Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.

Submission Preview

Link to Story

The 5G Protocol May Still Be Vulnerable to IMSI Catchers

Accepted submission by canopic jug at 2019-01-30 06:29:06
Security

Researchers at ETH Zurich and Technische Universität Berlin have described a flaw in the 3G, 4G, and 5G communications [iacr.org] which keeps mobile phone communications vulnerable to international mobile subscriber identity-catcher (IMSI-catcher) attacks [eff.org]. Specifically, the Authentication and Key Agreement (AKA) protocol accidentally (?) allows for a new privacy attack against all variants of the protocol, including more detailed location disclosure.

The standards body in charge of 5G—the 3rd Generation Partnership Project, or 3GPP—has improved AKA to mitigate those well-known privacy issues. However, the researchers say, they have been able to find a new vulnerability that affects all versions of the AKA, including in the upcoming 5G standard. And what's more, the researchers say that this new attack “breaches subscribers’ privacy more severely than known location privacy attacks do.”

The newly discovered vulnerability allows an attacker who can intercept mobile traffic in the area (meaning anyone with a software-defined radio costing around $500) to monitor individual subscriber activity, such as the number of outgoing calls or SMSs sent in a given amount of time (but not the metadata or contents of the messages.) On top of that, the technique can tell an attacker how many calls or text messages an individual victim sent even if the victim is not near the attacker when the calls or texts are sent. Instead, after the first time the victims enters the attack area and subsequently leaves the area, even past call and text activity would become vulnerable as soon as the victim and their device re-enters the attack area.

[...] It’s important to keep in mind here that, for cases of lawful intervention from law enforcement agencies, there are better ways than this attack technique to get location information, such as getting a warrant and getting the information directly from the phone companies. People working outside the legal system, such as spies and criminals, cannot get warrants and cannot typically work directly with the phone companies. Law enforcement does not need the location-finding capabilities of an IMSI catcher unless they are trying to circumvent the legal system.

Earlier on SN:
If 5G Is So Important, Why Isn’t It Secure? [soylentnews.org] (2019)
Sen. Wyden Confirms Cell-Site Simulators Disrupt Emergency Calls [soylentnews.org] (2018)
Trump's Cell Phone Use is Security “Nightmare” Waiting to Happen, Lawmakers Say [soylentnews.org] (2018)
New York District Court Throws Out DEA Stingray Evidence [soylentnews.org] (2016)


Original Submission