Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Wednesday January 30 2019, @06:53PM   Printer-friendly
from the off-the-grid-is-the-only-way dept.

Researchers at ETH Zurich and Technische Universität Berlin have described a flaw in the 3G, 4G, and 5G communications which keeps mobile phone communications vulnerable to international mobile subscriber identity-catcher (IMSI-catcher) attacks. Specifically, the Authentication and Key Agreement (AKA) protocol accidentally (?) allows for a new privacy attack against all variants of the protocol, including more detailed location disclosure.

The standards body in charge of 5G—the 3rd Generation Partnership Project, or 3GPP—has improved AKA to mitigate those well-known privacy issues. However, the researchers say, they have been able to find a new vulnerability that affects all versions of the AKA, including in the upcoming 5G standard. And what's more, the researchers say that this new attack "breaches subscribers' privacy more severely than known location privacy attacks do."

The newly discovered vulnerability allows an attacker who can intercept mobile traffic in the area (meaning anyone with a software-defined radio costing around $500) to monitor individual subscriber activity, such as the number of outgoing calls or SMSs sent in a given amount of time (but not the metadata or contents of the messages.) On top of that, the technique can tell an attacker how many calls or text messages an individual victim sent even if the victim is not near the attacker when the calls or texts are sent. Instead, after the first time the victims enters the attack area and subsequently leaves the area, even past call and text activity would become vulnerable as soon as the victim and their device re-enters the attack area.

[...] It's important to keep in mind here that, for cases of lawful intervention from law enforcement agencies, there are better ways than this attack technique to get location information, such as getting a warrant and getting the information directly from the phone companies. People working outside the legal system, such as spies and criminals, cannot get warrants and cannot typically work directly with the phone companies. Law enforcement does not need the location-finding capabilities of an IMSI catcher unless they are trying to circumvent the legal system.

Earlier on SN:
If 5G Is So Important, Why Isn't It Secure? (2019)
Sen. Wyden Confirms Cell-Site Simulators Disrupt Emergency Calls (2018)
Trump's Cell Phone Use is Security "Nightmare" Waiting to Happen, Lawmakers Say (2018)
New York District Court Throws Out DEA Stingray Evidence (2016)


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by DannyB on Thursday January 31 2019, @02:51PM

    by DannyB (5839) Subscriber Badge on Thursday January 31 2019, @02:51PM (#794535) Journal

    It's not just your location they want to hijack.

    And they don't want you to know or install anything. After all, some people might be savvy enough not to fall for installing silly applications, even on a burner phone.

    --
    To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2