A new research has shown that the networks of the fifth generation 5G – which would be faster, and more secure than the networks of the fourth generation 4G – suffer from the existence of loopholes that allow exposing smart phones to the.
Found researchers the security at my University (Purdue) Purdue(and Iowa) Iowa nearly a dozen points of weakness, they said: it can be exploited to track the position of the victim in real time, or send alerts to an emergency may lead to panic, or disconnect in the silence of the phone connected to the 5G from the network completely.
It is said that 5G is more secure than its predecessor 4G, which is able to withstand the exploitation of the user to target the Protocols of the cellular network of Old, such as 2G, 3G, such as the use of simulators sites cells – known as the “Fish River” of Stingrays. But the results of the security researchers confirm that the pressure points based security protection, and privacy in the new generation of networks.
Even worse, according to the researchers, that some of the new attacks can be exploited also on a 4G network the current. And the expansion of the researchers in their findings to build a new tool, called 5GReasoner, has enabled this tool to find 11 new weakness in the 5G. It is through the establishment of the radio station basic suspicious, the attacker can perform several attacks on the telephone connected to it with a view to trade, and accelerate.
In one attack, the researchers said they were able to get the ID of a temporary network of old and new to the victim’s phone, allowing them to track the phone’s location – or even the abduction of the IRC channel of your phone to broadcast emergency alerts and fake.
Related topics what you read now:
The researcher said that this may lead to “chaos artificial”, in a manner similar to what happened when you sent by mistake alert a state of emergency that the state of Hawaii America was about to be hit by a missile ballistic amid tensions with nuclear growing between the United States, and North Korea.
In some cases, can use pressure points to reduce the level of cellular connectivity to the standard less secure, what makes it possible for agencies to enforce the law – or hackers who are able – attacks monitored against their goals by using the equipment of Stingrays specialized.
Given the nature of the vulnerabilities, the researchers said: they’re not planning to issue a code on how to hack openly. However, the researchers did not know the Association of GSM, which is a trade body representing the network of cells in all parts of the world, conclusions which they had reached.