The 4G LTE (Long Term Evolution) protocol, the most widely used mobile network standard now, is endangered with vulnerabilities - discovered by few Information Security researchers
The 4G LTE (Long Term Evolution) protocol, the most widely used mobile network standard now, is endangered with vulnerabilities - discovered by few Information Security researchers. They discovered severe vulnerabilities in 4G LTE protocol that could be exploited and used for various cyber malpractices like :
- phone call spying
- text messages spying
- fake emergency alerts
- track the device location or spoof the location
- attach
- detach
- paging
- Attach: in this procedure the device of a user is associated with the network (the first connection that is made when we turn it on).
- Detach: the opposite process, where the user switches off the device and disconnects from the network, or the network disconnects the device (for example, due to not being able to validate it or running out of coverage)
- Paging: part of the procedure for making a call and looking for the device in the network to acquire system information or to contact it in case of emergency.
- Authentication Synchronization Failure Attack
- Traceability Attack
- Numb Attack
- Authentication Relay Attack
- Detach/Downgrade Attack
- Paging Channel Hijacking Attack
- Stealthy Kicking-off Attack
- Panic Attack
- Energy Depletion Attack
- Linkability Attack