer.
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.