Security flaws in 4G, 5G allow attackers to intercept calls and track phone locations

“A group of academics have found three new security flaws in 4G and 5G, which they say can be used to intercept phone calls and track the locations of cell phone users,” Zack Whittaker reports for TechCrunch.

“The findings are said to be the first time vulnerabilities have affected both 4G and the incoming 5G standard, which promises faster speeds and better security, particularly against law enforcement use of cell site simulators, known as ‘stingrays,'” Whittaker reports. “But the researchers say that their new attacks can defeat newer protections that were believed to make it more difficult to snoop on phone users.”

“The paper, seen by TechCrunch prior to the talk, details the attacks: the first is Torpedo, which exploits a weakness in the paging protocol that carriers use to notify a phone before a call or text message comes through. The researchers found that several phone calls placed and cancelled in a short period can trigger a paging message without alerting the target device to an incoming call, which an attacker can use to track a victim’s location,” Whittaker reports. “Torpedo opens the door to two other attacks… [that put] even the newest 5G-capable devices at risk from stingrays…”

Read more in the full article here.

MacDailyNews Take: The good news is that the flaws have been reported to the GSMA and carriers, who can now fix the issues for shore up security.

1 Comment

  1. China is using Huawai’s tech and 5G networks to monitor its citizens. Have you heard of China’s, now infamous, ‘social score’ system? This tech is being used by their police state to track its people. Think their DNA data is ‘their’s’?

    Huawai is owned by the CCP. Remember, no businesses in China are privately owned; they might be ‘privately’ operated, but after decades of IP theft, the state is in total control of its tech sector.

    These people aren’t playing around.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.