LTE security vulnerabilities allow hackers to send false emergency alerts

Source: Internet
Author: User

LTE security vulnerabilities allow hackers to send false emergency alerts

Any electronic technology may have security vulnerabilities, even the mobile network technology itself is no exception. Researchers at the U. S. Pudu University and the University of Iowa have published a report describing the existence of severe security vulnerabilities in the LTE protocol, allowing hackers to launch 10 different attacks, this includes monitoring messages and phone content without sound information, tracking location information, taking devices offline, and even issuing false emergency alerts. Hackers can initiate identity verification relay attacks to attack targets after obtaining control of three major communication protocols (including protocols that connect devices to the network and maintain connections, not only can they lose their creden。 to connect to the network, but they can also impersonate their devices. In other words, hackers not only affect the use of the Internet, but also target others for illegal behaviors.

The above findings are not based on theory. The research team tried to attack 10 SIM cards from four major U.S. network vendors in this way, eight of which were successfully affected.

Fortunately, the vulnerability stored in LTE itself is fixed, and it is reported that at least one network provider has already faced the problem. However, this was an amendment to the time competition because it was difficult for hackers to detect and exploit this vulnerability to launch attacks. In addition, the cost of this tool is not expensive. You only need to spend about $1,300 to buy a stable supply of parts on the market. Therefore, hackers do not have to have a lot of resources to perform this attack.

This discovery reminds the industry that security must be ensured before the implementation of new generation network standards. After all, it is easier to launch a product that has been well inspected than to make repairs and supplements after the launch.

Source: ZDNet

This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151213.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.